{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T09:01:37Z","timestamp":1775293297625,"version":"3.50.1"},"reference-count":83,"publisher":"MDPI AG","issue":"18","license":[{"start":{"date-parts":[[2022,9,9]],"date-time":"2022-09-09T00:00:00Z","timestamp":1662681600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Knowledge Foundation","award":["20140035"],"award-info":[{"award-number":["20140035"]}]},{"name":"Knowledge Foundation","award":["MOBTT75"],"award-info":[{"award-number":["MOBTT75"]}]},{"name":"European Social Fund","award":["20140035"],"award-info":[{"award-number":["20140035"]}]},{"name":"European Social Fund","award":["MOBTT75"],"award-info":[{"award-number":["MOBTT75"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>Internet of Things (IoT) systems are complex systems that can manage mission-critical, costly operations or the collection, storage, and processing of sensitive data. Therefore, security represents a primary concern that should be considered when engineering IoT systems. Additionally, several challenges need to be addressed, including the following ones. IoT systems\u2019 environments are dynamic and uncertain. For instance, IoT devices can be mobile or might run out of batteries, so they can become suddenly unavailable. To cope with such environments, IoT systems can be engineered as goal-driven and self-adaptive systems. A goal-driven IoT system is composed of a dynamic set of IoT devices and services that temporarily connect and cooperate to achieve a specific goal. Several approaches have been proposed to engineer goal-driven and self-adaptive IoT systems. However, none of the existing approaches enable goal-driven IoT systems to automatically detect security threats and autonomously adapt to mitigate them. Toward bridging these gaps, this paper proposes a distributed architectural Approach for engineering goal-driven IoT Systems that can autonomously SElf-adapt to secuRity Threats in their environments (ASSERT). ASSERT exploits techniques and adopts notions, such as agents, federated learning, feedback loops, and blockchain, for maintaining the systems\u2019 security and enhancing the trustworthiness of the adaptations they perform. The results of the experiments that we conducted to validate the approach\u2019s feasibility show that it performs and scales well when detecting security threats, performing autonomous security adaptations to mitigate the threats and enabling systems\u2019 constituents to learn about security threats in their environments collaboratively.<\/jats:p>","DOI":"10.3390\/s22186842","type":"journal-article","created":{"date-parts":[[2022,9,13]],"date-time":"2022-09-13T04:05:41Z","timestamp":1663041941000},"page":"6842","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":19,"title":["ASSERT: A Blockchain-Based Architectural Approach for Engineering Secure Self-Adaptive IoT Systems"],"prefix":"10.3390","volume":"22","author":[{"given":"Fahed","family":"Alkhabbas","sequence":"first","affiliation":[{"name":"Internet of Things and People Research Center, Malm\u00f6 University, 21119 Malm\u00f6, Sweden"},{"name":"Department of Computer Science and Media Technology, Malm\u00f6 University, 21119 Malm\u00f6, Sweden"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1635-5132","authenticated-orcid":false,"given":"Mohammed","family":"Alsadi","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Norwegian University of Science and Technology, 7491 Trondheim, Norway"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6309-2892","authenticated-orcid":false,"given":"Sadi","family":"Alawadi","sequence":"additional","affiliation":[{"name":"Department of Information Technology, Uppsala University, 75105 Uppsala, Sweden"},{"name":"Center for Applied Intelligent Systems Research, School of Information Technology, Halmstad University, 30118 Halmstad, Sweden"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9561-6099","authenticated-orcid":false,"given":"Feras M.","family":"Awaysheh","sequence":"additional","affiliation":[{"name":"Institute of Computer Science, Delta