{"id":"https://openalex.org/W4417168999","doi":"https://doi.org/10.1109/tnse.2025.3640426","title":"A Federated Blockchain Security for MEC-Enabled IoT Networks in Industrial 5.0","display_name":"A Federated Blockchain Security for MEC-Enabled IoT Networks in Industrial 5.0","publication_year":2025,"publication_date":"2025-12-09","ids":{"openalex":"https://openalex.org/W4417168999","doi":"https://doi.org/10.1109/tnse.2025.3640426"},"language":null,"primary_location":{"id":"doi:10.1109/tnse.2025.3640426","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnse.2025.3640426","pdf_url":null,"source":{"id":"https://openalex.org/S2484352698","display_name":"IEEE Transactions on Network Science and Engineering","issn_l":"2327-4697","issn":["2327-4697","2334-329X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network Science and Engineering","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5040897068","display_name":"Eric Gyamfi","orcid":"https://orcid.org/0000-0002-0744-4208"},"institutions":[{"id":"https://openalex.org/I104546213","display_name":"National College of Ireland","ror":"https://ror.org/02qzs9336","country_code":"IE","type":"education","lineage":["https://openalex.org/I104546213"]}],"countries":["IE"],"is_corresponding":true,"raw_author_name":"Eric Gyamfi","raw_affiliation_strings":["School of Computing, National College of Ireland, Dublin, Ireland","School of Computing, National College of Ireland, Ireland"],"affiliations":[{"raw_affiliation_string":"School of Computing, National College of Ireland, Dublin, Ireland","institution_ids":["https://openalex.org/I104546213"]},{"raw_affiliation_string":"School of Computing, National College of Ireland, Ireland","institution_ids":["https://openalex.org/I104546213"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5090435718","display_name":"James Adu Ansere","orcid":"https://orcid.org/0000-0002-6070-9316"},"institutions":[{"id":"https://openalex.org/I4210164771","display_name":"Sunyani Technical University","ror":"https://ror.org/05sc3yb31","country_code":"GH","type":"education","lineage":["https://openalex.org/I4210164771"]}],"countries":["GH"],"is_corresponding":false,"raw_author_name":"James Adu Ansere","raw_affiliation_strings":["Department of Electrical Engineering, Sunyani Technical University, Sunyani, Ghana","Department of Electrical Engineering, Sunyani Technical University, Ghana"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, Sunyani Technical University, Sunyani, Ghana","institution_ids":["https://openalex.org/I4210164771"]},{"raw_affiliation_string":"Department of Electrical Engineering, Sunyani Technical University, Ghana","institution_ids":["https://openalex.org/I4210164771"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5030224784","display_name":"Mohsin Kamal","orcid":"https://orcid.org/0000-0002-3893-4330"},"institutions":[{"id":"https://openalex.org/I929597975","display_name":"National University of Sciences and Technology","ror":"https://ror.org/03w2j5y17","country_code":"PK","type":"education","lineage":["https://openalex.org/I929597975"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Mohsin Kamal","raw_affiliation_strings":["School of Electrical Engineering and Computer Sciences, National University of Sciences and Technology, Islamabad, Pakistan","School of Electrical Engineering and Computer Sciences, National University of Sciences and Technology, Pakistan"],"affiliations":[{"raw_affiliation_string":"School of Electrical Engineering and Computer Sciences, National University of Sciences and Technology, Islamabad, Pakistan","institution_ids":["https://openalex.org/I929597975"]},{"raw_affiliation_string":"School of Electrical Engineering and Computer Sciences, National University of Sciences and Technology, Pakistan","institution_ids":["https://openalex.org/I929597975"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5031027636","display_name":"Mian Ahmad Jan","orcid":"https://orcid.org/0000-0002-5298-1328"},"institutions":[{"id":"https://openalex.org/I29891158","display_name":"University of Sharjah","ror":"https://ror.org/00engpz63","country_code":"AE","type":"education","lineage":["https://openalex.org/I29891158"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Mian Ahmad Jan","raw_affiliation_strings":["Department of Computer Science, College of Computing and Informatics, University of Sharjah, Sharjah, UAE"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, College of Computing and Informatics, University of Sharjah, Sharjah, UAE","institution_ids":["https://openalex.org/I29891158"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5079301418","display_name":"Houbing