{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T11:08:02Z","timestamp":1773486482643,"version":"3.50.1"},"reference-count":79,"publisher":"MDPI AG","issue":"10","license":[{"start":{"date-parts":[[2020,5,14]],"date-time":"2020-05-14T00:00:00Z","timestamp":1589414400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100003141","name":"Consejo Nacional de Ciencia y Tecnologia","doi-asserted-by":"publisher","award":["927997"],"award-info":[{"award-number":["927997"]}],"id":[{"id":"10.13039\/501100003141","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>The Internet of Things (IoT) paradigm allows the connection and exchange of information between millions of smart devices. This paradigm grows and develops exponentially as do the risks and attacks on IoT infrastructures. Security, privacy, reliability, and autonomy are the most important requirements in IoT Systems. If these issues are not guaranteed, the IoT system could be susceptible to malicious users and malicious use. In centralized IoT systems, attacks and risks are greater, especially when data is transmitted between devices and shared with other organizations. To avoid these types of situations, this work presents a decentralized system that guarantees the autonomy and security of an IoT system. The proposed methodology helps to protect data integrity and availability based on the security advantages provided by blockchain and the use of cryptographic tools. The accuracy of the proposed methodology was measured on a temperature and humidity sensing IoT-based Wireless Sensor Network (WSN). The obtained results prove that the proposal fulfils the main requirements of an IoT system. It is autonomous, secure to share and send information between devices and users, has privacy, it is reliable, and the information is available in the infrastructure. Furthermore, this research demonstrates that the proposal is less susceptible to the most frequent attacks against IoT systems, such as linking attack, man in the middle, and Distributed Denial of Service (DDoS) attack.<\/jats:p>","DOI":"10.3390\/s20102798","type":"journal-article","created":{"date-parts":[[2020,5,14]],"date-time":"2020-05-14T10:27:19Z","timestamp":1589452039000},"page":"2798","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":59,"title":["Blockchain Mechanism and Symmetric Encryption in A Wireless Sensor Network"],"prefix":"10.3390","volume":"20","author":[{"given":"Alma E.","family":"Guerrero-Sanchez","sequence":"first","affiliation":[{"name":"Faculty of Engineering, Autonomous University of Queretaro, Quer\u00e9taro 76017, Mexico"}]},{"given":"Edgar A.","family":"Rivas-Araiza","sequence":"additional","affiliation":[{"name":"Faculty of Engineering, Autonomous University of Queretaro, Quer\u00e9taro 76017, Mexico"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3307-9881","authenticated-orcid":false,"given":"Jose Luis","family":"Gonzalez-Cordoba","sequence":"additional","affiliation":[{"name":"Faculty of Engineering, Autonomous University of Queretaro, Quer\u00e9taro 76017, Mexico"}]},{"given":"Manuel","family":"Toledano-Ayala","sequence":"additional","affiliation":[{"name":"Faculty of Engineering, Autonomous University of Queretaro, Quer\u00e9taro 76017, Mexico"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2200-307X","authenticated-orcid":false,"given":"Andras","family":"Takacs","sequence":"additional","affiliation":[{"name":"Faculty of Engineering, Autonomous University of Queretaro, Quer\u00e9taro 76017, Mexico"}]}],"member":"1968","published-online":{"date-parts":[[2020,5,14]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1109\/MNET.2015.7064901","article-title":"Mobile cloud sensing, big data, and 5G networks make an intelligent and smart world","volume":"29","author":"Han","year":"2015","journal-title":"IEEE Netw."