{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,11,19]],"date-time":"2024-11-19T18:27:26Z","timestamp":1732040846456},"reference-count":45,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computer Communications"],"published-print":{"date-parts":[[2022,1]]},"DOI":"10.1016\/j.comcom.2021.09.029","type":"journal-article","created":{"date-parts":[[2021,10,12]],"date-time":"2021-10-12T02:32:26Z","timestamp":1634005946000},"page":"274-283","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":124,"special_numbering":"C","title":["AI-empowered, blockchain and SDN integrated security architecture for IoT network of cyber physical systems"],"prefix":"10.1016","volume":"181","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-0690-2326","authenticated-orcid":false,"given":"Sohaib A.","family":"Latif","sequence":"first","affiliation":[]},{"given":"Fang B. Xian","family":"Wen","sequence":"additional","affiliation":[]},{"given":"Celestine","family":"Iwendi","sequence":"additional","affiliation":[]},{"given":"Li-li F.","family":"Wang","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0003-0886-9061","authenticated-orcid":false,"given":"Syed Muhammad","family":"Mohsin","sequence":"additional","affiliation":[]},{"given":"Zhaoyang","family":"Han","sequence":"additional","affiliation":[]},{"given":"Shahab S.","family":"Band","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.comcom.2021.09.029_b1","article-title":"Vehicle trajectory clustering based on dynamic representation learning of internet of vehicles","author":"Wang","year":"2020","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"10.1016\/j.comcom.2021.09.029_b2","article-title":"An attention-based deep learning framework for trip destination prediction of sharing bike","author":"Wang","year":"2020","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"10.1016\/j.comcom.2021.09.029_b3","article-title":"A blockchain-empowered AAA scheme in the large-scale HetNet","author":"Shi","year":"2020","journal-title":"Digit. Commun. Netw."},{"key":"10.1016\/j.comcom.2021.09.029_b4","article-title":"Secure and resilient artificial intelligence of things: A HoneyNet approach for threat detection and situational awareness","author":"Tan","year":"2021","journal-title":"IEEE Consum. Electron. Mag."},{"issue":"6","key":"10.1016\/j.comcom.2021.09.029_b5","doi-asserted-by":"crossref","first-page":"913","DOI":"10.1109\/TDSC.2019.2906921","article-title":"Guest editors\u2019 introduction: Special section on security in emerging networking technologies","volume":"16","author":"Ahn","year":"2019","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"2","key":"10.1016\/j.comcom.2021.09.029_b6","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1016\/j.dcan.2017.07.001","article-title":"Edge computing technologies for Internet of Things: A primer","volume":"4","author":"Ai","year":"2018","journal-title":"Digit. Commun. Netw."},{"issue":"2","key":"10.1016\/j.comcom.2021.09.029_b7","first-page":"127","article-title":"Exploring the RFID mutual authentication domain","volume":"43","author":"Mohsin","year":"2021","journal-title":"Int. J. Comput. Appl."},{"key":"10.1016\/j.comcom.2021.09.029_b8","doi-asserted-by":"crossref","first-page":"99273","DOI":"10.1109\/ACCESS.2020.2995801","article-title":"A lightweight post-quantum lattice-based RSA for secure communications","volume":"8","author":"Mustafa","year":"2020","journal-title":"IEEE Access"},{"key":"10.1016\/j.comcom.2021.09.029_b9","doi-asserted-by":"crossref","first-page":"136524","DOI":"10.1109\/ACCESS.2020.3007717","article-title":"Noise free fully homomorphic encryption scheme over non-associative algebra","volume":"8","author":"Mustafa","year":"2020","journal-title":"IEEE Access"},{"key":"10.1016\/j.comcom.2021.09.029_b10","doi-asserted-by":"crossref","DOI":"10.1016\/j.trc.2020.102877","article-title":"Congestion recognition for hybrid urban road systems via digraph convolutional network","volume":"121","author":"Han","year":"2020","journal-title":"Transp. Res. C"},{"key":"10.1016\/j.comcom.2021.09.029_b11","article-title":"Mobile edge cooperation optimization for wearable internet of things: A network representation-based framework","author":"Kong","year":"2020","journal-title":"IEEE Trans. Ind. Inf."},{"issue":"3","key":"10.1016\/j.comcom.2021.09.029_b12","first-page":"539","article-title":"Energy efficient secured cluster based distributed fault diagnosis protocol for IoT","volume":"10","author":"Ara","year":"2018","journal-title":"Int. J. Commun. Netw. Inf. Secur."},{"issue":"2","key":"10.1016\/j.comcom.2021.09.029_b13","first-page":"127","article-title":"Exploring the RFID mutual authentication domain","volume":"43","author":"Mohsin","year":"2021","journal-title":"Int. J. Comput. Appl."