Research Centre, University of Tartu, 51009 Tartu, Estonia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4071-4596","authenticated-orcid":false,"given":"Victor R.","family":"Kebande","sequence":"additional","affiliation":[{"name":"Department of Computer Science (DIDA), Blekinge Institute of Technology, 37179 Karlskrona, Sweden"}]},{"given":"Mahyar T.","family":"Moghaddam","sequence":"additional","affiliation":[{"name":"The Maersk Mc-Kinney Moller Institute (MMMI), University of Southern Denmark, 5230 Odense, Denmark"}]}],"member":"1968","published-online":{"date-parts":[[2022,9,9]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Giusto, D., Iera, A., Morabito, G., and Atzori, L. (2010). The Internet of Things: 20th Tyrrhenian Workshop on Digital Communications, Springer Science & Business Media.","DOI":"10.1007\/978-1-4419-1674-7"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"2787","DOI":"10.1016\/j.comnet.2010.05.010","article-title":"The Internet of Things: A survey","volume":"54","author":"Atzori","year":"2010","journal-title":"Comput. Netw."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"2098","DOI":"10.1109\/COMST.2021.3094993","article-title":"Big data resource management & networks: Taxonomy, survey, and future directions","volume":"23","author":"Awaysheh","year":"2021","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"100313","DOI":"10.1016\/j.iot.2020.100313","article-title":"What are IoT systems for real? An experts\u2019 survey on software engineering aspects","volume":"12","author":"Reggio","year":"2020","journal-title":"Internet Things"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"100084","DOI":"10.1016\/j.iot.2019.100084","article-title":"Characterizing Internet of Things Systems through Taxonomies: A Systematic Mapping Study","volume":"7","author":"Alkhabbas","year":"2019","journal-title":"Internet Things"},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Alkhabbas, F., Spalazzese, R., and Davidsson, P. (2018, January 24\u201328). ECo-IoT: An Architectural Approach for Realizing Emergent Configurations in the Internet of Things. Proceedings of the 12th European Conference on Software Architecture, ECSA 2018, Madrid, Spain.","DOI":"10.1007\/978-3-030-00761-4_6"},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Ciortea, A., Boissier, O., Zimmermann, A., and Florea, A.M. (2016, January 7\u20139). Responsive Decentralized Composition of Service Mashups for the Internet of Things. Proceedings of the 6th International Conference on the Internet of Things, ACM, Stuttgart, Germany.","DOI":"10.1145\/2991561.2991573"},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Alkhabbas, F., Spalazzese, R., and Davidsson, P. (2020). An agent-based approach to realize emergent configurations in the internet of things. Electronics, 9.","DOI":"10.3390\/electronics9091347"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"1247","DOI":"10.1109\/TASE.2016.2533321","article-title":"Smart configuration of smart environments","volume":"13","author":"Mayer","year":"2016","journal-title":"IEEE Trans. Autom. Sci. Eng."},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Sohrabi, S., Prokoshyna, N., and McIlraith, S.A. (2009). Web service composition via the customization of Golog programs with user preferences. Conceptual Modeling: Foundations and Applications, Springer.","DOI":"10.1007\/978-3-642-02463-4_17"},{"key":"ref_11","unstructured":"Hachem, S., Pathak, A., and Issarny, V. (2014, January 8\u201312). Service-oriented Middleware for the Mobile Internet of Things: A Scalable Solution. Proceedings of the IEEE GLOBECOM: Global Communications Conference, Austin, TX, USA."