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Dauwed, M., and Meri, A. (2019). IOT Service Utilisation in Healthcare. In IoT and Smart Home Automation, IntechOpen.","DOI":"10.5772\/intechopen.86014"},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Gotarane, V., and Raskar, S. (2019, January 23\u201325). IoT practices in military applications. Proceedings of the 2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI), Tirunelveli, India.","DOI":"10.1109\/ICOEI.2019.8862559"},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Vela-Medina, J.C., Guerrero-S\u00e1nchez, A.E., Rivas-Araiza, J.E., and Rivas-Araiza, E.A. (2018, January 17\u201319). Face detection for efficient video-surveillance IoT based embedded system. Proceedings of the 2018 IEEE International Conference on Automation\/XXIII Congress of the Chilean Association of Automatic Control (ICA-ACCA), Concepcion, Chile.","DOI":"10.1109\/ICA-ACCA.2018.8609835"},{"key":"ref_5","unstructured":"Islam, M.R., Sarker, S., Mazumder, M.S., and Ranim, M.R. (2020). An IoT based Real-time Low Cost Smart Energy Meter Monitoring System using Android Application. arXiv."},{"key":"ref_6","unstructured":"(2020, March 14). The Future of IoT Miniguide: The Burgeoning IoT Market Continues. Available online: https:\/\/www.cisco.com\/c\/en\/us\/solutions\/internet-of-things\/future-of-iot.html."},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Payne, E.K., Lu, S., Wang, Q., and Wu, L. (2019). Concept of Designing Thermal Condition Monitoring System with ZigBee\/GSM Communication Link for Distributed Energy Resources Network in Rural and Remote Applications. Processes, 7.","DOI":"10.3390\/pr7060383"},{"key":"ref_8","first-page":"012010","article-title":"Development of environmental monitoring systems based on LoRa with cloud integration for rural area","volume":"355","author":"Hidayat","year":"2019","journal-title":"IOP Conference Series: Earth and Environmental Science"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Feng, L., Zhang, H., Lou, L., and Chen, Y. (2018, January 9\u201311). A blockchain-based collocation storage architecture for data security process platform of WSN. Proceedings of the 2018 IEEE 22nd International Conference on Computer Supported Cooperative Work in Design (CSCWD), Nanjing, China.","DOI":"10.1109\/CSCWD.2018.8465319"},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Lee, S.H., Lee, S., Song, H., and Lee, H.S. (2009, January 18\u201321). Wireless sensor network design for tactical military applications: Remote large-scale environments. Proceedings of the MILCOM 2009\u20142009 IEEE Military Communications Conference, Boston, MA, USA.","DOI":"10.1109\/MILCOM.2009.5379900"},{"key":"ref_11","unstructured":"Zeybek, T., Chang, C.H., and Yang, Z. (2019, January 25\u201327). An IoT Implementation for Manufacturing Using Wi-Fi, 6LoWPAN, and MQTT. Proceedings of the International Conference on Embedded Wireless Systems and Networks (EWSN), Beijing, China."},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Andy, S., Rahardjo, B., and Hanindhito, B. (2017, January 19\u201321). Attack scenarios and security analysis of MQTT communication protocol in IoT system. Proceedings of the 2017 4th International Conference on Electrical Engineering, Computer Science and Informatics (EECSI), Yogyakarta, Indonesia.","DOI":"10.1109\/EECSI.2017.8239179"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"5577","DOI":"10.1109\/JIOT.2019.2903821","article-title":"Internet of Things Mobile\u2013Air Pollution Monitoring System (IoT-Mobair)","volume":"6","author":"Dhingra","year":"2019","journal-title":"IEEE Internet of Things J."},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Simitha, K.M., and Raj, S. (2019, January 12\u201314). IoT and WSN Based Water Quality Monitoring System. Proceedings of the 3rd International Conference on Electronics, Communication and Aerospace Technology (ICECA), Coimbatore, India.","DOI":"10.1109\/ICECA.2019.8821859"},{"key":"ref_15","unstructured":"(2020, February 11). IoT Attacks Escalating with a 217.5% Increase in Volume. Available online: https:\/\/www.bleepingcomputer.com\/news\/security\/iot-attacks-escalating-with-a-2175-percent-increase-in-volume\/."