Song","orcid":"https://orcid.org/0000-0003-2631-9223"},"institutions":[{"id":"https://openalex.org/I126744593","display_name":"University of Maryland, Baltimore","ror":"https://ror.org/04rq5mt64","country_code":"US","type":"education","lineage":["https://openalex.org/I126744593"]},{"id":"https://openalex.org/I66946132","display_name":"University of Maryland, College Park","ror":"https://ror.org/047s2c258","country_code":"US","type":"education","lineage":["https://openalex.org/I66946132"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Houbing Song","raw_affiliation_strings":["University of Maryland, College Park, MD, USA","University of Maryland, Baltimore, USA"],"affiliations":[{"raw_affiliation_string":"University of Maryland, College Park, MD, USA","institution_ids":["https://openalex.org/I66946132"]},{"raw_affiliation_string":"University of Maryland, Baltimore, USA","institution_ids":["https://openalex.org/I126744593"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5037080121","display_name":"Muhammad Tariq","orcid":"https://orcid.org/0000-0003-1296-2058"},"institutions":[{"id":"https://openalex.org/I201384688","display_name":"National University of Computer and Emerging Sciences","ror":"https://ror.org/003eyb898","country_code":"PK","type":"education","lineage":["https://openalex.org/I201384688"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Muhammad Tariq","raw_affiliation_strings":["Department of Electrical Engineering, National University of Computer and Emerging Sciences, Karachi, Pakistan","Department of Electrical Engineering, National University of Computer and Emerging Sciences, Pakistan"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, National University of Computer and Emerging Sciences, Karachi, Pakistan","institution_ids":["https://openalex.org/I201384688"]},{"raw_affiliation_string":"Department of Electrical Engineering, National University of Computer and Emerging Sciences, Pakistan","institution_ids":["https://openalex.org/I201384688"]}]}],"institutions":[],"countries_distinct_count":5,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5040897068"],"corresponding_institution_ids":["https://openalex.org/I104546213"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.46771074,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"13","issue":null,"first_page":"5312","last_page":"5323"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.7092000246047974,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.7092000246047974,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.10639999806880951,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.037700001150369644,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.5713000297546387},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.5637999773025513},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.4650999903678894},{"id":"https://openalex.org/keywords/data-security","display_name":"Data security","score":0.4320000112056732},{"id":"https://openalex.org/keywords/flexibility","display_name":"Flexibility (engineering)","score":0.429500013589859},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.40959998965263367},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.392300009727478},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.3921999931335449},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.3917999863624573},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.34929999709129333}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7971000075340271},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.5713000297546387},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.5637999773025513},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5569999814033508},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.4650999903678894},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.4320000112056732},{"id":"https://openalex.org/C2780598303","wikidata":"https://www.wikidata.org/wiki/Q65921492","display_name":"Flexibility (engineering)","level":2,"score":0.429500013589859},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4203000068664551},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.40959998965263367},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.392300009727478},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.3921999931335449},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.3917999863624573},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.34929999709129333},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.3427000045776367},{"id":"https://openalex.org/C177606310","wikidata":"https://www.wikidata.org/wiki/Q5674297","display_name":"Adaptability","level":2,"score":0.3425999879837036},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.3424000144004822},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.34130001068115234},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.34119999408721924},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.33559998869895935},{"id":"https://openalex.org/C138236772","wikidata":"https://www.wikidata.org/wiki/Q25098575","display_name":"Edge