{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T14:28:51Z","timestamp":1766068131914,"version":"3.38.0"},"reference-count":54,"publisher":"Tech Science Press","issue":"3","license":[{"start":{"date-parts":[[2024,12,29]],"date-time":"2024-12-29T00:00:00Z","timestamp":1735430400000},"content-version":"vor","delay-in-days":363,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2024]]},"DOI":"10.32604\/cmc.2024.059378","type":"journal-article","created":{"date-parts":[[2024,12,12]],"date-time":"2024-12-12T02:30:17Z","timestamp":1733970617000},"page":"3679-3705","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":5,"title":["Blockchain-Enabled Mitigation Strategies for Distributed Denial of Service Attacks in IoT Sensor Networks: An Experimental Approach"],"prefix":"10.32604","volume":"81","author":[{"given":"Kithmini Godewatte","family":"Arachchige","sequence":"first","affiliation":[]},{"given":"Mohsin","family":"Murtaza","sequence":"additional","affiliation":[]},{"given":"Chi-Tsun","family":"Cheng","sequence":"additional","affiliation":[]},{"given":"Bader M.","family":"Albahlal","sequence":"additional","affiliation":[]},{"given":"Cheng-Chi","family":"Lee","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2024]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","DOI":"10.3390\/s24103083","article-title":"An analysis of blockchain-based IoT sensor network distributed denial of service attacks","volume":"24","author":"Arachchige","year":"2024","journal-title":"Sensors"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"69765","DOI":"10.1109\/ACCESS.2024.3378592","article-title":"A survey on addressing IoT security issues by embedding blockchain technology solutions: Review, attacks, current trends, and applications","volume":"12","author":"Huan","year":"2024","journal-title":"IEEE Access"},{"key":"ref3","article-title":"Collaborative threat intelligence: Enhancing IoT security through blockchain and machine learning integration","volume":"36","author":"Nazir","year":"2024","journal-title":"J. King Saud Univ.-Comput. Inf. Sci."},{"key":"ref4","doi-asserted-by":"crossref","first-page":"40368","DOI":"10.1109\/ACCESS.2024.3376707","article-title":"Toward intelligent monitoring in IoT: AI applications for real-time analysis and prediction","volume":"12","author":"Villegas-Ch","year":"2024","journal-title":"IEEE Access"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"98856","DOI":"10.1109\/ACCESS.2024.3428490","article-title":"Securing blockchain-based IoT systems: A review","volume":"12","author":"Commey","year":"2024","journal-title":"IEEE Access"},{"key":"ref6","article-title":"Transforming driver education: A comparative analysis of LLM-augmented training and conventional instruction for autonomous security technologies","volume":"18","author":"Murtaza","year":"2024","journal-title":"Int. J. Artif. Intell. Educ."},{"key":"ref7","unstructured":"The Department of Industry, Energy and Resources (DISER), \u201cThe national blockchain roadmap,\u201d 2020. Accessed: Jul. 10, 2024. [Online]. Available: https:\/\/www.dfat.gov.au\/about-us\/publications\/trade-and-investment\/business-envoy-april-2021-digital-trade-edition\/australias-blockchain-roadmap"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.iotcps.2023.06.003","article-title":"Unleashing the power of internet of things and blockchain: A comprehensive analysis and future directions","volume":"4","author":"Rejeb","year":"2024","journal-title":"Intern. Thin. Cyber-Phys. Syst."},{"key":"ref9","series-title":"2006 Int. Conf. Syst. Netw. Commun. (ICSNC\u201906)","article-title":"Security issues in wireless sensor networks","author":"Zia","year":"2006"},{"key":"ref10","series-title":"presented at the Proc. Thirteenth EuroSys Conf.","article-title":"Hyperledger fabric","author":"Androulaki","year":"2018"},{"key":"ref11","series-title":"2018 2nd Int. Conf. I-SMAC (IoT in Soc., Mob., Analyt. Cloud)(I-SMAC) I-SMAC (IoT in Soc., Mob., Analyt. Cloud)(I-SMAC), Palladam, India","first-page":"408","article-title":"Blockchain technology in cloud computing to overcome security vulnerabilities","author":"Harshavardhan","year":"2018"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"97","DOI":"10.2299\/jsp.22.97","article-title":"Secure caching scheme by using blockchain for information-centric network-based wireless sensor networks","volume":"22","author":"Mori","year":"2018","journal-title":"J. Signal Process."