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Jawad, K., Mansoor, K., Baig, A.F., Ghani, A., and Naseem, A. (2019, January 20\u201321). An Improved three-factor. anonymous Authentication Protocol for WSN s based IoT System Using Symmetric cryptography. Proceedings of the 2019 International Conference on Communication Technologies (ComTech), Rawalpindi, Pakistan.","DOI":"10.1109\/COMTECH.2019.8737799"},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Elhoseny, M., and Hassanien, A.E. (2019). Secure data transmission in WSN: An overview. Dynamic Wireless Sensor Networks, Springer.","DOI":"10.1007\/978-3-319-92807-4"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Hammi, M.T., Bellot, P., and Serhrouchni, A. (2018, January 15\u201318). BCTrust: A decentralized authentication blockchain-based mechanism. Proceedings of the 2018 IEEE Wireless Communications and Networking Conference (WCNC), Barcelona, Spain.","DOI":"10.1109\/WCNC.2018.8376948"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Dwivedi, A.D., Srivastava, G., Dhar, S., and Singh, R. (2019). A decentralized privacy-preserving healthcare blockchain for IoT. Sensors, 19.","DOI":"10.3390\/s19020326"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"2381","DOI":"10.3233\/JIFS-169949","article-title":"Distributed e-health wide-world accounting ledger via blockchain","volume":"36","author":"Corchado","year":"2019","journal-title":"J. Intell. Fuzzy Syst."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"101874","DOI":"10.1016\/j.adhoc.2019.101874","article-title":"Detection of jamming attack using timestamp for WSN","volume":"91","author":"Rose","year":"2019","journal-title":"Ad Hoc Netw."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"1313","DOI":"10.1007\/s10586-017-1622-9","article-title":"Detection and prevention of black hole and selective forwarding attack in clustered WSN with Active Trust","volume":"22","author":"Mehetre","year":"2019","journal-title":"Clust. Comput."},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Shafagh, H., Hithnawi, A., Droescher, A., Duquennoy, S., and Hu, W. (2015, January 1\u20134). Talos: Encrypted query processing for the internet of things. Proceedings of the 13th ACM conference on embedded networked sensor systems, Seoul, Korea.","DOI":"10.1145\/2809695.2809723"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"227","DOI":"10.1016\/j.inffus.2018.12.007","article-title":"Non-linear adaptive closed-loop control system for improved efficiency in IoT-blockchain management","volume":"49","author":"Chamoso","year":"2019","journal-title":"Inf. Fusion"},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"185496","DOI":"10.1109\/ACCESS.2019.2960633","article-title":"Intrusion Prevention Framework for Secure Routing in WSN-Based Mobile Internet of Things","volume":"7","author":"Haseeb","year":"2019","journal-title":"IEEE Access"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"184133","DOI":"10.1109\/ACCESS.2019.2960609","article-title":"A Novel Trust Evaluation Process for Secure Localization Using a Decentralized Blockchain in Wireless Sensor Networks","volume":"7","author":"Kim","year":"2019","journal-title":"IEEE Access"},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"1027","DOI":"10.1016\/j.future.2019.09.050","article-title":"An efficient Lightweight integrated Blockchain (ELIB) model for IoT security and privacy","volume":"102","author":"Mohanty","year":"2020","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Shafagh, H., Burkhalter, L., Hithnawi, A., and Duquennoy, S. (2017, January 3). Towards blockchain-based auditable storage and sharing of IoT data. Proceedings of the 2017 Cloud Computing Security Workshop, Dallas, TX, USA.","DOI":"10.1145\/3140649.3140656"},{"key":"ref_29","unstructured":"(2020, February 11). SparkFun ESP8266 Thing\u2014Dev Board. Available online: https:\/\/www.sparkfun.com\/products\/13711."},{"key":"ref_30","unstructured":"(2020, February 11). SimpleLink Wi-Fi\u00ae and Internet-of-Things Solution, a Single-Chip Wireless MCU. Available online: http:\/\/www.ti.com\/product\/CC3200."},{"key":"ref_31","unstructured":"(2020, February 11). M\u00f3dulo Lua Wifi ESP8266 ESP-12E CP2102 NodeMCU v1.0 V2. Available online: http:\/\/ipowerelectronics.com\/modulos\/2257-modulo-lua-wifi-esp8266-nodemcu-v10-v2.html."},{"key":"ref_32","unstructured":"Nakamoto, S. (2019, July 17). Bitcoin Whitepaper. Available online: https:\/\/bitcoin.org\/bitcoin.pdf-."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"182","DOI":"10.1016\/j.irfa.2018.09.003","article-title":"Cryptocurrencies as a financial asset: A systematic analysis","volume":"62","author":"Corbet","year":"2019","journal-title":"Int. Rev. Financ. Anal."