{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T15:29:14Z","timestamp":1774538954864,"version":"3.50.1"},"reference-count":194,"publisher":"Tech Science Press","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.063304","type":"journal-article","created":{"date-parts":[[2025,4,7]],"date-time":"2025-04-07T05:03:50Z","timestamp":1744002230000},"page":"1561-1605","source":"Crossref","is-referenced-by-count":7,"title":["Blockchain Integration in IoT: Applications, Opportunities, and Challenges"],"prefix":"10.32604","volume":"83","author":[{"given":"Mozhgan","family":"Gholami","sequence":"first","affiliation":[]},{"given":"Ali","family":"Ghaffari","sequence":"additional","affiliation":[]},{"given":"Nahideh","family":"Derakhshanfard","sequence":"additional","affiliation":[]},{"given":"Nadir","family":"iBRAHIMO\u011eLU","sequence":"additional","affiliation":[]},{"given":"Ali Asghar Pourhaji","family":"Kazem","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"100227","DOI":"10.1016\/j.iot.2020.100227","article-title":"Survey on IoT security: challenges and solution using machine learning, artificial intelligence and blockchain technology","volume":"11","author":"Mohanta","year":"2020","journal-title":"Internet Things"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"2673","DOI":"10.1007\/s10586-023-04102-x","article-title":"Intrusion detection in Internet of Things using improved binary golden jackal optimization algorithm and LSTM","volume":"27","author":"Hanafi","year":"2024","journal-title":"Clust Comput"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"1775","DOI":"10.1007\/s10586-023-04041-7","article-title":"Task and resource allocation in the Internet of Things based on an improved version of the moth-flame optimization algorithm","volume":"27","author":"Nematollahi","year":"2024","journal-title":"Clust Comput"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"545","DOI":"10.1007\/s11760-023-02761-2","volume":"18","author":"Nematollahi","year":"2024","journal-title":"Signal Image Video Process"},{"key":"ref5","first-page":"2716","article-title":"Improving security: blockchain based IoT solutions for the healthcare","volume":"102","author":"Pavithra","year":"2024","journal-title":"J Theor Appl Inform Technol"},{"key":"ref6","series-title":"2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData)","first-page":"670","article-title":"Integration of cloud computing with Internet of Things: challenges and open issues","author":"Atlam","year":"2017 Jun 21\u201323"},{"key":"ref7","series-title":"2023 International Conference on Innovations in Engineering and Technology (ICIET)","first-page":"1","article-title":"A comprehensive survey on the IoT-based electronic healthcare records security, privacy issues, and countermeasures using blockchain technology","author":"Kala","year":"2023 Jul 13\u201314"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1109\/MNET.2024.3413543","article-title":"Intelligent sensing, communication, computation, and caching for satellite-ground integrated networks","volume":"38","author":"Gong","year":"2024","journal-title":"IEEE Netw"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"e4678","DOI":"10.1002\/dac.4678","article-title":"Internet of Things architecture challenges: a systematic review","volume":"34","author":"Samizadeh Nikoui","year":"2021","journal-title":"Int J Communication"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"7083","DOI":"10.1007\/s10586-024-04357-y","article-title":"IoT-based eHealth using blockchain technology: a survey","volume":"27","author":"Allam","year":"2024","journal-title":"Clust Comput"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"9065","DOI":"10.1007\/s10586-024-04509-0","article-title":"Securing internet of things using machine and deep learning methods: a survey","volume":"27","author":"Ghaffari","year":"2024","journal-title":"Clust Comput"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"8367","DOI":"10.1007\/s10586-024-04436-0","article-title":"Enhancing IoT security: a collaborative framework integrating federated learning, dense neural networks, and blockchain","volume":"27","author":"Nazir","year":"2024","journal-title":"Clust Comput"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.jpdc.2022.12.009","article-title":"Anomaly-based intrusion detection system in the Internet of Things using a convolutional neural network and multi-objective enhanced Capuchin Search Algorithm","volume":"175","author":"Asgharzadeh","year":"2023","journal-title":"J Parallel Distrib Comput"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"104747","DOI":"10.1016\/j.micpro.2022.104747","article-title":"Towards developing a machine learning-metaheuristic-enhanced energy-sensitive routing framework for the Internet of Things","volume":"96","author":"Seyfollahi","year":"2023","journal-title":"Microprocess Microsyst"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"2658","DOI":"10.1007\/s42235-024-00575-7","volume":"21","author":"Asgharzadeh","year":"2024","journal-title":"J Bionic Eng"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"29628","DOI":"10.1109\/JIOT.2024.3393927","article-title":"Scalable creditable-committee-based blockchain consensus protocol for multihop wireless networks","volume":"11","author":"Zhang","year":"2024","journal-title":"IEEE Internet Things J"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"2033","DOI":"10.1007\/s12652-020-02303-5","article-title":"Improving the security of Internet of Things using cryptographic algorithms: a case of smart irrigation systems","volume":"12","author":"Mousavi","year":"2021","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"1713","DOI":"10.1007\/s11277-020-07758-5","article-title":"Security of Internet of Things using RC4 and ECC algorithms (case study: smart irrigation systems)","volume":"116","author":"Mousavi","year":"2021","journal-title":"Wirel Pers Commun"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"8414503","DOI":"10.1155\/2021\/8414503","article-title":"A review of intrusion detection systems in RPL routing protocol based on machine learning for Internet of Things applications","volume":"2021","author":"Seyfollahi","year":"2021","journal-title":"Wirel Commun Mob Comput"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"9463","DOI":"10.1109\/JIOT.2020.2996590","article-title":"A deep blockchain framework-enabled collaborative intrusion detection for protecting IoT and cloud networks","volume":"8","author":"Alkadi","year":"2021","journal-title":"IEEE Internet Things