{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T02:21:13Z","timestamp":1771467673364,"version":"3.50.1"},"reference-count":20,"publisher":"Tech Science Press","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.32604\/iasc.2023.027675","type":"journal-article","created":{"date-parts":[[2022,7,19]],"date-time":"2022-07-19T02:42:18Z","timestamp":1658198538000},"page":"1545-1563","source":"Crossref","is-referenced-by-count":4,"title":["An Efficient SDFRM Security System for Blockchain Based Internet of Things"],"prefix":"10.32604","volume":"35","author":[{"given":"Vivekraj","family":"Mannayee","sequence":"first","affiliation":[]},{"given":"Thirumalai","family":"Ramanathan","sequence":"additional","affiliation":[]}],"member":"17807","reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"247","DOI":"10.3390\/su10010247","article-title":"What drives the implementation of industry 4. 0? the role of opportunities and challenges in the context of sustainability","volume":"10","author":"Mu ller","year":"2018","journal-title":"Sustainability"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"2146","DOI":"10.1109\/JBHI.2020.2969648","article-title":"Decentralized authentication of distributed patients in hospital networks using blockchain","volume":"24","author":"Srivastava","year":"2020","journal-title":"IEEE Journal of Biomedical and Health Informatics"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"1","DOI":"10.3390\/s19020326","article-title":"A decentralized privacy-preserving healthcare blockchain for IoT","volume":"19","author":"Dwivedi","year":"2019","journal-title":"Sensors"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"11 676","DOI":"10.1109\/ACCESS.2018.2801266","article-title":"Secure attribute-based signature scheme with multiple authorities for blockchain in electronic health records systems","volume":"6","author":"Guo","year":"2018","journal-title":"IEEE Access"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"2046","DOI":"10.1109\/SURV.2013.031413.00127","article-title":"A survey of defense mechanisms against distributed denial of service (DDOs) flooding attacks","volume":"15","author":"Zargar","year":"2013","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"ref6","first-page":"17591","article-title":"Smart secure sensing for IoT-based agriculture: Blockchain perspective","volume":"21","author":"Das","year":"2020","journal-title":"IEEE Sensors Journal"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"3820","DOI":"10.3390\/en13153820","article-title":"Combining blockchain and IoT: Food-chain traceability and beyond","volume":"13","author":"Grecuccio","year":"2020","journal-title":"Energies"},{"key":"ref8","first-page":"32","article-title":"Monetization of IoT data using smart contracts","volume":"8","author":"Husain","year":"2018","journal-title":"IET Networks"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1109\/MNET.001.1900658","article-title":"Pirate: A blockchain-based secure framework of distributed machine learning in 5G networks","volume":"34","author":"Zhou","year":"2020","journal-title":"IEEE Network"},{"key":"ref10","first-page":"1","article-title":"Distributed statistical machine learning in adversarial settings: Byzantine gradient descent","volume":"1","author":"Chen","year":"2017","journal-title":"Proceedings of the ACM on Measurement and Analysis of Computing Systems"},{"key":"ref11","first-page":"101","article-title":"A survey about consensus algorithms used in blockchain","volume":"14","author":"Nguyen","year":"2018","journal-title":"Journal of Information Processing Systems"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1109\/MCOM.2018.1700863","article-title":"Secure and energy-efficient handover in fog networks using blockchain-based DMM","volume":"56","author":"Sharma","year":"2018","journal-title":"IEEE Communications Magazine"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"5538","DOI":"10.3390\/app9245538","article-title":"Blockchain-based resource allocation model in fog computing","volume":"9","author":"Wang","year":"2019","journal-title":"Applied Sciences"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1016\/j.mcm.2012.06.033","article-title":"A novel smart card and dynamic ID based remote user authentication scheme for multi-server environment","volume":"58","author":"Li","year":"2013","journal-title":"Mathematical and Computer Modelling"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"4","DOI":"10.4258\/hir.2017.23.1.4","article-title":"Wearable devices in medical internet of things: Scientific research and commercially available devices","volume":"23","author":"Haghi","year":"2017","journal-title":"Healthcare Informatics Research"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"6392","DOI":"10.1109\/JIOT.2020.2974281","article-title":"Deep reinforcement learning for resource protection and real-time detection in IoT environment","volume":"7","author":"Liang","year":"2020","journal-title":"IEEE Internet of Things Journal"},{"key":"ref17","first-page":"1","article-title":"A framework of blockchain-based secure and privacy-preserving E-government system","volume":"2018","author":"Elisa","year":"2018","journal-title":"Wireless Networks"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1109\/MNET.2016.1600109NM","article-title":"On denial of service attacks in software defined networks","volume":"30","author":"Zhang","year":"2016","journal-title":"IEEE Network"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1007\/s13389-013-0057-3","article-title":"Charm: A framework for rapidly prototyping cryptosystems","volume":"3","author":"Akinyele","year":"2013","journal-title":"Journal of Cryptographic Engineering"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"2204","DOI":"10.1109\/TITS.2017.2777990","article-title":"CreditCoin: A privacy-preserving blockchain-based incentive announcement network for communications of smart vehicles","volume":"19","author":"Li","year":"2018","journal-title":"IEEE Transactions on Intelligent Transportation Systems"}],"container-title":["Intelligent Automation &amp; Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.techscience.com\/ueditor\/files\/iasc\/TSP_IASC-35-2\/TSP_IASC_27675\/TSP_IASC_27675.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,6]],"date-time":"2024-12-06T21:28:59Z","timestamp":1733520539000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/iasc\/v35n2\/48882"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"references-count":20,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2023]]}},"URL":"https:\/\/doi.org\/10.32604\/iasc.2023.027675","relation":{},"ISSN":["1079-8587"],"issn-type":[{"value":"1079-8587","type":"print"}],"subject":[],"published":{"date-parts":[[2023]]}}}