},{"key":"ref13","series-title":"2020 5th Int. Conf. Innov. Technol. Intell. Syst. Indust. Appl. (CITISIA)","first-page":"1","article-title":"Proposing 2-tier architecture for permission-ed and permission-less blockchain consensus algorithms based on voting system","author":"Khalid","year":"2020"},{"key":"ref14","article-title":"Blockchain and IoT integration: A systematic survey","volume":"18","author":"Panarello","year":"Aug. 6, 2018","journal-title":"Sensors"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1016\/j.future.2018.05.046","article-title":"On blockchain and its integration with IoT. Challenges and opportunities","volume":"88","author":"Reyna","year":"2018","journal-title":"Future Gen. Comput. Syst."},{"key":"ref16","doi-asserted-by":"crossref","first-page":"124","DOI":"10.1016\/j.procs.2022.10.128","article-title":"Use of blockchain in health sensor networks to secure information integrity and accountability","volume":"210","author":"Godawatte","year":"2022","journal-title":"Procedia Comput. Sci."},{"key":"ref17","doi-asserted-by":"crossref","first-page":"3796","DOI":"10.1109\/COMST.2019.2928178","article-title":"A vademecum on blockchain technologies: When, which, and how","volume":"21","author":"Belotti","year":"2019","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"23733","DOI":"10.1109\/ACCESS.2024.3363469","article-title":"Revolutionizing cyber threat detection with large language models: A privacy-preserving BERT-based lightweight model for IoT\/IIoT devices","volume":"12","author":"Ferrag","year":"2024","journal-title":"IEEE Access"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s42786-018-00002-6","article-title":"A survey of blockchain from security perspective","volume":"3","author":"Dasgupta","year":"2019","journal-title":"J. Bank. Financ. Technol."},{"key":"ref20","series-title":"2020 5th Int. Conf. Innov. Technol. Intell. Syst. Indus. Appl. (CITISIA)","first-page":"1","article-title":"Study of security and privacy issues in internet of things","author":"Khalid","year":"2020"},{"key":"ref21","doi-asserted-by":"crossref","unstructured":"P. W. Eklund and R. Beck, \u201cFactors that impact blockchain scalability,\u201d presented at the Proc. 11th Int. Conf. Manag. Digital EcoSystems, 2019.","DOI":"10.1145\/3297662.3365818"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3664287","article-title":"OTI-IoT: A blockchain-based operational threat intelligence framework for multi-vector DDoS attacks","volume":"24","author":"Aguru","year":"2024","journal-title":"ACM Trans. Internet Technol."},{"key":"ref23","doi-asserted-by":"crossref","first-page":"395","DOI":"10.1016\/j.future.2017.11.022","article-title":"IoT security: Review, blockchain solutions, and open challenges","volume":"82","author":"Khan","year":"2018","journal-title":"Future Gener. Comput. Syst."},{"key":"ref24","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2023.109726","article-title":"A survey on role of blockchain for IoT: Applications and technical aspects","volume":"227","author":"Mathur","year":"2023","journal-title":"Comput. Netw."