{"id":"https://openalex.org/W2975872441","doi":"https://doi.org/10.1109/tii.2019.2943331","title":"Achieving Intelligent Trust-Layer for Internet-of-Things via Self-Redactable Blockchain","display_name":"Achieving Intelligent Trust-Layer for Internet-of-Things via Self-Redactable Blockchain","publication_year":2019,"publication_date":"2019-09-25","ids":{"openalex":"https://openalex.org/W2975872441","doi":"https://doi.org/10.1109/tii.2019.2943331","mag":"2975872441"},"language":"en","primary_location":{"id":"doi:10.1109/tii.2019.2943331","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tii.2019.2943331","pdf_url":null,"source":{"id":"https://openalex.org/S184777250","display_name":"IEEE Transactions on Industrial Informatics","issn_l":"1551-3203","issn":["1551-3203","1941-0050"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Industrial Informatics","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5076155477","display_name":"Ke Huang","orcid":"https://orcid.org/0000-0002-5102-610X"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Ke Huang","raw_affiliation_strings":["Center for Cyber Security, College of Computer Science and Engineering, University of Electronic Science and Technology of China (UESTC), Chengdu, China"],"affiliations":[{"raw_affiliation_string":"Center for Cyber Security, College of Computer Science and Engineering, University of Electronic Science and Technology of China (UESTC), Chengdu, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100780268","display_name":"Xiaosong Zhang","orcid":"https://orcid.org/0000-0001-9886-1412"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]},{"id":"https://openalex.org/I4210136793","display_name":"Peng Cheng Laboratory","ror":"https://ror.org/03qdqbt06","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210136793"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaosong Zhang","raw_affiliation_strings":["Center for Cyber Security, College of Computer Science and Engineering, University of Electronic Science and Technology of China (UESTC), Chengdu, China","Cyberspace Security Research Center, Peng Cheng Laboratory, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"Center for Cyber Security, College of Computer Science and Engineering, University of Electronic Science and Technology of China (UESTC), Chengdu, China","institution_ids":["https://openalex.org/I150229711"]},{"raw_affiliation_string":"Cyberspace Security Research Center, Peng Cheng Laboratory, Shenzhen, China","institution_ids":["https://openalex.org/I4210136793"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008178136","display_name":"Yi Mu","orcid":"https://orcid.org/0000-0002-1637-845X"},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yi Mu","raw_affiliation_strings":["Fujian Provincial Key Laboratory of Network Security and Cryptology, the College of Mathematics and Informatics, Fujian Normal University, Fuzhou, China"],"affiliations":[{"raw_affiliation_string":"Fujian Provincial Key Laboratory of Network Security and Cryptology, the College of Mathematics and Informatics, Fujian Normal University, Fuzhou, China","institution_ids":["https://openalex.org/I111753288"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5020136354","display_name":"Fatemeh Rezaeibagha","orcid":"https://orcid.org/0000-0002-1368-016X"},"institutions":[{"id":"https://openalex.org/I176790772","display_name":"Murdoch University","ror":"https://ror.org/00r4sry34","country_code":"AU","type":"education","lineage":["https://openalex.org/I176790772"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Fatemeh Rezaeibagha","raw_affiliation_strings":["School of Engineering and Information Technology, Murdoch University, Perth, Australia"],"affiliations":[{"raw_affiliation_string":"School of Engineering and Information Technology, Murdoch University, Perth, Australia","institution_ids":["https://openalex.org/I176790772"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060514022","display_name":"Xiaojiang Du","orcid":"https://orcid.org/0000-0003-4235-9671"},"institutions":[{"id":"https://openalex.org/I84392919","display_name":"Temple University","ror":"https://ror.org/00kx1jb78","country_code":"US","type":"education","lineage":["https://openalex.org/I84392919"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Xiaojiang Du","raw_affiliation_strings":["Department of Computer and Information Sciences, Temple University, Philadelphia, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer and Information Sciences, Temple University, Philadelphia, USA","institution_ids":["https://openalex.org/I84392919"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5029714594","display_name":"Nadra