{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,2]],"date-time":"2026-02-02T15:09:28Z","timestamp":1770044968445,"version":"3.49.0"},"reference-count":14,"publisher":"SAGE Publications","issue":"3","license":[{"start":{"date-parts":[[2021,1,25]],"date-time":"2021-01-25T00:00:00Z","timestamp":1611532800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"published-print":{"date-parts":[[2021,10,14]]},"abstract":"<jats:p>Today, the manner in which we communicate has greatly advanced. The technology is not just about machines, but people with technology together. Machine-to-machine (M2M) communication is unavoidable in the Internet of things. However, at the same time, there are more attacks against the M2M system. Therefore, a reliable and secure authentication mechanism is required. Blockchain technology is decentralized and highly secure while being tamper-proof. This protects M2M service providers by eliminating the single point of failures. This paper proposes a blockchain-based authentication scheme that uses a practical Byzantine fault tolerance (pBFT) consensus mechanism for M2M security in cyber physical systems. By implementing a blockchain to an M2M system, it provides an ID for devices on the blockchain. Simulation results have shown that the data on the chain cannot be altered. A pBFT consensus algorithm also ensures that the blockchain network is able to come to a consensus with faults.<\/jats:p>","DOI":"10.3233\/jifs-189702","type":"journal-article","created":{"date-parts":[[2021,1,26]],"date-time":"2021-01-26T12:43:15Z","timestamp":1611664995000},"page":"4425-4430","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":1,"title":["A blockchain-based authentication scheme for the machine-to-machine communication of a cyber physical system"],"prefix":"10.1177","volume":"41","author":[{"given":"Yi","family":"Xie","sequence":"first","affiliation":[{"name":"School of Computer Science, Wuhan University, Wuhan, China"}]},{"given":"Yulin","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Computer Science, Wuhan University, Wuhan, China"}]},{"given":"Maode","family":"Ma","sequence":"additional","affiliation":[{"name":"School of Electrical &amp; Electronic Engineering, Nanyang Technological University, Singapore"}]}],"member":"179","published-online":{"date-parts":[[2021,1,25]]},"reference":[{"key":"e_1_3_1_2_2","doi-asserted-by":"crossref","unstructured":"CardenasS.A.A.S.S.A.A. Secure control: towards survivable cyber-physical systems in IEEE 28th International Conference on Distributed Computing Systems 2008.","DOI":"10.1109\/ICDCS.Workshops.2008.40"},{"key":"e_1_3_1_3_2","doi-asserted-by":"crossref","unstructured":"Yuchen ZhangW.D.A.F.W. Architecture and real-time characteristics analysis of the cyber-physical system in IEEE 3rd International Conference on Communication Software and Networks (ICCSN) 2011.","DOI":"10.1109\/ICCSN.2011.6013602"},{"key":"e_1_3_1_4_2","doi-asserted-by":"crossref","unstructured":"Min ChenJ.W.A.F.L. Machine-to-machine communications: architectures standards and applications 2012.","DOI":"10.3837\/tiis.2012.02.002"},{"key":"e_1_3_1_5_2","doi-asserted-by":"crossref","unstructured":"Chen HongsongF.Z.A.Z.D. Security and trust research in M2M system in IEEE International Conference on Vehicular Electronics and Safety (ICVES) 2011.","DOI":"10.1109\/ICVES.2011.5983830"},{"key":"e_1_3_1_6_2","doi-asserted-by":"crossref","unstructured":"Rongxing LuX.L.X.L.X.S.A.X.L. GRS: the green reliability and security of emerging machine to machine communications 2011.","DOI":"10.1109\/MCOM.2011.5741143"},{"key":"e_1_3_1_7_2","doi-asserted-by":"crossref","unstructured":"Sachin AgarwalC.P.R.B.A.J.-P.S. Operator-based overthe-air M2M wireless sensor network security in 14th International Conference on Intelligence in Next Generation Networks 2010.","DOI":"10.1109\/ICIN.2010.5640910"},{"key":"e_1_3_1_8_2","unstructured":"Tien-Dung NguyenA.A.-S.A.E.-N.H. Adynamic ID-based authentication scheme in Sixth International Conference on Networked Computing and Advanced Information Management 2010."},{"key":"e_1_3_1_9_2","doi-asserted-by":"crossref","unstructured":"SunS.M.C.Z.A.Z.Z.X. A security authentication scheme in machine-to- machine home network service in Security Comm Networks 2012.","DOI":"10.1002\/sec.551"},{"key":"e_1_3_1_10_2","doi-asserted-by":"crossref","unstructured":"Wei RenL.Y.L.M.A.Y.R. How to Authenticate a Device? Formal Authentication Models for M2M Communications Defending against Ghost Compromising Attack International Journal of Distributed Sensor Networks 2013.","DOI":"10.1155\/2013\/679450"},{"key":"e_1_3_1_11_2","doi-asserted-by":"crossref","unstructured":"KimH.-Y.J.A.B.-H.H.J.-M. A study of privacy problem solving using device and user authentication for M2M environments 2013.","DOI":"10.1002\/sec.695"},{"key":"e_1_3_1_12_2","doi-asserted-by":"crossref","unstructured":"Shuo ChenZ.L. An authentication scheme with identity-based cryptography for M2M security in cyber-physical systems july 2016. [Online]. Available: https:\/\/www.researchgate.net\/publication\/9_An_authentication_scheme_with_identity-based_cryptography_for_M2M_security_in_cyber-physical_systems. [Accessed 1 Oct 2019].","DOI":"10.1002\/sec.1407"},{"key":"e_1_3_1_13_2","unstructured":"ZhenZ. An Overview of Blockchain Technology: Architecture Consensus and Future Trends june 2017. [Online]. Available: https:\/\/www.researchgate.net\/publication\/8_An_Overview_of_Blockchain_Technology_Architecture_Consensus_and_Future_Trends."},{"key":"e_1_3_1_14_2","unstructured":"KonashM. coinspeaker 29 june 2018. [Online]. Available: https:\/\/www.coinspeaker.com\/2018\/06\/29\/blockchain-poised-to-boost-speed-of-financial-transactions\/. [Accessed 2 October 2019]."},{"key":"e_1_3_1_15_2","doi-asserted-by":"crossref","unstructured":"Harish SukhwaniJ.M.M.X.C.K.S.T.A.A.R. Performance Modeling of PBFT Consensus Process for Permissioned Blockchain Network in 2017 IEEE 36th Symposium on Reliable Distributed Systems (SRDS) 2017.","DOI":"10.1109\/SRDS.2017.36"}],"container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JIFS-189702","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.3233\/JIFS-189702","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JIFS-189702","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,2]],"date-time":"2026-02-02T03:51:12Z","timestamp":1770004272000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.3233\/JIFS-189702"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,25]]},"references-count":14,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2021,10,14]]}},"alternative-id":["10.3233\/JIFS-189702"],"URL":"https:\/\/doi.org\/10.3233\/jifs-189702","relation":{},"ISSN":["1064-1246","1875-8967"],"issn-type":[{"value":"1064-1246","type":"print"},{"value":"1875-8967","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,1,25]]}}}