},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Spiess, P., Karnouskos, S., Guinard, D., Savio, D., Baecker, O., De Souza, L.M.S., and Trifa, V. (2009, January 6\u201310). SOA-based integration of the internet of things in enterprise services. Proceedings of the 2009 IEEE International Conference on Web Services, Los Angeles, CA, USA.","DOI":"10.1109\/ICWS.2009.98"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1016\/j.future.2022.01.012","article-title":"QoS-aware placement of microservices-based IoT applications in Fog computing environments","volume":"131","author":"Pallewatta","year":"2022","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_14","first-page":"1","article-title":"Intelligent process adaptation in the SmartPM system","volume":"8","author":"Marrella","year":"2016","journal-title":"ACM Trans. Intell. Syst. Technol. (TIST)"},{"key":"ref_15","unstructured":"Hussein, M., Li, S., and Radermacher, A. (2017, January 17). Model-driven Development of Adaptive IoT Systems. Proceedings of the MODELS (Satellite Events), Austin, TX, USA."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"1117","DOI":"10.1007\/s10270-017-0639-0","article-title":"Toward a framework for self-adaptive workflows in cyber-physical systems","volume":"18","author":"Seiger","year":"2019","journal-title":"Softw. Syst. Model."},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Alkhabbas, F. (2020). Realizing Emergent Configurations in the Internet of Things. [Ph.D. Thesis, Malm\u00f6 Universitet].","DOI":"10.3390\/electronics9091347"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3234148","article-title":"A survey on self-adaptive security for large-scale open environments","volume":"51","author":"Tziakouris","year":"2018","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1109\/MSP.2018.2825478","article-title":"IoT security techniques based on machine learning: How do IoT devices use AI to enhance security?","volume":"35","author":"Xiao","year":"2018","journal-title":"IEEE Signal Process. Mag."},{"key":"ref_20","unstructured":"Awaysheh, F.M., Aladwan, M.N., Alazab, M., Alawadi, S., Cabaleiro, J.C., and Pena, T.F. (2021). Security by design for big data frameworks over cloud computing. IEEE Trans. Eng. Manag., 1\u201318."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"102481","DOI":"10.1016\/j.jnca.2019.102481","article-title":"A comprehensive survey on attacks, security issues and blockchain solutions for IoT and IIoT","volume":"149","author":"Sengupta","year":"2020","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"36908","DOI":"10.1109\/ACCESS.2021.3063002","article-title":"Active machine learning adversarial attack detection in the user feedback process","volume":"9","author":"Kebande","year":"2021","journal-title":"IEEE Access"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"6203","DOI":"10.1109\/TII.2020.2966288","article-title":"TrustE-VC: Trustworthy evaluation framework for industrial connected vehicles in the cloud","volume":"16","author":"Aladwan","year":"2020","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_24","unstructured":"Nakamoto, S. (2008). Bitcoin: A peer-to-peer electronic cash system. Decentralized Bus. Rev., 21260. Available online: https:\/\/www.debr.io\/article\/21260-bitcoin-a-peer-to-peer-electronic-cash-system."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"2117","DOI":"10.1080\/00207543.2018.1533261","article-title":"Blockchain technology and its relationships to sustainable supply chain management","volume":"57","author":"Saberi","year":"2019","journal-title":"Int. J. Prod. Res."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"147782","DOI":"10.1109\/ACCESS.2019.2946373","article-title":"Using blockchain for electronic health records","volume":"7","author":"Shahnaz","year":"2019","journal-title":"IEEE Access"},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1109\/MS.2018.2801546","article-title":"Blockchain-enabled e-voting","volume":"35","author":"Kshetri","year":"2018","journal-title":"IEEE Softw."},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Kebande, V.R., Awaysheh, F.M., Ikuesan, R.A., Alawadi, S.A., and Alshehri, M.D. (2021). A Blockchain-Based Multi-Factor Authentication Model for a Cloud-Enabled Internet of Vehicles. Sensors, 21.","DOI":"10.20944\/preprints202107.0429.v1"},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Wu, J., and Tran, N.K. (2018). Application of blockchain technology in sustainable energy systems: An overview. Sustainability, 10.","DOI":"10.3390\/su10093067"},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1049\/ip-sen:19971026","article-title":"Agent-based software engineering","volume":"144","author":"Wooldridge","year":"1997","journal-title":"IEE Proc. Softw. Eng."