J"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"2575","DOI":"10.3390\/s18082575","article-title":"Blockchain and IoT integration: a systematic survey","volume":"18","author":"Panarello","year":"2018","journal-title":"Sensors"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"4273","DOI":"10.1007\/s12652-020-01708-6","volume":"11","author":"Jazebi","year":"2020","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"1886","DOI":"10.1007\/s12083-020-00933-2","article-title":"Reliable data dissemination for the Internet of Things using Harris Hawks optimization","volume":"13","author":"Seyfollahi","year":"2020","journal-title":"Peer Peer Netw Appl"},{"key":"ref24","first-page":"102945","article-title":"Data cryptography in the Internet of Things using the artificial bee colony algorithm in a smart irrigation system","volume":"61","author":"Mousavi","year":"2021","journal-title":"J Inf Secur Appl"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"95","DOI":"10.7160\/aol.2022.140108","article-title":"Smart agricultural decision support systems for predicting soil nutrition value using IoT and ridge regression","volume":"14","author":"Sudha","year":"2022","journal-title":"Agris Line Pap Econ Inform"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"7155","DOI":"10.1109\/TII.2020.3042872","article-title":"Dynamic network function provisioning to enable network in box for industrial applications","volume":"17","author":"Sun","year":"2021","journal-title":"IEEE Trans Ind Inform"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"115","DOI":"10.3390\/network3010006","article-title":"IoT and blockchain integration: applications, opportunities, and challenges","volume":"3","author":"Adhikari","year":"2023","journal-title":"Network"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"103801","DOI":"10.1016\/j.compind.2022.103801","article-title":"Secure intelligent fuzzy blockchain framework: effective threat detection in IoT networks","volume":"144","author":"Yazdinejad","year":"2023","journal-title":"Comput Ind"},{"key":"ref29","doi-asserted-by":"crossref","unstructured":"Yaga D, Mell P, Roby N, Scarfone K. Blockchain technology overview. arXiv:1906.11078. 2019.","DOI":"10.6028\/NIST.IR.8202"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"5372","DOI":"10.1109\/TNET.2024.3462539","article-title":"Symbiotic blockchain consensus: cognitive backscatter communications-enabled wireless blockchain consensus","volume":"32","author":"Luo","year":"2024","journal-title":"IEEE\/ACM Trans Netw"},{"key":"ref31","doi-asserted-by":"crossref","first-page":"1152","DOI":"10.1007\/s11227-016-1870-0","article-title":"Blockchain-based secure firmware update for embedded devices in an Internet of Things environment","volume":"73","author":"Lee","year":"2017","journal-title":"J Supercomput"},{"key":"ref32","first-page":"e4","article-title":"Machine learning in computer vision: a review","volume":"8","author":"Khan","year":"2021","journal-title":"EAI Endorsed Transact Scal Inform Syst"},{"key":"ref33","doi-asserted-by":"crossref","first-page":"2351","DOI":"10.1109\/COMST.2021.3106669","article-title":"A survey of honeypots and honeynets for Internet of Things, industrial Internet of Things, and cyber-physical systems","volume":"23","author":"Franco","year":"2021","journal-title":"IEEE Commun Surv Tutor"},{"key":"ref34","doi-asserted-by":"crossref","first-page":"10430","DOI":"10.1109\/JIOT.2021.3057419","article-title":"Differential privacy for industrial Internet of Things: opportunities, applications, and challenges","volume":"8","author":"Jiang","year":"2021","journal-title":"IEEE Internet Things J"},{"key":"ref35","doi-asserted-by":"crossref","first-page":"10917","DOI":"10.3390\/app112210917","article-title":"Educational blockchain: a secure degree attestation and verification traceability architecture for higher education commission","volume":"11","author":"Ayub Khan","year":"2021","journal-title":"Appl Sci"},{"key":"ref36","doi-asserted-by":"crossref","first-page":"6001","DOI":"10.1016\/j.aej.2021.11.023","article-title":"A survey on blockchain for industrial Internet of Things","volume":"61","author":"Kumar","year":"2022","journal-title":"Alex Eng J"},{"key":"ref37","doi-asserted-by":"crossref","first-page":"e4137","DOI":"10.1002\/ett.4137","article-title":"Enabling security for the Industrial Internet of Things using deep learning, blockchain, and coalitions","volume":"32","author":"Sharma","year":"2021","journal-title":"Trans Emerging Tel Tech"},{"key":"ref38","doi-asserted-by":"crossref","first-page":"2079","DOI":"10.1007\/s11277-023-10226-5","article-title":"A review on blockchain and IoT integration from energy, security and hardware perspectives","volume":"129","author":"Abed","year":"2023","journal-title":"Wirel Pers Commun"},{"key":"ref39","doi-asserted-by":"crossref","first-page":"68","DOI":"10.1109\/MITP.2017.3051335","article-title":"Can blockchain strengthen the Internet of Things?","volume":"19","author":"Kshetri","year":"2017","journal-title":"IT Profess"},{"key":"ref40","doi-asserted-by":"crossref","first-page":"54478","DOI":"10.1109\/ACCESS.2021.3070555","article-title":"A survey on the integration of blockchain with IoT to enhance performance and eliminate challenges","volume":"9","author":"Al Sadawi","year":"2021","journal-title":"IEEE Access"},{"key":"ref41","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1016\/j.future.2018.05.046","article-title":"On blockchain and its integration with IoT. Challenges and opportunities","volume":"88","author":"Reyna","year":"2018","journal-title":"Future Gener Comput Syst"},{"key":"ref42","doi-asserted-by":"crossref","first-page":"8076","DOI":"10.1109\/JIOT.2019.2920987","article-title":"Blockchain for internet of things: a survey","volume":"6","author":"Dai","year":"2019","journal-title":"IEEE Internet Things J"},{"key":"ref43","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1016\/j.comcom.2019.01.006","article-title":"Survey on blockchain for Internet of Things","volume":"136","author":"Wang","year":"2019","journal-title":"Comput Commun"},{"key":"ref44","doi-asserted-by":"crossref","first-page":"69765","DOI":"10.1109\/ACCESS.2024.3378592","article-title":"A survey on addressing IoT security issues by embedding blockchain technology solutions: review, attacks, current trends, and applications","volume":"12","author":"Huan","year":"2024","journal-title":"IEEE Access"},{"key":"ref45","doi-asserted-by":"crossref","first-page":"101187","DOI":"10.1016\/j.iot.2024.101187","article-title":"IoT convergence with machine learning & blockchain: a review","volume":"26","author":"Fazel","year":"2024","journal-title":"Internet