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"511","DOI":"10.1016\/j.future.2018.12.044","article-title":"Privacy-friendly platform for healthcare data in cloud based on blockchain environment","volume":"95","author":"Basu","year":"2019","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"14743","DOI":"10.1007\/s10586-018-2387-5","article-title":"Analysis of blockchain technology: Pros, cons and SWOT","volume":"22","author":"Niranjanamurthy","year":"2019","journal-title":"Clust. Comput."},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Catalini, C., Jagadeesan, R., and Kominers, S.D. (2020, May 07). Market Design for a Blockchain-Based Financial System. Available online: https:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=3396834.","DOI":"10.2139\/ssrn.3396834"},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Zeadally, S., Das, A.K., and Sklavos, N. (2019). Cryptographic technologies and protocol standards for Internet of Things. Internet Things, 100075.","DOI":"10.1016\/j.iot.2019.100075"},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1007\/s10916-018-0997-3","article-title":"Blockchain-based data preservation system for medical data","volume":"42","author":"Li","year":"2018","journal-title":"J. Med. Syst."},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Fakhri, D., and Mutijarsa, K. (2018, January 23\u201324). Secure IoT communication using blockchain technology. Proceedings of the 2018 International Symposium on Electronics and Smart Devices (ISESD), Bandung, Indonesia.","DOI":"10.1109\/ISESD.2018.8605485"},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Gill, I.S., and Jat, D.S. (2019). Advanced encryption standard with Randomized round keys for communication security in IoT networks. The IoT and the Next Revolutions Automating the World, IGI Global.","DOI":"10.4018\/978-1-5225-9246-4.ch017"},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Khan, S., Gupta, N., Raut, G., Rajput, G., Pandey, J.G., and Vishvakarma, S.K. (2019, January 4\u20136). An ultra-low power AES architecture for IoT. Proceedings of the International Symposium on VLSI Design and Test, Indore, India.","DOI":"10.1007\/978-981-32-9767-8_29"},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"Durairaj, M., and Muthuramalingam, K. (2019). A lightweight multi-level encryption model for IoT applications. Cybersecurity and Secure Information Systems, Springer.","DOI":"10.1007\/978-3-030-16837-7_2"},{"key":"ref_43","unstructured":"(2020, March 15). IoT Security\u2014Cryptography. Available online: https:\/\/www.embedded.com\/iot-security-cryptography\/."},{"key":"ref_44","doi-asserted-by":"crossref","unstructured":"Su, N., Zhang, Y., and Li, M. (2019, January 15\u201317). Research on Data Encryption Standard Based on AES Algorithm in Internet of Things Environment. Proceedings of the 2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC), Chengdu, China.","DOI":"10.1109\/ITNEC.2019.8729488"},{"key":"ref_45","doi-asserted-by":"crossref","unstructured":"Jangirala, S., Das, A.K., and Vasilakos A., V. (2019). Designing Secure Lightweight Blockchain-Enabled RFID-Based Authentication Protocol for Supply Chains in 5G Mobile Edge Computing Environment. IEEE Trans. Ind. Informa.","DOI":"10.1109\/TII.2019.2942389"},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1016\/j.jnca.2018.10.020","article-title":"A survey on privacy protection in blockchain system","volume":"126","author":"Feng","year":"2019","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1109\/MCOM.2017.1600363CM","article-title":"Security and privacy for cloud-based IoT: Challenges","volume":"55","author":"Zhou","year":"2017","journal-title":"IEEE Commun. Mag."},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1016\/j.jnca.2018.05.005","article-title":"BSeIn: A blockchain-based secure mutual authentication with fine-grained access control system for industry 4.0","volume":"116","author":"Lin","year":"2018","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_49","first-page":"1","article-title":"Big data analytics for large-scale wireless networks: Challenges and opportunities","volume":"52","author":"Dai","year":"2019","journal-title":"ACM Comput. Surv. CSUR"},{"key":"ref_50","unstructured":"(2020, April 27). Analysis of Data Security in Wireless Networks. Available online: https:\/\/ukdiss.com\/examples\/providing-location-aware-end-to-end-data-security-in-wireless-sensor-networks.php."