},{"key":"10.1016\/j.comcom.2021.09.029_b14","series-title":"2017 International Conference on Computing, Communication and Automation","first-page":"720","article-title":"BSS: Blockchain security over software defined network","author":"Basnet","year":"2017"},{"issue":"5","key":"10.1016\/j.comcom.2021.09.029_b15","doi-asserted-by":"crossref","first-page":"979","DOI":"10.3390\/s17050979","article-title":"An authentication protocol for future sensor networks","volume":"17","author":"Bilal","year":"2017","journal-title":"Sensors"},{"issue":"10","key":"10.1016\/j.comcom.2021.09.029_b16","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1109\/MCOM.001.1900063","article-title":"Toward disaggregating the SDN control plane","volume":"57","author":"Comer","year":"2019","journal-title":"IEEE Commun. Mag."},{"key":"10.1016\/j.comcom.2021.09.029_b17","series-title":"Internet of Things security and Forensics: Challenges and opportunities","author":"Conti","year":"2018"},{"key":"10.1016\/j.comcom.2021.09.029_b18","series-title":"A Programmer\u2019s Guide to Ethereum and Serpent","author":"Delmolino","year":"2015"},{"key":"10.1016\/j.comcom.2021.09.029_b19","series-title":"Blockchain in internet of things: Challenges and solutions","author":"Dorri","year":"2016"},{"key":"10.1016\/j.comcom.2021.09.029_b20","series-title":"2017 IEEE International Conference on Pervasive Computing and Communications Workshops","first-page":"618","article-title":"Blockchain for IoT security and privacy: The case study of a smart home","author":"Dorri","year":"2017"},{"key":"10.1016\/j.comcom.2021.09.029_b21","article-title":"Performance analysis of DSDV, AODV and AOMDV routing protocols based on fixed and mobility network model in wireless sensor network","author":"Ema","year":"2014","journal-title":"Glob. J. Comput. Sci. Technol."},{"key":"10.1016\/j.comcom.2021.09.029_b22","series-title":"2015 11th International Conference on Network and Service Management","first-page":"384","article-title":"Mininet-WiFi: Emulating software-defined wireless networks","author":"Fontes","year":"2015"},{"key":"10.1016\/j.comcom.2021.09.029_b23","doi-asserted-by":"crossref","first-page":"126","DOI":"10.1016\/j.cose.2018.06.004","article-title":"Bubbles of trust: A decentralized blockchain-based authentication system for IoT","volume":"78","author":"Hammi","year":"2018","journal-title":"Comput. Secur."},{"key":"10.1016\/j.comcom.2021.09.029_b24","series-title":"2017 19th International Conference on Advanced Communication Technology","first-page":"464","article-title":"Managing IoT devices using blockchain platform","author":"Huh","year":"2017"},{"key":"10.1016\/j.comcom.2021.09.029_b25","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2019.06.022","article-title":"A survey on multi-layer IP and optical software-defined networks","volume":"162","author":"Kantor","year":"2019","journal-title":"Comput. Netw."},{"issue":"4","key":"10.1016\/j.comcom.2021.09.029_b26","doi-asserted-by":"crossref","first-page":"6835","DOI":"10.1109\/JIOT.2019.2911969","article-title":"Proof-of-work consensus approach in blockchain technology for cloud and fog computing using maximization-factorization statistics","volume":"6","author":"Kumar","year":"2019","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.comcom.2021.09.029_b27","series-title":"Proceeding of IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks 2014","first-page":"1","article-title":"Opendaylight: Towards a model-driven SDN controller architecture","author":"Medved","year":"2014"},{"key":"10.1016\/j.comcom.2021.09.029_b28","series-title":"2017 IEEE International Conference on Systems, Man, and Cybernetics","first-page":"2567","article-title":"A review on consensus algorithm of blockchain","author":"Mingxiao","year":"2017"},{"issue":"3","key":"10.1016\/j.comcom.2021.09.029_b29","doi-asserted-by":"crossref","first-page":"1617","DOI":"10.1109\/SURV.2014.012214.00180","article-title":"A survey of software-defined networking: Past, present, and future of programmable networks","volume":"16","author":"Nunes","year":"2014","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"10.1016\/j.comcom.2021.09.029_b30","series-title":"2018 6th International Conference on Future Internet of Things and Cloud Workshops","first-page":"214","article-title":"On the understanding of gamification in blockchain systems","author":"Parizi","year":"2018"},{"key":"10.1016\/j.comcom.2021.09.029_b31","series-title":"International Conference on Blockchain","first-page":"75","article-title":"Smart contract programming languages on blockchains: An empirical evaluation of usability and security","author":"Parizi","year":"2018"},{"key":"10.1016\/j.comcom.2021.09.029_b32","series-title":"2019 IEEE Canadian Conference of Electrical and Computer Engineering","first-page":"1","article-title":"Integrating privacy enhancing techniques into blockchains using sidechains","author":"Parizi","year":"2019"},{"key":"10.1016\/j.comcom.2021.09.029_b33","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1109\/ACCESS.2017.2757955","article-title":"A software defined fog node based distributed blockchain cloud architecture for IoT","volume":"6","author":"Sharma","year":"2017","journal-title":"IEEE Access"},{"issue":"1","key":"10.1016\/j.comcom.2021.09.029_b34","article-title":"Block-VN: A distributed blockchain based vehicular network architecture in Smart City","volume":"13","author":"Sharma","year":"2017","journal-title":"J. Inf. Process. Syst."