Things"},{"key":"ref46","doi-asserted-by":"crossref","first-page":"98856","DOI":"10.1109\/ACCESS.2024.3428490","article-title":"Securing blockchain-based IoT systems: a review","volume":"12","author":"Commey","year":"2024","journal-title":"IEEE Access"},{"key":"ref47","doi-asserted-by":"crossref","first-page":"10452","DOI":"10.1109\/JIOT.2021.3060508","article-title":"Embedding blockchain technology into IoT for security: a survey","volume":"8","author":"Xu","year":"2021","journal-title":"IEEE Internet Things J"},{"key":"ref48","doi-asserted-by":"crossref","first-page":"102669","DOI":"10.1016\/j.cose.2022.102669","article-title":"IoT security certifications: challenges and potential approaches","volume":"116","author":"Cirne","year":"2022","journal-title":"Comput Secur"},{"key":"ref49","doi-asserted-by":"crossref","first-page":"251","DOI":"10.1016\/j.jnca.2018.10.019","article-title":"Blockchain\u2019s adoption in IoT: the challenges, and a way forward","volume":"125","author":"Makhdoom","year":"2019","journal-title":"J Netw Comput Appl"},{"key":"ref50","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1007\/s43926-024-00084-3","article-title":"Internet of Things: a comprehensive overview, architectures, applications, simulation tools, challenges and future directions","volume":"4","author":"Choudhary","year":"2024","journal-title":"Discov Internet Things"},{"key":"ref51","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1016\/j.jnca.2016.01.010","article-title":"State-of-the-art, challenges, and open issues in the integration of Internet of Things and cloud computing","volume":"67","author":"D\u00edaz","year":"2016","journal-title":"J Netw Comput Appl"},{"key":"ref52","doi-asserted-by":"crossref","first-page":"1273","DOI":"10.1109\/TITS.2024.3488741","article-title":"CALRA: practical conditional anonymous and leakage-resilient authentication scheme for vehicular crowdsensing communication","volume":"26","author":"Xiao","year":"2025","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"ref53","doi-asserted-by":"crossref","first-page":"6407","DOI":"10.1109\/TIE.2023.3288188","article-title":"Measurement quality control aided multisensor system for improved vehicle navigation in urban areas","volume":"71","author":"Wang","year":"2023","journal-title":"IEEE Trans Ind Electron"},{"key":"ref54","doi-asserted-by":"crossref","first-page":"615","DOI":"10.1016\/j.procs.2020.07.089","article-title":"Blockchain and smart healthcare security: a survey","volume":"175","author":"Tariq","year":"2020","journal-title":"Procedia Comput Sci"},{"key":"ref55","doi-asserted-by":"crossref","first-page":"1556","DOI":"10.1016\/j.foodcont.2016.11.019","article-title":"Improving traceability and transparency of table grapes cold chain logistics by integrating WSN and correlation analysis","volume":"73","author":"Xiao","year":"2017","journal-title":"Food Contr"},{"key":"ref56","doi-asserted-by":"crossref","first-page":"2530","DOI":"10.1109\/JIOT.2024.3468443","article-title":"A model value transfer incentive mechanism for federated learning with smart contracts in AIoT","volume":"12","author":"Xu","year":"2024","journal-title":"IEEE Internet Things J"},{"key":"ref57","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1109\/TMC.2017.2702613","article-title":"An efficient prediction-based user recruitment for mobile crowdsensing","volume":"17","author":"Wang","year":"2018","journal-title":"IEEE Trans Mob Comput"},{"key":"ref58","series-title":"Proceedings of the 21st Annual International Conference on Mobile Systems, Applications and Services (MobiSys\u2019 23)","first-page":"610","article-title":"Demo: scalable digital twin system for mobile networks with generative AI","author":"Gong","year":"2023"},{"key":"ref59","series-title":"2018 IEEE 23rd International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)","first-page":"1","article-title":"A smart unstaffed retail shop based on artificial intelligence and IoT","author":"Liu","year":"2018 Sep 17\u201319"},{"key":"ref60","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1016\/j.iot.2018.11.003","article-title":"Securing the Internet of Things: challenges, threats and solutions","volume":"5","author":"Radoglou Grammatikis","year":"2019","journal-title":"Internet Things"},{"key":"ref61","doi-asserted-by":"crossref","first-page":"12935","DOI":"10.1109\/TII.2024.3431020","volume":"20","author":"Li","year":"2024","journal-title":"IEEE Trans Ind Inform"},{"key":"ref62","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1109\/TSMC.2018.2884289","article-title":"An anonymous off-blockchain micropayments scheme for cryptocurrencies in the real world","volume":"50","author":"Zhang","year":"2020","journal-title":"IEEE Trans Syst Man Cybern Syst"},{"key":"ref63","doi-asserted-by":"crossref","first-page":"1250","DOI":"10.1109\/JIOT.2017.2694844","article-title":"A survey on security and privacy issues in Internet-of-things","volume":"4","author":"Yang","year":"2017","journal-title":"IEEE Internet Things J"},{"key":"ref64","series-title":"2024 IEEE World AI IoT Congress (AIIoT)","first-page":"605","article-title":"A comprehensive systematic review of blockchain-based intrusion detection systems","author":"Adele","year":"2024 May 29\u201331"},{"key":"ref65","doi-asserted-by":"crossref","first-page":"9708","DOI":"10.1109\/TMC.2024.3368331","volume":"23","author":"Jiang","year":"2024","journal-title":"IEEE Trans Mob Comput"},{"key":"ref66","doi-asserted-by":"crossref","first-page":"71907","DOI":"10.1109\/ACCESS.2019.2919760","article-title":"Secure firmware updates for constrained IoT devices using open standards: a reality check","volume":"7","author":"Zandberg","year":"2019","journal-title":"IEEE Access"},{"key":"ref67","doi-asserted-by":"crossref","first-page":"2190","DOI":"10.1109\/TII.2023.3280337","article-title":"A multihead attention self-supervised representation model for industrial sensors anomaly detection","volume":"20","author":"Qiao","year":"2024","journal-title":"IEEE Trans Ind Inform"},{"key":"ref68","doi-asserted-by":"crossref","first-page":"e00151","DOI":"10.1016\/j.jbvi.2019.e00151","article-title":"Blockchain disruption and decentralized finance: the rise of decentralized business models","volume":"13","author":"Chen","year":"2020","journal-title":"J Bus Ventur Insights"},{"key":"ref69","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1007\/s11276-020-02445-6","article-title":"Unification of blockchain and Internet of Things (BIoT): requirements, working model, challenges and future directions","volume":"27","author":"Bhushan","year":"2021","journal-title":"Wirel