},{"key":"ref_51","doi-asserted-by":"crossref","first-page":"585","DOI":"10.1109\/TMC.2007.70753","article-title":"LEDS: Providing location-aware end-to-end data security in wireless sensor networks","volume":"7","author":"Ren","year":"2008","journal-title":"IEEE Trans. Mob. Comput."},{"key":"ref_52","doi-asserted-by":"crossref","first-page":"1727","DOI":"10.1109\/JPROC.2016.2558521","article-title":"A survey on wireless security: Technical challenges, recent advances, and future trends","volume":"104","author":"Zou","year":"2016","journal-title":"Proc. IEEE"},{"key":"ref_53","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1073\/pnas.1618130114","article-title":"Wireless physical layer security","volume":"114","author":"Poor","year":"2017","journal-title":"Proc. Natl. Acad. Sci. USA"},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"567","DOI":"10.1016\/j.ins.2018.02.005","article-title":"Privacy-preserving smart IoT-based healthcare big data storage and self-adaptive access control system","volume":"479","author":"Yang","year":"2019","journal-title":"Inf. Sci."},{"key":"ref_55","doi-asserted-by":"crossref","unstructured":"Qadri, Y.A., Nauman, A., Zikria, Y.B., Vasilakos, A.V., and Kim, S.W. (2020). The Future of Healthcare Internet of Things: A Survey of Emerging Technologies. IEEE Commun. Surv. Tutor.","DOI":"10.1109\/COMST.2020.2973314"},{"key":"ref_56","doi-asserted-by":"crossref","first-page":"1299","DOI":"10.1109\/JBHI.2017.2721545","article-title":"A novel authentication and key agreement scheme for implantable medical devices deployment","volume":"22","author":"Wazid","year":"2017","journal-title":"IEEE J. Biomed. Health Inform."},{"key":"ref_57","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1016\/j.jnca.2017.02.001","article-title":"Security and privacy challenges in mobile cloud computing: Survey and way ahead","volume":"84","author":"Mollah","year":"2017","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_58","doi-asserted-by":"crossref","first-page":"2465","DOI":"10.1007\/s11276-019-01978-9","article-title":"A survey on QoS mechanisms in WSN for computational intelligence based routing protocols","volume":"26","author":"Kaur","year":"2019","journal-title":"Wirel. Netw."},{"key":"ref_59","doi-asserted-by":"crossref","unstructured":"Aichernig, B.K., and Schumi, R. (2018, January 4\u20137). How fast is MQTT?. Proceedings of the International Conference on Quantitative Evaluation of Systems, Beijing, China.","DOI":"10.1007\/978-3-319-99154-2_3"},{"key":"ref_60","unstructured":"(2020, May 01). Benchmark of MQTT Servers. Available online: http:\/\/www.scalagent.com\/IMG\/pdf\/Benchmark_MQTT_servers-v1-1.pdf\/."},{"key":"ref_61","unstructured":"(2020, May 02). Blockchain Fundamentals: Latency & Capacity\u2014Featuring the Ark Ecosystem. Available online: https:\/\/medium.com\/ku-blockchain-institute\/blockchain-fundamentals-featuring-the-ark-ecosystem-part-1-af1f9052e579."},{"key":"ref_62","unstructured":"Bi, W., Yang, H., and Zheng, M. (2018). An accelerated method for message propagation in blockchain networks. arXiv."},{"key":"ref_63","unstructured":"(2020, May 02). Chapter 3. Real-Time and Low Latency. Available online: https:\/\/docs.fedoraproject.org\/en-US\/Fedora\/15\/html\/Musicians_Guide\/chap-Musicians_Guide-Real_Time_and_Low_Latency.html."},{"key":"ref_64","doi-asserted-by":"crossref","first-page":"5274715","DOI":"10.1155\/2017\/5274715","article-title":"An optimized WSN design for latency-critical smart grid applications","volume":"2017","author":"Khanafer","year":"2017","journal-title":"J. Sens."},{"key":"ref_65","doi-asserted-by":"crossref","unstructured":"Weiner, M., Jorgovanovic, M., Sahai, A., and Nikoli\u00e9, B. (2014, January 10\u201314). Design of a low-latency, high-reliability wireless communication system for control applications. Proceedings of the 2014 IEEE International Conference on Communications (ICC), Sydney, Australia.","DOI":"10.1109\/ICC.2014.6883918"},{"key":"ref_66","doi-asserted-by":"crossref","first-page":"020010","DOI":"10.1063\/1.5002028","article-title":"Throughput, latency and cost comparisons of microcontroller-based implementations of wireless sensor network (WSN) in high jump sports","volume":"1883","author":"Ahmad","year":"2017","journal-title":"AIP Conf. Proc."