device","level":3,"score":0.32580000162124634},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.3253999948501587},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.31349998712539673},{"id":"https://openalex.org/C14982408","wikidata":"https://www.wikidata.org/wiki/Q11006334","display_name":"Network Access Control","level":4,"score":0.30809998512268066},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.3059999942779541},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.29809999465942383},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.2793000042438507},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.2775999903678894},{"id":"https://openalex.org/C130881749","wikidata":"https://www.wikidata.org/wiki/Q586894","display_name":"Security association","level":5,"score":0.2700999975204468},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.2653999924659729},{"id":"https://openalex.org/C206345919","wikidata":"https://www.wikidata.org/wiki/Q20380951","display_name":"Resource (disambiguation)","level":2,"score":0.2628999948501587},{"id":"https://openalex.org/C2778456923","wikidata":"https://www.wikidata.org/wiki/Q5337692","display_name":"Edge computing","level":3,"score":0.26100000739097595}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tnse.2025.3640426","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnse.2025.3640426","pdf_url":null,"source":{"id":"https://openalex.org/S2484352698","display_name":"IEEE Transactions on Network Science and Engineering","issn_l":"2327-4697","issn":["2327-4697","2334-329X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network Science and Engineering","raw_type":"journal-article"},{"id":"pmh:oai:norma.ncirl.ie:9063","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4306400345","display_name":"TRAP@NCI (National College of Ireland)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I104546213","host_organization_name":"National College of Ireland","host_organization_lineage":["https://openalex.org/I104546213"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":null,"raw_type":"PeerReviewed"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Secure":[0],"communication":[1],"is":[2,161],"vital":[3],"for":[4,79],"the":[5,12,23,43,59,94,103,118,123,136,154],"Industrial":[6],"Internet":[7],"of":[8,18,25,62],"Things":[9],"(IIoT)":[10],"in":[11,54],"fifth":[13],"revolution.":[14],"However,":[15],"resource":[16],"constraints":[17],"most":[19],"IIoT":[20,56,80,128,156,177],"devices":[21,129],"prevent":[22],"use":[24],"conventional":[26,143],"security":[27,48,69,77,144,173],"models.":[28],"Multi-access":[29],"mobile":[30],"edge":[31],"computing":[32],"(MEC)":[33],"offers":[34],"a":[35,74,86,166],"solution":[36],"by":[37,146],"bringing":[38],"computational":[39],"resources":[40],"closer":[41],"to":[42,153],"network":[44,76,106,120,157,172],"edge,":[45],"but":[46],"centralized":[47],"solutions":[49,145],"limit":[50],"scalability":[51],"and":[52,68,85,100,108,122,134,151,163,180],"flexibility":[53],"MEC-enabled":[55,176],"systems.":[57],"Additionally,":[58],"distributed":[60],"nature":[61],"MEC":[63,92],"servers":[64],"poses":[65],"data":[66,98,115,149],"privacy":[67],"challenges.":[70],"This":[71,139],"paper":[72],"introduces":[73],"novel":[75],"approach":[78,141],"using":[81,165],"federated":[82],"blockchain":[83],"(FB)":[84],"machine":[87],"learning-based":[88],"verification":[89,125],"system":[90,178],"(ML).":[91],"optimizes":[93],"FB":[95],"model,":[96],"ensuring":[97],"integrity":[99],"confidentiality":[101],"between":[102],"IIoT's":[104],"local":[105,119],"cluster":[107],"external":[109],"devices.":[110],"Public":[111],"key":[112],"cryptography":[113],"secures":[114],"shared":[116],"within":[117],"cluster,":[121],"ML-based":[124],"model":[126],"validates":[127],"requesting":[130],"encryption":[131],"key-pair":[132],"updates":[133],"joining":[135],"MEC's":[137],"FB.":[138],"integrated":[140],"surpasses":[142],"enhancing":[147],"scalability,":[148],"privacy,":[150],"adaptability":[152],"evolving":[155],"topology.":[158],"The":[159],"methodology":[160],"implemented":[162],"evaluated":[164],"realistic":[167],"IoT":[168],"testbed,":[169],"demonstrating":[170],"improved":[171],"while":[174],"maintaining":[175],"performance":[179],"scalability.":[181]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-12-09T00:00:00"}