Netw"},{"key":"ref70","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1109\/MNET.001.1900103","article-title":"Blockchain for managing heterogeneous Internet of Things: a perspective architecture","volume":"34","author":"Tseng","year":"2020","journal-title":"IEEE Netw"},{"key":"ref71","doi-asserted-by":"crossref","first-page":"106897","DOI":"10.1016\/j.compeleceng.2020.106897","article-title":"Untangling blockchain technology: a survey on state of the art, security threats, privacy services, applications and future research directions","volume":"90","author":"Bhushan","year":"2021","journal-title":"Comput Electr Eng"},{"key":"ref72","first-page":"140","article-title":"Blockchain based redistricting with public participation","volume":"13","author":"Ramkumar","year":"2022","journal-title":"J Inf Secur"},{"key":"ref73","series-title":"Proceedings First International Conference on Peer-to-Peer Computing","first-page":"101","article-title":"A definition of peer-to-peer networking for the classification of peer-to-peer architectures and applications","author":"Schollmeier","year":"2001 Aug 27\u201329"},{"key":"ref74","doi-asserted-by":"crossref","first-page":"21656","DOI":"10.1109\/JIOT.2023.3317639","volume":"10","author":"Yang","year":"2023","journal-title":"IEEE Internet Things J"},{"key":"ref75","doi-asserted-by":"crossref","first-page":"4377","DOI":"10.1007\/s10115-024-02117-3","article-title":"Enhancing trust and privacy in distributed networks: a comprehensive survey on blockchain-based federated learning","volume":"66","author":"Liu","year":"2024","journal-title":"Knowl Inf Syst"},{"key":"ref76","doi-asserted-by":"crossref","first-page":"1676","DOI":"10.1109\/COMST.2018.2886932","article-title":"Applications of blockchains in the Internet of Things: a comprehensive survey","volume":"21","author":"Ali","year":"2018","journal-title":"IEEE Commun Surv Tutor"},{"key":"ref77","doi-asserted-by":"crossref","first-page":"381","DOI":"10.1007\/s12599-017-0505-1","article-title":"Blockchain technology in business and information systems research","volume":"59","author":"Beck","year":"2017","journal-title":"Bus Inf Syst Eng"},{"key":"ref78","author":"Hofmann","year":"2017","journal-title":"Supply chain finance and blockchain technology: the case of reverse securitisation"},{"key":"ref79","doi-asserted-by":"crossref","first-page":"2292","DOI":"10.1109\/ACCESS.2016.2566339","article-title":"Blockchains and smart contracts for the Internet of Things","volume":"4","author":"Christidis","year":"2016","journal-title":"IEEE Access"},{"key":"ref80","doi-asserted-by":"crossref","first-page":"778","DOI":"10.1109\/TC.2023.3343102","article-title":"Blockchain-based distributed multiagent reinforcement learning for collaborative multiobject tracking framework","volume":"73","author":"Shen","year":"2024","journal-title":"IEEE Trans Comput"},{"key":"ref81","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1109\/TMC.2024.3455417","article-title":"Blockchain-aided digital twin offloading mechanism in space-air-ground networks","volume":"24","author":"Gong","year":"2025","journal-title":"IEEE Trans Mob Comput"},{"key":"ref82","doi-asserted-by":"crossref","first-page":"17416","DOI":"10.1109\/TVT.2024.3417689","article-title":"A blockchain-enabled framework for vehicular data sensing: enhancing information freshness","volume":"73","author":"Liu","year":"2024","journal-title":"IEEE Trans Veh Technol"},{"key":"ref83","doi-asserted-by":"crossref","first-page":"110460","DOI":"10.1016\/j.comnet.2024.110460","article-title":"A seamless authentication for intra and inter metaverse platforms using blockchain","volume":"247","author":"Jebri","year":"2024","journal-title":"Comput Netw"},{"key":"ref84","first-page":"38","article-title":"The new trend of the integration of artificial intelligence and blockchain in network security","volume":"7","author":"Wen","year":"2024","journal-title":"Acad J Comput Inf Sci"},{"key":"ref85","doi-asserted-by":"crossref","first-page":"5340","DOI":"10.1109\/TCE.2024.3426101","article-title":"Blockchain-enabled distributed identity-based ring signature with identity abort for consumer electronics","volume":"70","author":"Xiong","year":"2024","journal-title":"IEEE Trans Consum Electron"},{"key":"ref86","series-title":"2024 3rd International Conference on Power Electronics and IoT Applications in Renewable Energy and Its Control (PARC)","first-page":"86","article-title":"Enhancing Blockchain Security through quantum key distribution and evaluating QKD network in QKDNetSim environment","author":"Singh","year":"2024 Feb 23\u201324"},{"key":"ref87","series-title":"2017 26th International Conference on Computer Communication and Networks (ICCCN)","first-page":"1","article-title":"Performance analysis of private blockchain platforms in varying workloads","author":"Pongnumkul","year":"2017 Jul 31\u2013Aug 3"},{"key":"ref88","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1007\/s10586-020-03137-8","article-title":"A survey on boosting IoT security and privacy through blockchain","volume":"24","author":"Alfandi","year":"2021","journal-title":"Clust Comput"},{"key":"ref89","doi-asserted-by":"crossref","unstructured":"Saad M, Spaulding J, Njilla L, Kamhoua C, Shetty S, Nyang D, et al. Exploring the attack surface of blockchain: a systematic overview. arXiv:1904.03487. 2019.","DOI":"10.1002\/9781119519621.ch3"},{"key":"ref90","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3372136","article-title":"A survey of IoT applications in blockchain systems","volume":"53","author":"Lao","year":"2021","journal-title":"ACM Comput Surv"},{"key":"ref91","series-title":"2017 17th IEEE\/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID)","first-page":"468","article-title":"ProvChain: a blockchain-based data provenance architecture in cloud environment with enhanced privacy and availability","author":"Liang","year":"2017 May 14\u201317"},{"key":"ref92","first-page":"101969","article-title":"Boundary conditions for traceability in food supply chains using blockchain technology","volume":"52","author":"Behnke","year":"2020","journal-title":"Int J Inf Manag"},{"key":"ref93","first-page":"102136","article-title":"Permissionless and permissioned blockchain diffusion","volume":"54","author":"Helliar","year":"2020","journal-title":"Int J Inf Manag"},{"key":"ref94","doi-asserted-by":"crossref","first-page":"A19","DOI":"10.2308\/ciia-52540","article-title":"How will blockchain technology impact auditing and accounting: permissionless versus permissioned blockchain","volume":"13","author":"Liu","year":"2019","journal-title":"Curr Issues Auditing"},{"key":"ref95","unstructured":"Staples M, Chen S, Falamaki S, Ponomarev A, Rimba P, Tran A, et al. Risks and opportunities for systems using blockchain and smart contracts. Data61. Sydney, NSW, Austrilia: CSIRO. Report number: EP175103. 