},{"key":"ref_67","first-page":"1","article-title":"WSN Simulators Evaluation: An Approach Focusing on Energy awareness","volume":"11","author":"Bakni","year":"2020","journal-title":"Int. J. Wirel. Mob. Netw."},{"key":"ref_68","unstructured":"(2020, May 02). How Does Temperature Affect the Performance of Computer Components?. Available online: https:\/\/smallbusiness.chron.com\/temperature-affect-performance-computer-components-28197.html."},{"key":"ref_69","doi-asserted-by":"crossref","first-page":"2481","DOI":"10.1007\/s11276-014-0761-7","article-title":"Security of the Internet of Things: Perspectives and challenges","volume":"20","author":"Jing","year":"2014","journal-title":"Wirel. Netw."},{"key":"ref_70","doi-asserted-by":"crossref","first-page":"107208","DOI":"10.1016\/j.comnet.2020.107208","article-title":"An Effective Service-Oriented Networking Management Architecture for 5G-Enabled Internet of Things","volume":"173","author":"Huang","year":"2020","journal-title":"Comput. Netw."},{"key":"ref_71","doi-asserted-by":"crossref","first-page":"102496","DOI":"10.1016\/j.jnca.2019.102496","article-title":"LAM-CIoT: Lightweight authentication mechanism in cloud-based IoT environment","volume":"150","author":"Wazid","year":"2020","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_72","doi-asserted-by":"crossref","first-page":"303501","DOI":"10.1155\/2014\/303501","article-title":"Security analysis in wireless sensor networks","volume":"10","author":"Dener","year":"2014","journal-title":"Int. J. Distrib. Sens. Netw."},{"key":"ref_73","doi-asserted-by":"crossref","first-page":"943475","DOI":"10.1155\/2015\/943475","article-title":"Security trade-off and energy efficiency analysis in wireless sensor networks","volume":"11","author":"Rusinek","year":"2015","journal-title":"Int. J. Distrib. Sens. Netw."},{"key":"ref_74","doi-asserted-by":"crossref","unstructured":"Rani, A., and Kumar, S. (2017, January 9\u201310). A survey of security in wireless sensor networks. Proceedings of the 3rd International Conference on Computational Intelligence & Communication Technology (CICT), Ghaziabad, India.","DOI":"10.1109\/CIACT.2017.7977334"},{"key":"ref_75","first-page":"6","article-title":"Information attacks and security in wireless sensor networks of industrial SCADA systems","volume":"5","author":"Finogeev","year":"2017","journal-title":"J. Ind. Inf. Integr."},{"key":"ref_76","unstructured":"(2020, March 10). The Raspberry pi 3 Max Temperature. Available online: https:\/\/makezine.com\/2016\/03\/02\/raspberry-pi-3-not-halt-catch-fire\/."},{"key":"ref_77","doi-asserted-by":"crossref","first-page":"1933","DOI":"10.1109\/COMST.2014.2320093","article-title":"Survey in smart grid and smart home security: Issues, challenges and countermeasures","volume":"16","author":"Komninos","year":"2014","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_78","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1016\/j.compeleceng.2019.05.006","article-title":"An intelligent and secure smart watering system using fuzzy logic and blockchain","volume":"77","author":"Munir","year":"2019","journal-title":"Comput. Electr. Eng."},{"key":"ref_79","doi-asserted-by":"crossref","unstructured":"Tantidham, T., and Aung, Y.N. (2019, January 11\u201315). Emergency Service for Smart Home System Using Ethereum Blockchain: System and Architecture. Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), Kyoto, Japan.","DOI":"10.1109\/PERCOMW.2019.8730816"}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/20\/10\/2798\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T09:28:47Z","timestamp":1760174927000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/20\/10\/2798"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,5,14]]},"references-count":79,"journal-issue":{"issue":"10","published-online":{"date-parts":[[2020,5]]}},"alternative-id":["s20102798"],"URL":"https:\/\/doi.org\/10.3390\/s20102798","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,5,14]]}}}