},{"key":"10.1016\/j.comcom.2021.09.029_b35","doi-asserted-by":"crossref","first-page":"650","DOI":"10.1016\/j.future.2018.04.060","article-title":"Blockchain based hybrid network architecture for the Smart City","volume":"86","author":"Sharma","year":"2018","journal-title":"Future Gener. Comput. Syst."},{"issue":"9","key":"10.1016\/j.comcom.2021.09.029_b36","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1109\/MCOM.2017.1700041","article-title":"Distblocknet: A distributed blockchains-based secure SDN architecture for iot networks","volume":"55","author":"Sharma","year":"2017","journal-title":"IEEE Commun. Mag."},{"issue":"2","key":"10.1016\/j.comcom.2021.09.029_b37","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1016\/j.dcan.2019.01.005","article-title":"A systematic literature review of blockchain cyber security","volume":"6","author":"Taylor","year":"2020","journal-title":"Digit. Commun. Netw."},{"key":"10.1016\/j.comcom.2021.09.029_b38","series-title":"2017 IEEE Conference on Network Function Virtualization and Software Defined Networks","first-page":"303","article-title":"Enhancing SDN security for IoT-related deployments through blockchain","author":"Tselios","year":"2017"},{"key":"10.1016\/j.comcom.2021.09.029_b39","series-title":"Cisco annual internet report (2018\u20132023) white paper","author":"Cisco","year":"2020"},{"key":"10.1016\/j.comcom.2021.09.029_b40","article-title":"A bitcoin transaction network analytic method for future blockchain forensic investigation","author":"Wu","year":"2020","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"issue":"1","key":"10.1016\/j.comcom.2021.09.029_b41","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1109\/COMST.2014.2330903","article-title":"A survey on software-defined networking","volume":"17","author":"Xia","year":"2014","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"10.1016\/j.comcom.2021.09.029_b42","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2019.101598","article-title":"An organization-friendly blockchain system","volume":"88","author":"Zheng","year":"2020","journal-title":"Comput. Secur."},{"issue":"1","key":"10.1016\/j.comcom.2021.09.029_b43","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1109\/JPROC.2017.2781198","article-title":"Safety and security in cyber-physical systems and internet-of-things systems","volume":"106","author":"Wolf","year":"2017","journal-title":"Proc. IEEE"},{"key":"10.1016\/j.comcom.2021.09.029_b44","doi-asserted-by":"crossref","first-page":"176","DOI":"10.1016\/j.jmsy.2020.11.017","article-title":"Cyber-physical systems architectures for industrial internet of things applications in Industry 4.0: A literature review","volume":"58","author":"Pivoto","year":"2021","journal-title":"J. Manuf. Syst."},{"key":"10.1016\/j.comcom.2021.09.029_b45","first-page":"1","article-title":"Artificial intelligence and the Internet of Things in Industry 4.0","author":"Radanliev","year":"2021","journal-title":"CCF Trans. Pervasive Comput. Interact."}],"container-title":["Computer Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0140366421003662?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0140366421003662?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2023,1,4]],"date-time":"2023-01-04T04:50:13Z","timestamp":1672807813000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0140366421003662"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1]]},"references-count":45,"alternative-id":["S0140366421003662"],"URL":"https:\/\/doi.org\/10.1016\/j.comcom.2021.09.029","relation":{},"ISSN":["0140-3664"],"issn-type":[{"value":"0140-3664","type":"print"}],"subject":[],"published":{"date-parts":[[2022,1]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"AI-empowered, blockchain and SDN integrated security architecture for IoT network of cyber physical systems","name":"articletitle","label":"Article Title"},{"value":"Computer Communications","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.comcom.2021.09.029","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2021 Elsevier B.V. All rights reserved.","name":"copyright","label":"Copyright"}]}}