2017."},{"key":"ref96","doi-asserted-by":"crossref","first-page":"229","DOI":"10.1016\/j.icte.2020.09.002","article-title":"Permissioned blockchain frameworks in the industry: a comparison","volume":"7","author":"Polge","year":"2021","journal-title":"ICT Express"},{"key":"ref97","series-title":"Proceedings of the 2021 International Conference on Management of Data","first-page":"2813","article-title":"Permissioned blockchains: properties, techniques and applications","author":"Amiri","year":"2021"},{"key":"ref98","doi-asserted-by":"crossref","unstructured":"Ahsan MS, Pathan A-SK. The state-of-the-art access control models in IoT: a survey on the requirements, scale, and future challenges. 2024. doi:10.2139\/ssrn.4907677.","DOI":"10.2139\/ssrn.4907677"},{"key":"ref99","unstructured":"Maroufi M, Abdolee R, Tazekand BM. On the convergence of blockchain and Internet of Things (IoT) technologies. arXiv:1904.01936. 2019."},{"key":"ref100","doi-asserted-by":"crossref","first-page":"105476","DOI":"10.1016\/j.compag.2020.105476","article-title":"Integrating blockchain and the Internet of Things in precision agriculture: analysis, opportunities, and challenges","volume":"178","author":"Torky","year":"2020","journal-title":"Comput Electron Agric"},{"key":"ref101","series-title":"2018 4th International Conference on Big Data Innovations and Applications (Innovate-Data)","first-page":"71","article-title":"Authentication and encryption for a robotic ad hoc network using identity-based cryptography","author":"Su\u00e1rez-Armas","year":"2018 Aug 6\u20138"},{"key":"ref102","doi-asserted-by":"crossref","first-page":"7007","DOI":"10.3390\/app14167007","article-title":"Enhancing decentralized decision-making with big data and blockchain technology: a comprehensive review","volume":"14","author":"Theodorakopoulos","year":"2024","journal-title":"Appl Sci"},{"key":"ref103","article-title":"Blockchain-based Security Solutions for the Internet of Things (IoT)","author":"Potter","journal-title":"EasyChair"},{"key":"ref104","doi-asserted-by":"crossref","first-page":"100067","DOI":"10.1016\/j.bcra.2022.100067","article-title":"A survey on blockchain technology and its security","volume":"3","author":"Guo","year":"2022","journal-title":"Blockchain Res Appl"},{"key":"ref105","doi-asserted-by":"crossref","first-page":"35","DOI":"10.3390\/fi15010035","article-title":"Redactable blockchain: comprehensive review, mechanisms, challenges, open issues and future research directions","volume":"15","author":"Abd Ali","year":"2023","journal-title":"Future Internet"},{"key":"ref106","series-title":"International Workshop on Open Problems in Network Security (iNetSec)","first-page":"112","article-title":"The quest for scalable blockchain fabric: proof-of-work vs. BFT replication","author":"Vukoli\u0107","year":"2015 Oct"},{"key":"ref107","doi-asserted-by":"crossref","first-page":"86127","DOI":"10.1109\/ACCESS.2022.3198656","article-title":"A comprehensive survey on vehicular networking: communications, applications, challenges, and upcoming research directions","volume":"10","author":"Hussein","year":"2022","journal-title":"IEEE Access"},{"key":"ref108","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/MSP.2018.3111245","article-title":"Blockchain access privacy: challenges and directions","volume":"16","author":"Henry","year":"2018","journal-title":"IEEE Secur Priv"},{"key":"ref109","author":"Antonopoulos","year":"2018","journal-title":"Mastering ethereum: building smart contracts and dapps"},{"key":"ref110","doi-asserted-by":"crossref","first-page":"2266","DOI":"10.1109\/TSMC.2019.2895123","article-title":"Blockchain-enabled smart contracts: architecture, applications, and future trends","volume":"49","author":"Wang","year":"2019","journal-title":"IEEE Trans Syst Man Cybern Syst"},{"key":"ref111","series-title":"2023 5th International Conference on Inventive Research in Computing Applications (ICIRCA)","first-page":"1283","article-title":"Application and issues of blockchain technology","author":"Dhami","year":"2023 Aug 3\u20135"},{"key":"ref112","doi-asserted-by":"crossref","first-page":"100264","DOI":"10.1016\/j.joitmc.2024.100264","article-title":"Influential factors for a secure perception of accounting management with blockchain technology","volume":"10","author":"Abad-Segura","year":"2024","journal-title":"J Open Innov Technol Mark Complex"},{"key":"ref113","series-title":"2023 2nd International Conference for Innovation in Technology (INOCON)","first-page":"1","article-title":"A comprehensive study on blockchain: transforming the world","author":"Thakur","year":"2023 Mar 3\u20135"},{"key":"ref114","series-title":"White paper","first-page":"1","article-title":"Plasma: scalable autonomous smart contracts","author":"Poon","year":"2017 Aug"},{"key":"ref115","doi-asserted-by":"crossref","first-page":"673","DOI":"10.1016\/j.bushor.2021.02.019","article-title":"How blockchain will transform the healthcare ecosystem","volume":"64","author":"Sharma","year":"2021","journal-title":"Bus Horiz"},{"key":"ref116","doi-asserted-by":"crossref","first-page":"100233","DOI":"10.1016\/j.hcc.2024.100233","article-title":"Review of data security within energy blockchain: a comprehensive analysis of storage, management, and utilization","volume":"4","author":"He","year":"2024","journal-title":"High Confid Comput"},{"key":"ref117","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1109\/MNET.011.2000202","article-title":"Blockchain-empowered drone networks: architecture, features, and future","volume":"35","author":"Chang","year":"2021","journal-title":"IEEE Netw"},{"key":"ref118","doi-asserted-by":"crossref","first-page":"61642","DOI":"10.1109\/ACCESS.2024.3393567","article-title":"A survey on key agreement and authentication protocol for Internet of Things application","volume":"12","author":"Hasan","year":"2024","journal-title":"IEEE Access"},{"key":"ref119","series-title":"Proceedings of the 16th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services","first-page":"190","article-title":"A trust architecture for blockchain in IoT","author":"Dedeoglu","year":"2019"},{"key":"ref120","doi-asserted-by":"crossref","first-page":"2440","DOI":"10.1109\/TIFS.2020.2969565","article-title":"DCAP: a secure and efficient decentralized conditional anonymous payment system