{"id":"https://openalex.org/W4415203870","doi":"https://doi.org/10.1007/s12083-025-02141-2","title":"Design, formal verification, and security analysis of SCMChain: A lightweight blockchain-based authentication protocol for IoT-enabled supply chain management","display_name":"Design, formal verification, and security analysis of SCMChain: A lightweight blockchain-based authentication protocol for IoT-enabled supply chain management","publication_year":2025,"publication_date":"2025-10-01","ids":{"openalex":"https://openalex.org/W4415203870","doi":"https://doi.org/10.1007/s12083-025-02141-2"},"language":"en","primary_location":{"id":"doi:10.1007/s12083-025-02141-2","is_oa":false,"landing_page_url":"https://doi.org/10.1007/s12083-025-02141-2","pdf_url":null,"source":{"id":"https://openalex.org/S177487720","display_name":"Peer-to-Peer Networking and Applications","issn_l":"1936-6442","issn":["1936-6442","1936-6450"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Peer-to-Peer Networking and Applications","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5002738999","display_name":"Sudip Kumar Palit","orcid":"https://orcid.org/0000-0003-0981-4935"},"institutions":[{"id":"https://openalex.org/I1296725772","display_name":"University of Engineering & Management","ror":"https://ror.org/02decng19","country_code":"IN","type":"education","lineage":["https://openalex.org/I1296725772"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Sudip Kumar Palit","raw_affiliation_strings":["Cybersecurity Centre of Excellence, Institute of Engineering and Management (IEM), University of Engineering and Management, Kolkata, West Bengal, India"],"affiliations":[{"raw_affiliation_string":"Cybersecurity Centre of Excellence, Institute of Engineering and Management (IEM), University of Engineering and Management, Kolkata, West Bengal, India","institution_ids":["https://openalex.org/I1296725772"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5074354854","display_name":"Mohuya Chakraborty","orcid":"https://orcid.org/0000-0001-7549-8630"},"institutions":[{"id":"https://openalex.org/I1296725772","display_name":"University of Engineering & Management","ror":"https://ror.org/02decng19","country_code":"IN","type":"education","lineage":["https://openalex.org/I1296725772"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Mohuya Chakraborty","raw_affiliation_strings":["Cybersecurity Centre of Excellence, Institute of Engineering and Management (IEM), University of Engineering and Management, Kolkata, West Bengal, India"],"affiliations":[{"raw_affiliation_string":"Cybersecurity Centre of Excellence, Institute of Engineering and Management (IEM), University of Engineering and Management, Kolkata, West Bengal, India","institution_ids":["https://openalex.org/I1296725772"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5059535603","display_name":"Subhalaxmi Chakraborty","orcid":"https://orcid.org/0000-0002-6587-6391"},"institutions":[{"id":"https://openalex.org/I1296725772","display_name":"University of Engineering & Management","ror":"https://ror.org/02decng19","country_code":"IN","type":"education","lineage":["https://openalex.org/I1296725772"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Subhalaxmi Chakraborty","raw_affiliation_strings":["Department of CST & CSIT, Institute of Engineering and Management (IEM), University of Engineering and Management, Kolkata, West Bengal, India"],"affiliations":[{"raw_affiliation_string":"Department of CST & CSIT, Institute of Engineering and Management (IEM), University of Engineering and Management, Kolkata, West Bengal, India","institution_ids":["https://openalex.org/I1296725772"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5002738999"],"corresponding_institution_ids":["https://openalex.org/I1296725772"],"apc_list":{"value":2790,"currency":"EUR","value_usd":3590},"apc_paid":null,"fwci":3.4901,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.94492754,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":99},"biblio":{"volume":"18","issue":"6","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.995199978351593,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9836999773979187,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/security-analysis","display_name":"Security analysis","score":0.5392000079154968},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.531499981880188},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.4828000068664551},{"id":"https://openalex.org/keywords/replay-attack","display_name":"Replay attack","score":0.48179998993873596},{"id":"https://openalex.org/keywords/mutual-authentication","display_name":"Mutual authentication","score":0.4803999960422516},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.475600004196167},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.45210000872612},{"id":"https://openalex.org/keywords/security-information-and-event-management","display_name":"Security information and event management","score":0.40610000491142273},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.4007999897003174},{"id":"https://openalex.org/keywords/one-time-password","display_name":"One-time password","score":0.38749998807907104}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7710999846458435},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7297999858856201},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.5392000079154968},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.531499981880188},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.4828000068664551},{"id":"https://openalex.org/C11560541","wikidata":"https://www.wikidata.org/wiki/Q1756025","display_name":"Replay attack","level":3,"score":0.48179998993873596},{"id":"https://openalex.org/C2781221063","wikidata":"https://www.wikidata.org/wiki/Q6944186","display_name":"Mutual