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1162\/artl.1993.1.1_2.135","article-title":"Modeling adaptive autonomous agents","volume":"1","author":"Maes","year":"1993","journal-title":"Artif. Life"},{"key":"ref_32","unstructured":"Ferber, J., and Weiss, G. (1999). Multi-Agent Systems: An Introduction to Distributed Artificial Intelligence, Addison-Wesley."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"1038","DOI":"10.1016\/j.future.2019.09.016","article-title":"Agent-based Internet of Things: State-of-the-art and research challenges","volume":"102","author":"Savaglio","year":"2020","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"e16","DOI":"10.1017\/S0269888918000176","article-title":"Towards adaptive multi-robot systems: Self-organization and self-adaptation","volume":"33","author":"Hrabia","year":"2018","journal-title":"Knowl. Eng. Rev."},{"key":"ref_35","first-page":"473","article-title":"Modeling rational agents within a BDI-architecture","volume":"91","author":"Rao","year":"1991","journal-title":"KR"},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Viroli, M., Casadei, M., and Omicini, A. (2009, January 9\u201312). A framework for modelling and implementing self-organising coordination. Proceedings of the 2009 ACM Symposium on Applied Computing, Honolulu, HI, USA.","DOI":"10.1145\/1529282.1529585"},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3355562","article-title":"Collective adaptation through multi-agents ensembles: The case of smart urban mobility","volume":"14","author":"Bucchiarone","year":"2019","journal-title":"ACM Trans. Auton. Adapt. Syst. (TAAS)"},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Bures, T., Gerostathopoulos, I., Hnetynka, P., Keznikl, J., Kit, M., and Plasil, F. (2013, January 17\u201321). DEECO: An ensemble-based component system. Proceedings of the 16th International ACM Sigsoft symposium on Component-Based Software Engineering, Vancouver, BC, Canada.","DOI":"10.1145\/2465449.2465462"},{"key":"ref_39","unstructured":"Christie, S.H., Smirnova, D., Chopra, A.K., and Munindar, P.S. (2020, January 8\u20139). Decentralized Programming for the Internet of Things. Proceedings of the 8th International Workshop on Engineering Multi-Agent Systems, Auckland, New Zealand."},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Chopra, A.K., Christie V, S.H., and Singh, M.P. (2019). An Evaluation of Communication Protocol Languages for Engineering Multiagent Systems. arXiv.","DOI":"10.1613\/jair.1.12212"},{"key":"ref_41","unstructured":"Trentin, I.F., Boissier, O., and Ramparany, F. (2019, January 2\u20134). Insights about user-centric contextual online adaptation of coordinated multi-agent systems in smart homes. Proceedings of the Rencontres des Jeunes Chercheurs en Intelligence Artificielle 2019, Toulouse, France."},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"De Lemos, R., Giese, H., M\u00fcller, H.A., Shaw, M., Andersson, J., Litoiu, M., Schmerl, B., Tamura, G., Villegas, N.M., and Vogel, T. (2013). Software engineering for self-adaptive systems: A second research roadmap. Software Engineering for Self-Adaptive Systems II, Springer.","DOI":"10.1007\/978-3-642-35813-5_1"},{"key":"ref_43","doi-asserted-by":"crossref","unstructured":"Muccini, H., Sharaf, M., and Weyns, D. (2016, January 16\u201317). Self-adaptation for cyber-physical systems: A systematic literature review. Proceedings of the 11th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, Austin, TX, USA.","DOI":"10.1145\/2897053.2897069"},{"key":"ref_44","doi-asserted-by":"crossref","unstructured":"Shevtsov, S., and Weyns, D. (2016, January 13\u201318). Keep it simplex: Satisfying multiple goals with guarantees in control-based self-adaptive systems. Proceedings of the 2016 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering, Seattle, WA, USA.","DOI":"10.1145\/2950290.2950301"},{"key":"ref_45","doi-asserted-by":"crossref","unstructured":"Ghahremani, S., Giese, H., and Vogel, T. (2017, January 17\u201321). Efficient utility-driven self-healing employing adaptation rules for large dynamic architectures. Proceedings of the 2017 IEEE International Conference on Autonomic Computing (ICAC), Columbus, OH, USA.","DOI":"10.1109\/ICAC.2017.35"},{"key":"ref_46","unstructured":"Khazaei, H., Ghanbari, A., and Litoiu, M. (2018, January 29\u201331). Adaptation as a service. Proceedings of the CASCON, Markham, ON, Canada."