based on blockchain","volume":"15","author":"Lin","year":"2020","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"ref121","series-title":"2018 Crypto Valley Conference on Blockchain Technology (CVCBT)","first-page":"45","article-title":"Do you need a blockchain?","author":"W\u00fcst","year":"2018 Jun 20\u201322"},{"key":"ref122","article-title":"Integration of blockchain with the Internet of things: a systematic review","author":"Ahmed","year":"2022 Nov 6","journal-title":"ScienceOpen Preprints"},{"key":"ref123","doi-asserted-by":"crossref","first-page":"180","DOI":"10.1016\/j.jpdc.2019.08.005","article-title":"LSB: a lightweight scalable blockchain for IoT security and anonymity","volume":"134","author":"Dorri","year":"2019","journal-title":"J Parallel Distrib Comput"},{"key":"ref124","doi-asserted-by":"crossref","first-page":"1295","DOI":"10.1109\/TCSS.2019.2913165","article-title":"Application of blockchain in collaborative Internet-of-things services","volume":"6","author":"Xu","year":"2019","journal-title":"IEEE Trans Comput Soc Syst"},{"key":"ref125","doi-asserted-by":"crossref","first-page":"101878","DOI":"10.1109\/ACCESS.2024.3404656","article-title":"BBAD: blockchain-backed assault detection for cyber physical systems","volume":"12","author":"Anwar","year":"2024","journal-title":"IEEE Access"},{"key":"ref126","doi-asserted-by":"crossref","first-page":"e38917","DOI":"10.1016\/j.heliyon.2024.e38917","article-title":"Enhancing data security and privacy in energy applications: integrating IoT and blockchain technologies","volume":"10","author":"Rai","year":"2024","journal-title":"Heliyon"},{"key":"ref127","unstructured":"Bahga A. Blockchain platform for industrial internet of things. Wuhan, China: Scientific Research Publishing; 2016. Report No.: 1945\u20133124."},{"key":"ref128","series-title":"2017 19th International Conference on Advanced Communication Technology (ICACT)","first-page":"464","article-title":"Managing IoT devices using blockchain platform","author":"Huh","year":"2017 Feb 19\u201322"},{"key":"ref129","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1109\/MCOM.2017.1700041","article-title":"DistBlockNet: a distributed blockchains-based secure SDN architecture for IoT networks","volume":"55","author":"Sharma","year":"2017","journal-title":"IEEE Commun Mag"},{"key":"ref130","doi-asserted-by":"crossref","first-page":"2103","DOI":"10.1109\/JIOT.2018.2869847","article-title":"Internet of Things (IoT) cybersecurity research: a review of current research topics","volume":"6","author":"Lu","year":"2019","journal-title":"IEEE Internet Things J"},{"key":"ref131","unstructured":"Gan S. An IoT simulator in NS3 and a key-based authentication architecture for IoT devices using blockchain [master\u2019s thesis]. Kanpur, India: Indian Institute of Technology; 2017."},{"key":"ref132","doi-asserted-by":"crossref","first-page":"395","DOI":"10.1016\/j.future.2017.11.022","article-title":"IoT security: review, blockchain solutions, and open challenges","volume":"82","author":"Khan","year":"2018","journal-title":"Future Gener Comput Syst"},{"key":"ref133","series-title":"2014 International Conference on Future Internet of Things and Cloud","first-page":"464","article-title":"Fog computing and smart gateway based communication for cloud of things","author":"Aazam","year":"2014 Aug 27\u201329"},{"key":"ref134","doi-asserted-by":"crossref","first-page":"285","DOI":"10.3390\/electronics9020285","article-title":"An attribute-based collaborative access control scheme using blockchain for IoT devices","volume":"9","author":"Zhang","year":"2020","journal-title":"Electronics"},{"key":"ref135","series-title":"Proceedings of the 1st International Conference on Advanced Information Science and System","first-page":"1","article-title":"A blockchain Internet of Things data integrity detection model","author":"Wu","year":"2019"},{"key":"ref136","unstructured":"Baars D. Towards self-sovereign identity using blockchain technology [master\u2019s thesis]. Enschede, The Netherland: University of Twente; 2016."},{"key":"ref137","series-title":"2017 IEEE Conference on Energy Internet and Energy System Integration (EI2)","first-page":"1","article-title":"Applying blockchain technology to decentralized operation in future energy Internet","author":"Yang","year":"2017 Nov 26\u201328"},{"key":"ref138","doi-asserted-by":"crossref","first-page":"150","DOI":"10.1007\/978-3-319-94370-1_11","author":"Ourad","year":"2018","journal-title":"Internet of Things\u2013ICIOT 2018"},{"key":"ref139","series-title":"2016 IEEE 18th International Conference on High Performance Computing and Communications; IEEE 14th International Conference on Smart City; IEEE 2nd International Conference on Data Science and Systems (HPCC\/SmartCity\/DSS)","first-page":"1392","article-title":"Securing smart cities using blockchain technology","author":"Biswas","year":"2016 Dec 12\u201314"},{"key":"ref140","series-title":"2015 IEEE Security and Privacy Workshops","first-page":"180","article-title":"Decentralizing privacy: using blockchain to protect personal data","author":"Zyskind","year":"2015 May 21\u201322"},{"key":"ref141","doi-asserted-by":"crossref","first-page":"1027","DOI":"10.1016\/j.telpol.2017.09.003","article-title":"Blockchain\u2019s roles in strengthening cybersecurity and protecting privacy","volume":"41","author":"Kshetri","year":"2017","journal-title":"Telecommun Policy"},{"key":"ref142","series-title":"2019 Crypto Valley Conference on Blockchain Technology (CVCBT)","first-page":"82","article-title":"A blockchain proxy for lightweight IoT devices","author":"Dittmann","year":"2019 Jun 24\u201326"},{"key":"ref143","series-title":"2019 21st International Conference on Advanced Communication Technology (ICACT)","first-page":"142","article-title":"Blockchain-based secure firmware management system in IoT environment","author":"Son","year":"2019 Feb 17\u201320"},{"key":"ref144","series-title":"2020 IEEE\/ACM Symposium on Edge Computing (SEC)","first-page":"370","article-title":"BEAF: a blockchain and edge assistant framework with data sharing for IoT networks","author":"Huang","year":"2020 Nov 12\u201314"},{"key":"ref145","doi-asserted-by":"crossref","first-page":"8333","DOI":"10.1007\/s10586-024-04437-z","article-title":"Securing Internet of medical devices using energy efficient blockchain for Healthcare 4.0","volume":"27","author":"Kumar","year":"2024","journal-title":"Clust Comput"},{"key":"ref146","doi-asserted-by":"crossref","first-page":"1615","DOI":"10.1007\/s11277-024-11563-9","article-title":"Hybrid of COOT optimization algorithm with genetic