Guizani","orcid":"https://orcid.org/0000-0001-5332-2685"},"institutions":[{"id":"https://openalex.org/I72951846","display_name":"Washington State University","ror":"https://ror.org/05dk0ce17","country_code":"US","type":"education","lineage":["https://openalex.org/I72951846"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Nadra Guizani","raw_affiliation_strings":["School of Electrical Engineering & Computer Science at Washington State University, Pullman, USA"],"affiliations":[{"raw_affiliation_string":"School of Electrical Engineering & Computer Science at Washington State University, Pullman, USA","institution_ids":["https://openalex.org/I72951846"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5076155477"],"corresponding_institution_ids":["https://openalex.org/I150229711"],"apc_list":null,"apc_paid":null,"fwci":7.7497,"has_fulltext":false,"cited_by_count":51,"citation_normalized_percentile":{"value":0.97377035,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":99},"biblio":{"volume":"16","issue":"4","first_page":"2677","last_page":"2686"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.8838076591491699},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.7819130420684814},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.749639630317688},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5925402045249939},{"id":"https://openalex.org/keywords/block","display_name":"Block (permutation group theory)","score":0.4745907485485077},{"id":"https://openalex.org/keywords/big-data","display_name":"Big data","score":0.4209294319152832},{"id":"https://openalex.org/keywords/hash-chain","display_name":"Hash chain","score":0.41859501600265503},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.14049509167671204}],"concepts":[{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.8838076591491699},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.7819130420684814},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.749639630317688},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5925402045249939},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.4745907485485077},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.4209294319152832},{"id":"https://openalex.org/C135783594","wikidata":"https://www.wikidata.org/wiki/Q5678864","display_name":"Hash chain","level":3,"score":0.41859501600265503},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.14049509167671204},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tii.2019.2943331","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tii.2019.2943331","pdf_url":null,"source":{"id":"https://openalex.org/S184777250","display_name":"IEEE Transactions on Industrial Informatics","issn_l":"1551-3203","issn":["1551-3203","1941-0050"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Industrial Informatics","raw_type":"journal-article"},{"id":"pmh:oai:researchrepository.murdoch.edu.au:54673","is_oa":false,"landing_page_url":"https://researchrepository.murdoch.edu.au/id/eprint/54673/","pdf_url":null,"source":{"id":"https://openalex.org/S4306400274","display_name":"Murdoch Research Repository (Murdoch University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I176790772","host_organization_name":"Murdoch University","host_organization_lineage":["https://openalex.org/I176790772"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"  Huang, K., Zhang, X., Mu, Y., Rezaeibagha, F. &lt;https://researchrepository.murdoch.edu.au/view/author/Rezaeibagha, Fatemeh.html&gt;, Du, X. and Guizani, N.   (2020)  Achieving intelligent Trust-Layer for Internet-of-Things via Self-Redactable blockchain.    IEEE Transactions on Industrial Informatics, 16  (4).   pp. 2677-2686.  ","raw_type":"Journal Article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.699999988079071,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G1167978243","display_name":null,"funder_award_id":"61602092","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5234939074","display_name":null,"funder_award_id":"61872087","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8792699437","display_name":null,"funder_award_id":"2018YFB08040505","funder_id":"https://openalex.org/F4320336026","funder_display_name":"National Key Research and Development Program of China Stem Cell and Translational Research"},{"id":"https://openalex.org/G889513372","display_name":null,"funder_award_id":"2017YFB0802300","funder_id":"https://openalex.org/F4320336026","funder_display_name":"National Key Research and Development Program of China Stem Cell and Translational Research"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320336026","display_name":"National Key Research and Development Program of China Stem Cell and Translational