},{"key":"ref_47","doi-asserted-by":"crossref","unstructured":"Zhang, Z., Shao, L., Xu, Y., Liu, L., and Yang, J. (2017). Marginal representation learning with graph structure self-adaptation. IEEE Trans. Neural Netw. Learn. Syst., 29.","DOI":"10.1109\/TNNLS.2017.2772264"},{"key":"ref_48","doi-asserted-by":"crossref","unstructured":"Alkhabbas, F., Alawadi, S., Spalazzese, R., and Davidsson, P. (2020, January 6\u20139). Activity recognition and user preference learning for automated configuration of IoT environments. Proceedings of the 10th International Conference on the Internet of Things, Malm\u00f6, Sweden.","DOI":"10.1145\/3410992.3411003"},{"key":"ref_49","doi-asserted-by":"crossref","unstructured":"Cheung-Foo-Wo, D., Tigli, J.Y., Lavirotte, S., and Riveill, M. (2007, January 26\u201330). Self-adaptation of event-driven component-oriented Middleware using Aspects of Assembly. Proceedings of the 5th International Workshop on Middleware for Pervasive and Ad-Hoc Computing: Held at the ACM\/IFIP\/USENIX 8th International Middleware Conference, Newport Beach, CA, USA.","DOI":"10.1145\/1376866.1376872"},{"key":"ref_50","unstructured":"Moghaddam, M.T., Rutten, E., and Giraud, G. (2022, January 4\u20137). Hierarchical control for self-adaptive iot systems a constraint programming-based adaptation approach. Proceedings of the HICSS 2022, Maui, HI, USA."},{"key":"ref_51","doi-asserted-by":"crossref","first-page":"2031","DOI":"10.1109\/COMST.2020.2986024","article-title":"Federated learning in mobile edge networks: A comprehensive survey","volume":"22","author":"Lim","year":"2020","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_52","first-page":"50","article-title":"Federated learning: Challenges, methods, and future directions","volume":"37","author":"Li","year":"2020","journal-title":"IEEE Signal Process. Mag."},{"key":"ref_53","doi-asserted-by":"crossref","unstructured":"Cai, Z., and He, Z. (2019, January 7\u201310). Trading private range counting over big IoT data. Proceedings of the 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS), Dallas, TX, USA.","DOI":"10.1109\/ICDCS.2019.00023"},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"3088","DOI":"10.1109\/JIOT.2020.3007662","article-title":"Realizing the heterogeneity: A self-organized federated learning framework for IoT","volume":"8","author":"Pang","year":"2020","journal-title":"IEEE Internet Things J."},{"key":"ref_55","unstructured":"McMahan, B., Moore, E., Ramage, D., Hampson, S., and Aguera y Arcas, B. (2017, January 20\u201322). Communication-efficient learning of deep networks from decentralized data. Proceedings of the Artificial Intelligence and Statistics, Fort Lauderdale, FL, USA."},{"key":"ref_56","unstructured":"Bonawitz, K., Eichner, H., Grieskamp, W., Huba, D., Ingerman, A., Ivanov, V., Kiddon, C., Kone\u010dn\u1ef3, J., Mazzocchi, S., and McMahan, H.B. (2019). Towards federated learning at scale: System design. arXiv."},{"key":"ref_57","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1016\/j.jss.2006.05.024","article-title":"A general model of software architecture design derived from five industrial approaches","volume":"80","author":"Hofmeister","year":"2007","journal-title":"J. Syst. Softw."},{"key":"ref_58","unstructured":"Obbink, H., Kruchten, P., Kozaczynski, W., Postema, H., Ran, A., Lutz Kazman, R.D., Hilliard, R., Tracz, W., and Kahane, E. (2022, July 27). Report on Software Architecture Review and Assessment (SARA). Technical Report. Available online: https:\/\/pkruchten.files.wordpress.com\/2011\/09\/sarav1.pdf."