},{"key":"ref25","doi-asserted-by":"crossref","unstructured":"R. Chaganti, B. Bhushan, and V. Ravi, \u201cThe role of blockchain in DDoS attacks mitigation: Techniques, open challenges and future directions,\u201d 2022. doi: 10.48550\/arXiv.2202.03617.","DOI":"10.1016\/j.comcom.2022.10.026"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"96538","DOI":"10.1109\/ACCESS.2022.3205019","article-title":"A comprehensive review of denial of service attacks in blockchain ecosystem and open challenges","volume":"10","author":"Chaganti","year":"2022","journal-title":"IEEE Access"},{"key":"ref27","doi-asserted-by":"crossref","DOI":"10.3390\/electronics11233892","article-title":"A survey of DDoS attack detection techniques for IoT systems using blockchain technology","volume":"11","author":"Khan","year":"2022","journal-title":"Electronics"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"122679","DOI":"10.1109\/ACCESS.2022.3223370","article-title":"Internet of things (IoT) security with blockchain technology: A state-of-the-art review","volume":"10","author":"Ayub Khan","year":"2022","journal-title":"IEEE Access"},{"key":"ref29","first-page":"110","article-title":"The risks of the blockchain a review on current vulnerabilities and attacks","volume":"10","author":"Stefan Unger","year":"2020","journal-title":"J. Intern. Serv. Inform. Secur."},{"key":"ref30","series-title":"2019 Int. Sem. Res. Inform. Technol. Intell. Syst. (ISRITI)","first-page":"228","article-title":"Security issues and vulnerabilities on a blockchainsystem: A review","author":"Kevin Jonathan","year":"2019"},{"key":"ref31","article-title":"Blockchain based solutions to mitigate distributed denial of service (DDoS) attacks in the internet of things (IoT): A survey","volume":"22","author":"Shah","year":"Jan. 31, 2022","journal-title":"Sensors"},{"key":"ref32","doi-asserted-by":"crossref","DOI":"10.3390\/sym13020227","article-title":"Distributed denial of service (DDoS) mitigation using blockchain\u2014A comprehensive insight","volume":"13","author":"Wani","year":"2021","journal-title":"Symmetry"},{"key":"ref33","article-title":"A smart decentralized identifiable distributed ledger technology-based blockchain (DIDLT-BC) model for cloud-IoT security","volume":"127","author":"Selvarajan","journal-title":"Expert. Syst."},{"key":"ref34","doi-asserted-by":"crossref","first-page":"399","DOI":"10.4018\/978-1-6684-7455-6.ch019","author":"Manoharan","year":"2023","journal-title":"Handbook of Research on Blockchain Technology and the Digitalization of the Supply Chain"},{"key":"ref35","doi-asserted-by":"crossref","first-page":"6605","DOI":"10.1109\/ACCESS.2021.3140091","article-title":"Systematic review of security vulnerabilities in ethereum blockchain smart contract","volume":"10","author":"Kushwaha","year":"2022","journal-title":"IEEE Access"},{"key":"ref36","doi-asserted-by":"crossref","DOI":"10.1016\/j.compeleceng.2022.107706","article-title":"A survey on DoS\/DDoS mitigation techniques in SDNs: Classification, comparison, solutions, testing tools and datasets","volume":"99","author":"Alhijawi","year":"2022","journal-title":"Comput. Electr. Eng."},{"key":"ref37","series-title":"2023 IEEE Int. Syst. Conf. (SysCon)","first-page":"1","article-title":"Blockchain health sensor network performance analysis on low powered microcontroller devices","author":"Godawatte","year":"2023"},{"key":"ref38","doi-asserted-by":"crossref","unstructured":"Raspberry Pi Ltd., \u201cRaspberry Pi hardware,\u201d 2016. Accessed: Aug. 17, 2024. [Online]. Available: https:\/\/www.raspberrypi.com\/documentation\/computers\/raspberry-pi.html","DOI":"10.1007\/978-1-4842-2304-8_2"},{"key":"ref39","article-title":"Evaluation of blockchain networks\u2019 scalability limitations in low-powered internet of things (IoT) sensor networks","volume":"15","author":"Arachchige","year":"2023","journal-title":"Fut. Intern."},{"key":"ref40","unstructured":"Orange pi-orangepi, \u201cOrange pi zero 2W\u2013Small, practical, powerful,\u201d 2014. Accessed: Aug. 17, 2024. [Online]. Available: http:\/\/www.orangepi.org\/html\/hardWare\/computer-and-Microcontrollers\/details\/Orange-Pi-Zero-2W.html"},{"key":"ref41","article-title":"Evaluation of correlation between temperature of IoT microcontroller devices and blockchain energy consumption in wireless sensor networks","volume":"23","author":"Arachchige","year":"Jul. 10, 2023","journal-title":"Sensors"},{"key":"ref42","doi-asserted-by":"crossref","DOI":"10.1177\/1550147719875654","article-title":"Efficient and secure attribute-based heterogeneous online\/offline signcryption for body sensor networks based on blockchain","volume":"15","author":"Iqbal","year":"2019","journal-title":"Int. J. Distrib. Sens. Netw."