authentication","level":3,"score":0.4803999960422516},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.475600004196167},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.45210000872612},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.40610000491142273},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.4007999897003174},{"id":"https://openalex.org/C89479133","wikidata":"https://www.wikidata.org/wiki/Q1137840","display_name":"One-time password","level":3,"score":0.38749998807907104},{"id":"https://openalex.org/C83163435","wikidata":"https://www.wikidata.org/wiki/Q3954104","display_name":"Security management","level":2,"score":0.3767000138759613},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.3734000027179718},{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.3693999946117401},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.3549000024795532},{"id":"https://openalex.org/C2776384856","wikidata":"https://www.wikidata.org/wiki/Q17145767","display_name":"Trust management (information system)","level":2,"score":0.3440999984741211},{"id":"https://openalex.org/C76178495","wikidata":"https://www.wikidata.org/wiki/Q4808784","display_name":"Asset (computer security)","level":2,"score":0.3416999876499176},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.32820001244544983},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.32690000534057617},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.3262999951839447},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.32260000705718994},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.3222000002861023},{"id":"https://openalex.org/C98705547","wikidata":"https://www.wikidata.org/wiki/Q3394687","display_name":"Password policy","level":4,"score":0.3197000026702881},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3190000057220459},{"id":"https://openalex.org/C22111027","wikidata":"https://www.wikidata.org/wiki/Q1070427","display_name":"Internet security","level":4,"score":0.3098999857902527},{"id":"https://openalex.org/C131129157","wikidata":"https://www.wikidata.org/wiki/Q1059963","display_name":"Challenge\u2013response authentication","level":4,"score":0.30399999022483826},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.3027999997138977},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.3005000054836273},{"id":"https://openalex.org/C116537","wikidata":"https://www.wikidata.org/wiki/Q2169973","display_name":"Service provider","level":3,"score":0.2964000105857849},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.2685999870300293},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.26809999346733093},{"id":"https://openalex.org/C2778971194","wikidata":"https://www.wikidata.org/wiki/Q1664551","display_name":"Insider","level":2,"score":0.2619999945163727},{"id":"https://openalex.org/C12269588","wikidata":"https://www.wikidata.org/wiki/Q132364","display_name":"Communications protocol","level":2,"score":0.26159998774528503},{"id":"https://openalex.org/C67396069","wikidata":"https://www.wikidata.org/wiki/Q210214","display_name":"IPsec","level":3,"score":0.26019999384880066},{"id":"https://openalex.org/C35341882","wikidata":"https://www.wikidata.org/wiki/Q8795","display_name":"Internet Protocol","level":3,"score":0.25949999690055847},{"id":"https://openalex.org/C111498074","wikidata":"https://www.wikidata.org/wiki/Q173326","display_name":"Formal verification","level":2,"score":0.2551000118255615},{"id":"https://openalex.org/C133112747","wikidata":"https://www.wikidata.org/wiki/Q7251931","display_name":"Protocol analysis","level":2,"score":0.2529999911785126},{"id":"https://openalex.org/C21593369","wikidata":"https://www.wikidata.org/wiki/Q1032176","display_name":"Countermeasure","level":2,"score":0.25049999356269836}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/s12083-025-02141-2","is_oa":false,"landing_page_url":"https://doi.org/10.1007/s12083-025-02141-2","pdf_url":null,"source":{"id":"https://openalex.org/S177487720","display_name":"Peer-to-Peer Networking and Applications","issn_l":"1936-6442","issn":["1936-6442","1936-6450"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Peer-to-Peer Networking and Applications","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":39,"referenced_works":["https://openalex.org/W2010939995","https://openalex.org/W2516774445","https://openalex.org/W2799364218","https://openalex.org/W2808991340","https://openalex.org/W2907112888","https://openalex.org/W2937512111","https://openalex.org/W2956919429","https://openalex.org/W2964483447","https://openalex.org/W2972955472","https://openalex.org/W2973245241","https://openalex.org/W2982523999","https://openalex.org/W2997035848","https://openalex.org/W3000302391","https://openalex.org/W3011640829","https://openalex.org/W3031613572","https://openalex.org/W3048597376","https://openalex.org/W3085249174","https://openalex.org/W3091614728","https://openalex.org/W3096341508","https://openalex.org/W3096527641","https://openalex.org/W3101308812","https://openalex.org/W3122066936","https://openalex.org/W3157239374","https://openalex.org/W3159877357","https://openalex.org/W3180299567","https://openalex.org/W3210485629","https://openalex.org/W3217755724","https://openalex.org/W4200364479","https://openalex.org/W4200489356","https://openalex.org/W4206336222","https://openalex.org/W4206684911","https://openalex.org/W4255535209","https://openalex.org/W4288065119","https://openalex.org/W4311050752","https://openalex.org/W4312871233","https://openalex.org/W4382930841","https://openalex.org/W4394689700","https://openalex.org/W4401906271","https://openalex.org/W4404978862"],"related_works":[],"abstract_inverted_index":null,"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2025-12-14T23:10:33.342130","created_date":"2025-10-16T00:00:00"}