},{"key":"ref_59","unstructured":"Hilliard, R. (2000). IEEE-STD-1471-2000 Recommended Practice for Architectural Description of Software-Intensive Systems, IEEE. Available online: http:\/\/standards.ieee.org."},{"key":"ref_60","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1109\/MS.2017.1","article-title":"Model-driven engineering for mission-critical iot systems","volume":"34","author":"Ciccozzi","year":"2017","journal-title":"IEEE Softw."},{"key":"ref_61","doi-asserted-by":"crossref","unstructured":"Bozhinoski, D., Bucchiarone, A., Malavolta, I., Marconi, A., and Pelliccione, P. (September, January 31). Leveraging collective run-time adaptation for UAV-based systems. Proceedings of the 2016 42th Euromicro Conference on Software Engineering and Advanced Applications (SEAA), Limassol, Cyprus.","DOI":"10.1109\/SEAA.2016.41"},{"key":"ref_62","unstructured":"Bass, L., Clements, P., and Kazman, R. (2012). Software Architecture in Practice, Addison-Wesley Professional. [3rd ed.]."},{"key":"ref_63","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1109\/52.469759","article-title":"The 4 + 1 view model of architecture","volume":"12","author":"Kruchten","year":"1995","journal-title":"IEEE Softw."},{"key":"ref_64","doi-asserted-by":"crossref","unstructured":"Toor, S., Lindberg, M., Falman, I., Vallin, A., Mohill, O., Freyhult, P., Nilsson, L., Agback, M., Viklund, L., and Zazzik, H. (2017, January 24\u201327). SNIC Science Cloud (SSC): A national-scale cloud infrastructure for Swedish academia. Proceedings of the 2017 IEEE 13th International Conference on e-Science (e-Science), Auckland, New Zealand.","DOI":"10.1109\/eScience.2017.35"},{"key":"ref_65","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1109\/TSC.2016.2533348","article-title":"Goal-driven service composition in mobile and pervasive computing","volume":"11","author":"Chen","year":"2016","journal-title":"IEEE Trans. Serv. Comput."},{"key":"ref_66","doi-asserted-by":"crossref","unstructured":"De Sanctis, M., Spalazzese, R., and Trubiani, C. (2019, January 9\u201313). QoS-Based Formation of Software Architectures in the Internet of Things. Proceedings of the European Conference on Software Architecture, Paris, France.","DOI":"10.1007\/978-3-030-29983-5_12"},{"key":"ref_67","doi-asserted-by":"crossref","unstructured":"Alkhabbas, F., De Sanctis, M., Spalazzese, R., Bucchiarone, A., Davidsson, P., and Marconi, A. (2018, January 12\u201315). Enacting Emergent Configurations in the IoT Through Domain Objects. Proceedings of the International Conference on Service-Oriented Computing, Hangzhou, China.","DOI":"10.1007\/978-3-030-03596-9_19"},{"key":"ref_68","doi-asserted-by":"crossref","first-page":"59848","DOI":"10.1109\/ACCESS.2021.3071431","article-title":"A Secure Trust Method for Multi-Agent System in Smart Grids Using Blockchain","volume":"9","author":"Khalid","year":"2021","journal-title":"IEEE Access"},{"key":"ref_69","doi-asserted-by":"crossref","first-page":"107368","DOI":"10.1016\/j.knosys.2021.107368","article-title":"Blockchain and multi-agent system for meme discovery and prediction in social network","volume":"229","author":"Yang","year":"2021","journal-title":"Knowl. Based Syst."},{"key":"ref_70","doi-asserted-by":"crossref","first-page":"721","DOI":"10.1016\/j.future.2019.09.002","article-title":"Blockiotintelligence: A blockchain-enabled intelligent IoT architecture with artificial intelligence","volume":"110","author":"Singh","year":"2020","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_71","doi-asserted-by":"crossref","unstructured":"Wazid, M., Bera, B., Mitra, A., Das, A.K., and Ali, R. (2020, January 25). Private blockchain-envisioned security framework for AI-enabled IoT-based drone-aided healthcare services. Proceedings of the 2nd ACM MobiCom Workshop on Drone Assisted Wireless Communications for 5G and Beyond, London, UK.","DOI":"10.1145\/3414045.3415941"},{"key":"ref_72","doi-asserted-by":"crossref","unstructured":"Huang, J., Kong, L., Chen, G., Cheng, L., Wu, K., and