Research","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":35,"referenced_works":["https://openalex.org/W9419878","https://openalex.org/W158262377","https://openalex.org/W1501614105","https://openalex.org/W1520478394","https://openalex.org/W1559136758","https://openalex.org/W1596726599","https://openalex.org/W1599846125","https://openalex.org/W1610688607","https://openalex.org/W1752315353","https://openalex.org/W2057248704","https://openalex.org/W2074709832","https://openalex.org/W2078739299","https://openalex.org/W2101468243","https://openalex.org/W2105103777","https://openalex.org/W2114337635","https://openalex.org/W2122410182","https://openalex.org/W2156186849","https://openalex.org/W2162593813","https://openalex.org/W2170018742","https://openalex.org/W2410750382","https://openalex.org/W2590233175","https://openalex.org/W2604096638","https://openalex.org/W2758361015","https://openalex.org/W2795417209","https://openalex.org/W2917723740","https://openalex.org/W2948007978","https://openalex.org/W4211068006","https://openalex.org/W4248175462","https://openalex.org/W6631062804","https://openalex.org/W6635962315","https://openalex.org/W6636423917","https://openalex.org/W6684131861","https://openalex.org/W6714240215","https://openalex.org/W6734473107","https://openalex.org/W6749594458"],"related_works":["https://openalex.org/W4252190074","https://openalex.org/W2383706615","https://openalex.org/W2069568684","https://openalex.org/W2154676777","https://openalex.org/W4200497776","https://openalex.org/W2982222368","https://openalex.org/W2379589344","https://openalex.org/W2103058157","https://openalex.org/W2952472320","https://openalex.org/W2355953790"],"abstract_inverted_index":{"The":[0,243],"advances":[1],"of":[2,14,44,159,168,209],"artificial":[3],"intelligence":[4],"(AI)":[5],"propels":[6],"big":[7,21,36,136],"data":[8,22,137],"processing":[9],"and":[10,19,34,59,124,201,251],"transmission":[11],"for":[12,134,188,226,254],"Internet":[13],"Things":[15],"(IoT),":[16],"by":[17,24,78],"capturing":[18],"structuring":[20],"produced":[23],"heterogeneous":[25],"devices.":[26,256],"While":[27],"applying":[28],"blockchain":[29,39,74,132,162],"to":[30,54,71,129,144,164,180,198,205,215,219,239],"manage":[31],"IoT":[32,255],"devices":[33],"associated":[35],"data,":[37],"the":[38,67,83,101,118,157,160,174],"itself":[40],"suffers":[41],"from":[42,46],"abuse":[43],"decentralization":[45],"anonymous":[47],"users.":[48],"Specifically,":[49,171],"it":[50],"has":[51],"been":[52],"utilized":[53],"facilitate":[55],"black":[56],"market":[57],"trades":[58],"illegal":[60],"activities.":[61],"Ateniese":[62],"et":[63],"al.":[64],"proposed":[65],"using":[66],"chameleon":[68,177],"hash":[69,85,104,178,200],"(CH)":[70],"derive":[72],"redactable":[73,131],"(EuroS&P),":[75],"which":[76],"works":[77],"embedding":[79],"a":[80,231],"trapdoor":[81,187,204],"in":[82,117,152],"basic":[84],"function":[86],"so":[87],"that":[88,246],"block":[89,103],"content":[90],"can":[91,120],"be":[92,121],"rewritten":[93],"without":[94,191],"causing":[95],"major":[96],"hard":[97],"forks.":[98],"In":[99],"short,":[100],"redacted":[102],"remains":[105],"unchanged.":[106],"However,":[107],"there":[108],"is":[109,196,249],"lacking":[110],"intelligent":[111,166,224],"design":[112],"where":[113],"any":[114,139,192,207],"mistakes":[115],"observed":[116],"chain":[119,146,169],"corrected":[122],"universally":[123],"automatically.":[125],"This":[126],"creates":[127],"disincentives":[128],"use":[130,216],"(RB)":[133],"managing":[135],"or":[138],"data-driven":[140],"business":[141],"mainly":[142],"due":[143],"ineffective":[145],"redaction.":[147,170],"To":[148],"solve":[149],"this":[150,153],"problem,":[151],"article,":[154],"we":[155,172],"propose":[156,173],"notion":[158],"self-redactable":[161],"(SRB)":[163],"support":[165],"execution":[167],"first":[175],"revocable":[176],"(RCH)":[179],"power":[181],"RB.":[182],"It":[183],"enables":[184],"an":[185,202,223],"ephemeral":[186,203],"finding":[189],"collision":[190],"co-operation.":[193],"Periodical":[194],"expiration":[195],"applied":[197],"committed":[199],"prevent":[206],"abuses":[208],"redaction":[210],"power.":[211],"We":[212,228],"instantiate":[213],"how":[214],"our":[217,241,247],"RCH":[218],"build":[220],"SRB":[221],"as":[222,234,236],"trust-layer":[225],"IoT.":[227],"also":[229],"give":[230],"rigorous":[232],"analysis":[233],"well":[235],"comprehensive":[237],"experiments":[238],"validate":[240],"proposals.":[242],"evidence":[244],"showed":[245],"proposal":[248],"secure":[250],"acceptably":[252],"efficient":[253]},"counts_by_year":[{"year":2025,"cited_by_count":7},{"year":2024,"cited_by_count":9},{"year":2023,"cited_by_count":13},{"year":2022,"cited_by_count":10},{"year":2021,"cited_by_count":7},{"year":2020,"cited_by_count":5}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