algorithm for sensor nodes clustering using software defined network","volume":"138","author":"Hanafi","year":"2024","journal-title":"Wirel Pers Commun"},{"key":"ref147","doi-asserted-by":"crossref","first-page":"36868","DOI":"10.1109\/ACCESS.2021.3059863","article-title":"Blockchain-based IoT access control system: towards security, lightweight, and cross-domain","volume":"9","author":"Sun","year":"2021","journal-title":"IEEE Access"},{"key":"ref148","doi-asserted-by":"crossref","first-page":"2267","DOI":"10.3390\/s24072267","article-title":"SDACS: blockchain-based secure and dynamic access control scheme for Internet of Things","volume":"24","author":"Gong","year":"2024","journal-title":"Sensors"},{"key":"ref149","doi-asserted-by":"crossref","DOI":"10.1007\/s40032-024-01048-w","article-title":"A novel blockchain-assisted deep learning model for secure edge intelligence in IoT networks","author":"Sekhar","year":"2024","journal-title":"J Inst Eng Ind Ser C"},{"key":"ref150","first-page":"265","article-title":"Secure share: optimal blockchain integration in IoT systems","volume":"64","author":"Dange","year":"2024","journal-title":"J Comput Inf Syst"},{"key":"ref151","doi-asserted-by":"crossref","first-page":"125968","DOI":"10.1016\/j.eswa.2024.125968","article-title":"TCDT: a trust-enabled crowdsourced data trading system in intelligent blockchain over Internet of Things","volume":"265","author":"Li","year":"2025","journal-title":"Expert Syst Appl"},{"key":"ref152","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1007\/s12083-024-01858-w","article-title":"Differential privacy preserving based framework using blockchain for Internet-of-things","volume":"18","author":"Kashif","year":"2024","journal-title":"Peer Peer Netw Appl"},{"key":"ref153","doi-asserted-by":"crossref","first-page":"163197","DOI":"10.1109\/ACCESS.2024.3486869","article-title":"Corrections to blockchain-assisted hierarchical attribute-based encryption scheme for secure information sharing in industrial Internet of Things","volume":"12","author":"Sasikumar","year":"2024","journal-title":"IEEE Access"},{"key":"ref154","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1007\/s12083-024-01857-x","article-title":"An enhanced deep learning integrated blockchain framework for securing industrial IoT","volume":"18","author":"Suneetha","year":"2024","journal-title":"Peer Peer Netw Appl"},{"key":"ref155","doi-asserted-by":"crossref","first-page":"100917","DOI":"10.1016\/j.iot.2023.100917","volume":"24","author":"Ahamad","year":"2023","journal-title":"Internet Things"},{"key":"ref156","doi-asserted-by":"crossref","first-page":"391","DOI":"10.1016\/j.future.2024.04.024","article-title":"Blockchain-based secure communication of Internet of Things in space-air-ground integrated network","volume":"158","author":"Zhang","year":"2024","journal-title":"Future Gener Comput Syst"},{"key":"ref157","doi-asserted-by":"crossref","first-page":"107705","DOI":"10.1016\/j.future.2024.107705","article-title":"Secure blockchain-based reputation system for IIoT-enabled retail industry with resistance to sybil attack","volume":"166","author":"Zhao","year":"2025","journal-title":"Future Gener Comput Syst"},{"key":"ref158","first-page":"101","article-title":"BBAD: blockchain-based data assured deletion and access control system for IoT","volume":"18","author":"Meng","year":"2024","journal-title":"Peer Peer Netw Appl"},{"key":"ref159","series-title":"2024 IEEE 10th World Forum on Internet of Things (WF-IoT)","first-page":"544","article-title":"A blockchain-based dual identity management and authentication framework for IoT networks","author":"Hussein","year":"2024 Nov 10\u201313"},{"key":"ref160","series-title":"Proceedings of the Thirteenth ACM International Conference on Embedded Software 2017 Companion","first-page":"1","article-title":"Integrating low\u2013power IoT devices to a blockchain-based infrastructure: work-in-progress","author":"\u00d6zyilmaz","year":"2017 Oct 15"},{"key":"ref161","series-title":"2024 Conference on Information Communications Technology and Society (ICTAS)","first-page":"128","article-title":"An extension to the lightweight blockchain scheme for some cases of Internet of Things systems: a protocol for secure transferring IoT sensors between edge nodes","author":"Panasenko","year":"2024 Mar 7\u20138"},{"key":"ref162","doi-asserted-by":"crossref","first-page":"399","DOI":"10.1016\/j.erss.2018.06.009","article-title":"Decarbonizing Bitcoin: law and policy choices for reducing the energy consumption of Blockchain technologies and digital currencies","volume":"44","author":"Truby","year":"2018","journal-title":"Energy Res Soc Sci"},{"key":"ref163","series-title":"International Green Computing Conference","first-page":"1","article-title":"EEP2P: an energy-efficient and economy-efficient P2P network protocol","author":"Zhou","year":"2014 Nov 3\u20135"},{"key":"ref164","author":"King","year":"2019 Aug 19","journal-title":"PPCoin: peer-to-peer crypto-currency with proof-of-stake"},{"key":"ref165","series-title":"Annual Cryptology Conference","first-page":"585","article-title":"Proofs of space","author":"Dziembowski","year":"2015"},{"key":"ref166","unstructured":"Fran\u00e7a B. Homomorphic mini-blockchain scheme. HMBC pdf; 2015 Apr 24 [cited 2025 Feb 10]. Available from: https:\/\/cryptonite.info\/files\/HMBC.pdf."},{"key":"ref167","unstructured":"Asolo B. Litecoin scrypt algorithm explained. 2018 [cited 2025 Feb 10]. Available from: https:\/\/www.mycryptopedia.com\/litecoin-scrypt-algorithm-explained\/."},{"key":"ref168","doi-asserted-by":"crossref","first-page":"680","DOI":"10.1016\/j.future.2016.11.009","article-title":"Mobile edge computing, fog et al. a survey and analysis of security threats and challenges","volume":"78","author":"Roman","year":"2018","journal-title":"Future Gener Comput Syst"},{"key":"ref169","doi-asserted-by":"crossref","first-page":"2266","DOI":"10.1016\/j.comnet.2012.12.018","article-title":"On the features and challenges of security and privacy in distributed Internet of Things","volume":"57","author":"Roman","year":"2013","journal-title":"Comput Netw"},{"key":"ref170","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1016\/j.dcan.2017.10.006","article-title":"A blockchain future for Internet of Things security: a position paper","volume":"4","author":"Banerjee","year":"2018","journal-title":"Digit Commun Netw"},{"key":"ref171","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1109\/MNET.001.1800503","article-title":"Privacy-preserving image retrieval for medical IoT systems: a blockchain-based