{"id":"https://openalex.org/W3113277549","doi":"https://doi.org/10.1109/wincom50532.2020.9272464","title":"A Review: Collaborative Intrusion Detection for IoT integrating the Blockchain technologies","display_name":"A Review: Collaborative Intrusion Detection for IoT integrating the Blockchain technologies","publication_year":2020,"publication_date":"2020-10-28","ids":{"openalex":"https://openalex.org/W3113277549","doi":"https://doi.org/10.1109/wincom50532.2020.9272464","mag":"3113277549"},"language":"en","primary_location":{"id":"doi:10.1109/wincom50532.2020.9272464","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wincom50532.2020.9272464","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 8th International Conference on Wireless Networks and Mobile Communications (WINCOM)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5050123066","display_name":"Hafsa Benaddi","orcid":"https://orcid.org/0000-0003-2489-0637"},"institutions":[{"id":"https://openalex.org/I3121676899","display_name":"Universit\u00e9 Ibn-Tofail","ror":"https://ror.org/02wj89n04","country_code":"MA","type":"education","lineage":["https://openalex.org/I3121676899"]}],"countries":["MA"],"is_corresponding":true,"raw_author_name":"Hafsa Benaddi","raw_affiliation_strings":["Ibn Tofail University, Faculty of Sciences, Computer Science Research Lab, Kenitra, Morocco"],"affiliations":[{"raw_affiliation_string":"Ibn Tofail University, Faculty of Sciences, Computer Science Research Lab, Kenitra, Morocco","institution_ids":["https://openalex.org/I3121676899"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5036440733","display_name":"Khalil Ibrahimi","orcid":"https://orcid.org/0000-0002-9682-9555"},"institutions":[{"id":"https://openalex.org/I3121676899","display_name":"Universit\u00e9 Ibn-Tofail","ror":"https://ror.org/02wj89n04","country_code":"MA","type":"education","lineage":["https://openalex.org/I3121676899"]}],"countries":["MA"],"is_corresponding":false,"raw_author_name":"Khalil Ibrahimi","raw_affiliation_strings":["Ibn Tofail University, Faculty of Sciences, Computer Science Research Lab, Kenitra, Morocco"],"affiliations":[{"raw_affiliation_string":"Ibn Tofail University, Faculty of Sciences, Computer Science Research Lab, Kenitra, Morocco","institution_ids":["https://openalex.org/I3121676899"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5050123066"],"corresponding_institution_ids":["https://openalex.org/I3121676899"],"apc_list":null,"apc_paid":null,"fwci":2.4972,"has_fulltext":false,"cited_by_count":19,"citation_normalized_percentile":{"value":0.9188972,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":91,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9952999949455261,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9926999807357788,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7998287677764893},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7104153037071228},{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.6913138031959534},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.6059343218803406},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5921231508255005},{"id":"https://openalex.org/keywords/field","display_name":"Field (mathematics)","score":0.5569585561752319},{"id":"https://openalex.org/keywords/principal","display_name":"Principal (computer security)","score":0.5029000639915466},{"id":"https://openalex.org/keywords/big-data","display_name":"Big data","score":0.4790293276309967},{"id":"https://openalex.org/keywords/byte","display_name":"Byte","score":0.4763867259025574},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.47169259190559387},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.47156521677970886},{"id":"https://openalex.org/keywords/cover","display_name":"Cover (algebra)","score":0.42706650495529175},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.38656148314476013},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.26446592807769775},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.21253785490989685},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.08698582649230957}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7998287677764893},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7104153037071228},{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.6913138031959534},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.6059343218803406},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5921231508255005},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.5569585561752319},{"id":"https://openalex.org/C144559511","wikidata":"https://www.wikidata.org/wiki/Q2986279","display_name":"Principal (computer security)","level":2,"score":0.5029000639915466},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.4790293276309967},{"id":"https://openalex.org/C43364308","wikidata":"https://www.wikidata.org/wiki/Q8799","display_name":"Byte","level":2,"score":0.4763867259025574},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.47169259190559387},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.47156521677970886},{"id":"https://openalex.org/C2780428219","wikidata":"https://www.wikidata.org/wiki/Q16952335","display_name":"Cover (algebra)","level":2,"score":0.42706650495529175},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.38656148314476013},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.26446592807769775},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.21253785490989685},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.08698582649230957},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/wincom50532.2020.9272464","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wincom50532.2020.9272464","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 8th International Conference on Wireless Networks and Mobile Communications (WINCOM)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5400000214576721,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":42,"referenced_works":["https://openalex.org/W1487840171","https://openalex.org/W2104927807","https://openalex.org/W2294271434","https://openalex.org/W2552590514","https://openalex.org/W2608006758","https://openalex.org/W2765928069","https://openalex.org/W2768639942","https://openalex.org/W2784005930","https://openalex.org/W2785987568","https://openalex.org/W2790697634","https://openalex.org/W2792850657","https://openalex.org/W2806697149","https://openalex.org/W2899354183","https://openalex.org/W2913455680","https://openalex.org/W2914206419","https://openalex.org/W2917170086","https://openalex.org/W2921608598","https://openalex.org/W2929438235","https://openalex.org/W2942246375","https://openalex.org/W2955452595","https://openalex.org/W2964139938","https://openalex.org/W2969973402","https://openalex.org/W2972955472","https://openalex.org/W2980674799","https://openalex.org/W2987483576","https://openalex.org/W2988514893","https://openalex.org/W2990268365","https://openalex.org/W3002366890","https://openalex.org/W3004171232","https://openalex.org/W3005527937","https://openalex.org/W3005632683","https://openalex.org/W3009422166","https://openalex.org/W3015744214","https://openalex.org/W3016856141","https://openalex.org/W3027095011","https://openalex.org/W3046697349","https://openalex.org/W3097970897","https://openalex.org/W3121889917","https://openalex.org/W4248175462","https://openalex.org/W6629381211","https://openalex.org/W6696675015","https://openalex.org/W6758982322"],"related_works":["https://openalex.org/W4210406818","https://openalex.org/W4306779889","https://openalex.org/W3048554917","https://openalex.org/W3211706803","https://openalex.org/W4382775358","https://openalex.org/W4246942721","https://openalex.org/W3209862047","https://openalex.org/W4386732777","https://openalex.org/W4304136894","https://openalex.org/W2989851257"],"abstract_inverted_index":{"Several":[0],"anomaly":[1],"detection":[2],"systems":[3,46],"prototypes":[4],"are":[5],"deployed":[6],"to":[7,14,19,49,64,90,96],"set":[8],"up":[9],"real-world":[10],"solutions":[11,129],"exclusively":[12],"dedicated":[13],"the":[15,20,66,122,136,142,146],"banking":[16],"industry":[17],"due":[18],"high":[21],"potentials":[22],"of":[23,37,79,81,121,138],"attacks.":[24],"Exchanging":[25],"highly":[26],"security-sensitive":[27],"data":[28,82,99,151],"over":[29,135],"a":[30,41,71,118],"network":[31],"between":[32],"nodes":[33],"requires":[34],"high-security":[35],"levels":[36],"IoT":[38],"devices,":[39],"representing":[40],"big":[42],"challenge.":[43],"Thus,":[44],"many":[45],"were":[47],"developed":[48],"detect":[50],"and":[51,92,104,127,156,164],"predict":[52],"any":[53],"malicious":[54],"activity.":[55],"In":[56],"our":[57,109],"digital":[58],"world,":[59],"it":[60],"is":[61,153],"very":[62],"challenging":[63],"master":[65],"fact":[67],"that":[68,162],"we,":[69],"as":[70,145],"whole":[72],"internet":[73],"community,":[74],"create":[75],"an":[76],"uncountable":[77],"number":[78],"bytes":[80],"every":[83],"24":[84],"hours.":[85],"This":[86],"truth":[87],"leads":[88],"researchers":[89,112],"explore":[91],"discover":[93],"new":[94],"technologies":[95],"handle":[97],"massive":[98],"by":[100,107,116],"ensuring":[101],"individuals":[102],"security":[103,160],"privacy.":[105],"Inspired":[106],"this,":[108],"work":[110],"supports":[111],"in":[113,170],"this":[114,171],"field":[115],"providing":[117],"selective":[119],"overview":[120],"most":[123],"relevant":[124],"findings":[125],"investigating":[126],"proposing":[128],"on":[130],"Intrusion":[131],"Detection":[132],"Systems":[133],"(IDS)":[134],"Internet":[137],"Thing":[139],"(IoT).":[140],"Furthermore,":[141],"Blockchain":[143],"integration":[144],"principal":[147],"registry":[148],"for":[149],"safe":[150],"storage":[152],"well":[154],"explained":[155],"detailed":[157],"while":[158],"covering":[159],"qualities":[161],"analyze":[163],"classify":[165],"different":[166],"confronted":[167],"open":[168],"challenges":[169],"path.":[172]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":8},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":2}],"updated_date":"2026-03-09T08:58:05.943551","created_date":"2025-10-10T00:00:00"}