},{"key":"ref43","doi-asserted-by":"crossref","first-page":"4694","DOI":"10.1109\/JIOT.2018.2879679","article-title":"Scalable access management in IoT using blockchain: A performance evaluation","volume":"6","author":"Novo","year":"2019","journal-title":"IEEE Internet Things J."},{"key":"ref44","article-title":"Data storage mechanism based on blockchain with privacy protection in wireless body area network","volume":"19","author":"Ren","year":"May 25, 2019","journal-title":"Sensors"},{"key":"ref45","series-title":"2019 Int. Conf. Inter. Things (iThings) IEEE Green Comput. Commun. (GreenCom) IEEE Cyber, Phys. Soc. Comput. (CPSCom) IEEE Smart Data (SmartData)","first-page":"1154","article-title":"Sensor-chain: A lightweight scalable blockchain framework for internet of things","author":"Shahid","year":"2019"},{"key":"ref46","doi-asserted-by":"crossref","DOI":"10.1016\/j.compeleceng.2019.106525","article-title":"Blockchain and internet of things: A bibliometric study","volume":"81","author":"Kamran","year":"2020","journal-title":"Comput. Elect. Eng."},{"key":"ref47","article-title":"Comparing blockchain standards and recommendations","volume":"12","author":"K\u00f6nig","year":"2020","journal-title":"Fut. Intern."},{"key":"ref48","doi-asserted-by":"crossref","DOI":"10.3390\/su12176960","article-title":"A lightweight authentication and authorization framework for blockchain-enabled IoT network in health-informatics","volume":"12","author":"Tahir","year":"2020","journal-title":"Sustainability"},{"key":"ref49","series-title":"2021 5th Int. Conf. Intell. Comput. Cont. Syst. (ICICCS)","first-page":"268","article-title":"Security threats and solutions to IoT using blockchain: A Review","author":"Alam","year":"2021"},{"key":"ref50","series-title":"2021 17th Int. Conf. Distrib. Comput. Sensor Syst. (DCOSS)","first-page":"503","article-title":"Towards a green blockchain: A review of consensus mechanisms and their energy consumption","author":"Bada","year":"2021"},{"key":"ref51","series-title":"5th Int. Symp. Multidiscip. Stud. Innov. Technol. (ISMSIT)","first-page":"52","article-title":"Solving IoT security and scalability challenges with blockchain","author":"Djonov","year":"2021"},{"key":"ref52","doi-asserted-by":"crossref","DOI":"10.1016\/j.ipm.2021.102535","article-title":"hOCBS: A privacy-preserving blockchain framework for healthcare data leveraging an on-chain and off-chain system design","volume":"58","author":"Miyachi","year":"2021","journal-title":"Inform. Process. Manag."},{"key":"ref53","series-title":"presented at the 2021 5th Int. Conf. Comput. Methodol. Commun. (ICCMC)","article-title":"A blockchain based framework for IoT security","author":"Premkumar","year":"2021"},{"key":"ref54","series-title":"2021 16th Int. Conf. Eng. Modern Electric Syst. (EMES)","first-page":"1","article-title":"Issues related to the use of blockchains in IoT applications","author":"Vari-Kakas","year":"2021"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.techscience.com\/cmc\/v81n3\/59070\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,7]],"date-time":"2025-03-07T06:14:40Z","timestamp":1741328080000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v81n3\/59070"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":54,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2024]]},"published-print":{"date-parts":[[2024]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2024.059378","relation":{},"ISSN":["1546-2226"],"issn-type":[{"type":"electronic","value":"1546-2226"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"2024-10-06","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-11-20","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-12-19","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}