approach","volume":"33","author":"Shen","year":"2019","journal-title":"IEEE Netw"},{"key":"ref172","first-page":"14","article-title":"Understanding blockchain consensus models","volume":"4","author":"Baliga","year":"2017","journal-title":"Persistent"},{"key":"ref173","series-title":"2019 IEEE International Conference on Industrial Technology (ICIT)","first-page":"1135","article-title":"An efficient selective miner consensus protocol in blockchain oriented IoT smart monitoring","author":"Uddin","year":"2019 Feb 13\u201315"},{"key":"ref174","doi-asserted-by":"crossref","first-page":"43620","DOI":"10.1109\/ACCESS.2021.3065880","article-title":"A comprehensive review of blockchain consensus mechanisms","volume":"9","author":"Lashkari","year":"2021","journal-title":"IEEE Access"},{"key":"ref175","first-page":"46","article-title":"Blockchain: a comparative study of consensus algorithms PoW, PoS, PoA","volume":"9","author":"Fahim","year":"2023","journal-title":"PoV Int J Math Sci Comput"},{"key":"ref176","doi-asserted-by":"crossref","first-page":"3680","DOI":"10.1109\/TII.2019.2903342","article-title":"Towards secure industrial IoT: blockchain system with credit-based consensus mechanism","volume":"15","author":"Huang","year":"2019","journal-title":"IEEE Trans Ind Inform"},{"key":"ref177","doi-asserted-by":"crossref","first-page":"16440","DOI":"10.1109\/ACCESS.2020.2967218","article-title":"Solutions to scalability of blockchain: a survey","volume":"8","author":"Zhou","year":"2020","journal-title":"IEEE Access"},{"key":"ref178","doi-asserted-by":"crossref","first-page":"263","DOI":"10.1109\/MNET.001.1900526","article-title":"Blockchain technology toward green IoT: opportunities and challenges","volume":"34","author":"Sharma","year":"2020","journal-title":"IEEE Netw"},{"key":"ref179","doi-asserted-by":"crossref","first-page":"8015","DOI":"10.1007\/s10586-024-04411-9","article-title":"Blockchain and fog computing model for secure data access control mechanisms for distributed data storage and authentication using hybrid encryption algorithm","volume":"27","author":"Agrawal","year":"2024","journal-title":"Clust Comput"},{"key":"ref180","doi-asserted-by":"crossref","first-page":"100006","DOI":"10.1016\/j.bcra.2021.100006","article-title":"A survey on the adoption of blockchain in IoT: challenges and solutions","volume":"2","author":"Uddin","year":"2021","journal-title":"Blockchain Res Appl"},{"key":"ref181","doi-asserted-by":"crossref","first-page":"209","DOI":"10.1007\/s12027-020-00617-7","article-title":"Regulating blockchain, DLT and smart contracts: a technology regulator\u2019s perspective","volume":"21","author":"Ellul","year":"2020","journal-title":"ERA Forum"},{"key":"ref182","doi-asserted-by":"crossref","first-page":"7841","DOI":"10.1038\/s41598-024-58578-7","article-title":"A scalable blockchain based framework for efficient IoT data management using lightweight consensus","volume":"14","author":"Haque","year":"2024","journal-title":"Sci Rep"},{"key":"ref183","doi-asserted-by":"crossref","first-page":"289","DOI":"10.1016\/j.sysarc.2019.02.009","article-title":"All one needs to know about fog computing and related edge computing paradigms: a complete survey","volume":"98","author":"Yousefpour","year":"2019","journal-title":"J Syst Archit"},{"key":"ref184","series-title":"2021 IEEE\/ACM 29th International Symposium on Quality of Service (IWQOS)","first-page":"1","article-title":"Cumulus: a secure BFT-based sidechain for off-chain scaling","author":"Gai","year":"2001 Jun 25\u201328"},{"key":"ref185","doi-asserted-by":"crossref","first-page":"3733","DOI":"10.3390\/s22103733","article-title":"Energy efficient consensus approach of blockchain for IoT networks with edge computing","volume":"22","author":"Wadhwa","year":"2022","journal-title":"Sensors"},{"key":"ref186","doi-asserted-by":"crossref","first-page":"7432","DOI":"10.3390\/app13137432","article-title":"Cybersecurity for blockchain-based IoT systems: a review","volume":"13","author":"Alajlan","year":"2023","journal-title":"Appl Sci"},{"key":"ref187","first-page":"103678","article-title":"Leveraging zero knowledge proofs for blockchain-based identity sharing: a survey of advancements, challenges and opportunities","volume":"80","author":"Zhou","year":"2024","journal-title":"J Inf Secur Appl"},{"key":"ref188","series-title":"2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)","first-page":"1","article-title":"A cost-efficient IoT forensics framework with blockchain","author":"Mercan","year":"2020 May 2\u20136"},{"key":"ref189","doi-asserted-by":"crossref","first-page":"49","DOI":"10.3390\/fi17010049","article-title":"Decentralized identity management for Internet of Things (IoT) devices using IOTA blockchain technology","volume":"17","author":"Ram\u00edrez-Gordillo","year":"2025","journal-title":"Future Internet"},{"key":"ref190","first-page":"22","article-title":"Utilization of blockchain technology to improve security and transparency of information systems","volume":"1","author":"Admira","year":"2024","journal-title":"Inf Technol Stud J"},{"key":"ref191","doi-asserted-by":"crossref","first-page":"274","DOI":"10.31181\/dma21202443","article-title":"The evolution of blockchain technology: applications, challenges, and future directions","volume":"2","author":"Mondal","year":"2024","journal-title":"Decis Mak Adv"},{"key":"ref192","doi-asserted-by":"crossref","first-page":"174","DOI":"10.3390\/bdcc8120174","article-title":"Exploring IoT and blockchain: a comprehensive survey on security, integration strategies, applications and future research directions","volume":"8","author":"Obaidat","year":"2024","journal-title":"Big Data Cogn Comput"},{"key":"ref193","doi-asserted-by":"crossref","first-page":"156114","DOI":"10.1109\/ACCESS.2021.3129697","article-title":"A survey of IoT and blockchain integration: security perspective","volume":"9","author":"Shammar","year":"2021","journal-title":"IEEE Access"},{"key":"ref194","doi-asserted-by":"crossref","first-page":"101254","DOI":"10.1016\/j.iot.2024.101254","article-title":"Blockchain applications for Internet of Things\u2014a survey","volume":"27","author":"Khan","year":"2024","journal-title":"Internet Things"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-83-2\/TSP_CMC_63304\/TSP_CMC_63304.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T01:08:11Z","timestamp":1763341691000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v83n2\/60599"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":194,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.063304","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]}}}