{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T10:44:19Z","timestamp":1776077059247,"version":"3.50.1"},"reference-count":24,"publisher":"Tech Science Press","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.065426","type":"journal-article","created":{"date-parts":[[2025,5,15]],"date-time":"2025-05-15T04:43:26Z","timestamp":1747284206000},"page":"447-461","source":"Crossref","is-referenced-by-count":2,"title":["Federated Learning and Blockchain Framework for Scalable and Secure IoT Access Control"],"prefix":"10.32604","volume":"84","author":[{"given":"Ammar","family":"Odeh","sequence":"first","affiliation":[]},{"given":"Anas Abu","family":"Taleb","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","first-page":"635","article-title":"A novel ensemble learning algorithm based on D-S evidence theory for IoT security","volume":"57","author":"Shi","year":"2018","journal-title":"Comput Mater Contin"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"499","DOI":"10.3390\/app15020499","article-title":"Defense and security mechanisms in the Internet of Things: a review","volume":"15","author":"Szymoniak","year":"2025","journal-title":"Appl Sci"},{"key":"ref3","first-page":"329","article-title":"Enhancing IoT security: quantum-level resilience against threats","volume":"78","author":"Alhakami","year":"2024","journal-title":"Comput Mater Contin"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"101357","DOI":"10.1016\/j.iot.2024.101357","article-title":"Enhancing security of Internet of robotic things: a review of recent trends, practices, and recommendations with encryption and blockchain techniques","volume":"28","author":"Zafir","year":"2024","journal-title":"Internet Things"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"101442","DOI":"10.1016\/j.iot.2024.101442","article-title":"Enhancing IoT security through emotion recognition and blockchain-driven intrusion prevention","volume":"29","author":"Ntizikira","year":"2025","journal-title":"Internet Things"},{"key":"ref6","first-page":"1326","article-title":"Exploring the security landscape: a comprehensive analysis of vulnerabilities, challenges, and findings in Internet Of Things (Iot) application layer protocols","volume":"21","author":"Bhoi","year":"2024","journal-title":"Migration Letters"},{"key":"ref7","first-page":"161","article-title":"Applications of AI in decentralized computing systems: harnessing artificial intelligence for enhanced scalability, efficiency, and autonomous decision-making in distributed architectures","volume":"7","author":"Hammad","year":"2024","journal-title":"Appl Res Artif Intell Cloud Comput"},{"key":"ref8","first-page":"65","article-title":"Internet of Things authentication protocols: comparative study","volume":"79","author":"Dargaoui","year":"2024","journal-title":"Comput Mater Contin"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"e308","DOI":"10.1002\/spy2.308","article-title":"A transformative shift toward blockchain-based IoT environments: consensus, smart contracts, and future directions","volume":"6","author":"Trivedi","year":"2023","journal-title":"Secur Priv"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"101939","DOI":"10.1016\/j.jksuci.2024.101939","article-title":"Collaborative threat intelligence: enhancing IoT security through blockchain and machine learning integration","volume":"36","author":"Nazir","year":"2024","journal-title":"J King Saud Univ Comput Inf Sci"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"1027","DOI":"10.1016\/j.future.2019.09.050","article-title":"An efficient Lightweight integrated Blockchain (ELIB) model for IoT security and privacy","volume":"102","author":"Mohanty","year":"2020","journal-title":"Future Gener Comput Syst"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3417987","article-title":"Security and privacy in IoT using machine learning and blockchain","volume":"53","author":"Waheed","year":"2021","journal-title":"ACM Comput Surv"},{"key":"ref13","series-title":"Proceedings of the Second International Conference on Internet-of-Things Design and Implementation","first-page":"173","article-title":"Towards an optimized BlockChain for IoT","author":"Dorri","year":"2017"},{"key":"ref14","series-title":"2017 19th International Conference on Advanced Communication Technology (ICACT)","first-page":"464","article-title":"Managing IoT devices using blockchain platform","author":"Huh","year":"2017 Feb 19\u201322"},{"key":"ref15","series-title":"2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","first-page":"618","article-title":"Blockchain for IoT security and privacy: the case study of a smart home","author":"Dorri","year":"2017 Mar 13\u201317"},{"key":"ref16","series-title":"2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)","first-page":"6423","article-title":"Continuous security in IoT using blockchain","author":"Agrawal","year":"2018 Apr 15\u201320"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"687","DOI":"10.3390\/electronics13040687","article-title":"Enhancing industrial IoT network security through blockchain integration","volume":"13","author":"Bobde","year":"2024","journal-title":"Electronics"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"e38917","DOI":"10.1016\/j.heliyon.2024.e38917","article-title":"Enhancing data security and privacy in energy applications: integrating IoT and blockchain technologies","volume":"10","author":"Rai","year":"2024","journal-title":"Heliyon"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"7142048","DOI":"10.1155\/2021\/7142048","article-title":"Blockchain-based internet of things and industrial IoT: a comprehensive survey","volume":"2021","author":"Dwivedi","year":"2021","journal-title":"Secur Commun Netw"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"326","DOI":"10.3390\/s19020326","article-title":"A decentralized privacy-preserving healthcare blockchain for IoT","volume":"19","author":"Dwivedi","year":"2019","journal-title":"Sensors"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"892","DOI":"10.3390\/s21030892","article-title":"Blockchain security and privacy for the Internet of Things","volume":"21","author":"Picone","year":"2021","journal-title":"Sensors"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"10177","DOI":"10.3390\/su162310177","article-title":"Blockchain technology for IoT security and trust: a comprehensive SLR","volume":"16","author":"Almarri","year":"2024","journal-title":"Sustainability"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"e510","DOI":"10.1002\/itl2.510","article-title":"PRICELESS: privacy enhanced AI-driven scalable framework for IoT applications in serverless edge computing environments","volume":"8","author":"Golec","year":"2025","journal-title":"Internet Technol Lett"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"16933","DOI":"10.1109\/ACCESS.2025.3532800","article-title":"Optimizing security in IoT ecosystems using hybrid artificial intelligence and blockchain models: a scalable and efficient approach for threat detection","volume":"13","author":"Villegas-Ch","year":"2025","journal-title":"IEEE Access"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-84-1\/TSP_CMC_65426\/TSP_CMC_65426.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T01:37:12Z","timestamp":1763343432000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v84n1\/61782"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":24,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.065426","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]}}}