Liu, X. (2019, January 7\u201310). B-IoT: Blockchain driven Internet of Things with credit-based consensus mechanism. Proceedings of the 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS), Dallas, TX, USA.","DOI":"10.1109\/ICDCS.2019.00135"},{"key":"ref_73","doi-asserted-by":"crossref","unstructured":"Kebande, V.R., Ikuesan, R.A., Awaysheh, F.M., and Alawadi, S. (2021, January 15\u201317). Towards a Learning-enabled Virtual Sensor Forensic Architecture Compliant with Edge Intelligence. Proceedings of the 2021 Second International Conference on Intelligent Data Science Technologies and Applications (IDSTA), Tartu, Estonia.","DOI":"10.1109\/IDSTA53674.2021.9660795"},{"key":"ref_74","doi-asserted-by":"crossref","unstructured":"Lee, H.C., and Lee, S.W. (2017, January 4\u20138). Trust as Soft Security for Self-Adaptive Systems: A Literature Survey. Proceedings of the 2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC), Turin, Italy.","DOI":"10.1109\/COMPSAC.2017.255"},{"key":"ref_75","doi-asserted-by":"crossref","unstructured":"Kim, M.J., Shehab, M., Lee, H.C., and Lee, S.W. (2018, January 7\u201310). Trust-Aware Goal Modeling from Use Case for Cooperative Self-Adaptive Systems. Proceedings of the 2018 IEEE International Conference on Systems, Man, and Cybernetics (SMC), Miyazaki, Japan.","DOI":"10.1109\/SMC.2018.00744"},{"key":"ref_76","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1016\/j.future.2020.03.031","article-title":"MAPE-K\/MAPE-SAC: An interaction framework for adaptive systems with security assurance cases","volume":"109","author":"Jahan","year":"2020","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_77","doi-asserted-by":"crossref","unstructured":"Skandylas, C., Khakpour, N., and Andersson, J. (2020, January 17\u201321). Self-Adaptive Trust-Aware Decentralized Information Flow Control, Extended Version. Proceedings of the 2020 IEEE International Conference on Autonomic Computing and Self-Organizing Systems (ACSOS), Washington, DC, USA.","DOI":"10.1109\/ACSOS49614.2020.00030"},{"key":"ref_78","doi-asserted-by":"crossref","unstructured":"Muccini, H., and Vaidhyanathan, K. (2020, January 14\u201317). Leveraging machine learning techniques for architecting self-adaptive iot systems. Proceedings of the 2020 IEEE International Conference on Smart Computing (SMARTCOMP), Bologna, Italy.","DOI":"10.1109\/SMARTCOMP50058.2020.00029"},{"key":"ref_79","first-page":"1","article-title":"Blockchain-based systems and applications: A survey","volume":"21","author":"Zhang","year":"2020","journal-title":"J. Internet Technol."},{"key":"ref_80","first-page":"1681","article-title":"Blockchain based data storage mechanism in cyber physical system","volume":"21","author":"Wang","year":"2020","journal-title":"J. Internet Technol."},{"key":"ref_81","first-page":"2365","article-title":"Data secure storage mechanism of sensor networks based on blockchain","volume":"65","author":"Wang","year":"2020","journal-title":"CMC-Comput. Mater. Contin."},{"key":"ref_82","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1016\/j.jpdc.2020.11.003","article-title":"A blockchain-based roadside unit-assisted authentication and key agreement protocol for internet of vehicles","volume":"149","author":"Xu","year":"2021","journal-title":"J. Parallel Distrib. Comput."},{"key":"ref_83","doi-asserted-by":"crossref","unstructured":"G\u00f3rski, T. (2022). Reconfigurable Smart Contracts for Renewable Energy Exchange with Re-Use of Verification Rules. Appl. Sci., 12.","DOI":"10.3390\/app12115339"}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/22\/18\/6842\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T00:28:37Z","timestamp":1760142517000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/22\/18\/6842"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,9]]},"references-count":83,"journal-issue":{"issue":"18","published-online":{"date-parts":[[2022,9]]}},"alternative-id":["s22186842"],"URL":"https:\/\/doi.org\/10.3390\/s22186842","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,9,9]]}}}