{"id":"https://openalex.org/W3093783098","doi":"https://doi.org/10.1109/icccnt49239.2020.9225272","title":"Trust Management in Cyber Physical System using Blockchain","display_name":"Trust Management in Cyber Physical System using Blockchain","publication_year":2020,"publication_date":"2020-07-01","ids":{"openalex":"https://openalex.org/W3093783098","doi":"https://doi.org/10.1109/icccnt49239.2020.9225272","mag":"3093783098"},"language":"en","primary_location":{"id":"doi:10.1109/icccnt49239.2020.9225272","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccnt49239.2020.9225272","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 11th International Conference on Computing, Communication and Networking Technologies (ICCCNT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5091045705","display_name":"Bhabendu Kumar Mohanta","orcid":"https://orcid.org/0000-0002-9340-3073"},"institutions":[{"id":"https://openalex.org/I4210097016","display_name":"International Institute of Information Technology","ror":"https://ror.org/00qryer39","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210097016"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Bhabendu Kumar Mohanta","raw_affiliation_strings":["IIIT,Department of Computer Science & Engineering,Bhubaneshwar,Odisha,India,751003","IIIT, Bhubaneshwar, Odisha, India"],"affiliations":[{"raw_affiliation_string":"IIIT,Department of Computer Science & Engineering,Bhubaneshwar,Odisha,India,751003","institution_ids":["https://openalex.org/I4210097016"]},{"raw_affiliation_string":"IIIT, Bhubaneshwar, Odisha, India","institution_ids":["https://openalex.org/I4210097016"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5051623133","display_name":"Utkalika Satapathy","orcid":null},"institutions":[{"id":"https://openalex.org/I4210097016","display_name":"International Institute of Information Technology","ror":"https://ror.org/00qryer39","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210097016"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Utkalika Satapathy","raw_affiliation_strings":["IIIT,Department of Computer Science & Engineering,Bhubaneshwar,Odisha,India,751003","IIIT, Bhubaneshwar, Odisha, India"],"affiliations":[{"raw_affiliation_string":"IIIT,Department of Computer Science & Engineering,Bhubaneshwar,Odisha,India,751003","institution_ids":["https://openalex.org/I4210097016"]},{"raw_affiliation_string":"IIIT, Bhubaneshwar, Odisha, India","institution_ids":["https://openalex.org/I4210097016"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5061809454","display_name":"Meenu Rani Dey","orcid":"https://orcid.org/0000-0001-8357-033X"},"institutions":[{"id":"https://openalex.org/I1317621060","display_name":"Indian Institute of Technology Guwahati","ror":"https://ror.org/0022nd079","country_code":"IN","type":"education","lineage":["https://openalex.org/I1317621060"]},{"id":"https://openalex.org/I4210089896","display_name":"Indian Institute of Information Technology Guwahati","ror":"https://ror.org/00bb9ch64","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210089896"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Meenu Rani Dey","raw_affiliation_strings":["IIT,Department of Computer Science & Engineering,Guwahati,Assam,781039","IIT, Guwahati, Assam"],"affiliations":[{"raw_affiliation_string":"IIT,Department of Computer Science & Engineering,Guwahati,Assam,781039","institution_ids":["https://openalex.org/I4210089896","https://openalex.org/I1317621060"]},{"raw_affiliation_string":"IIT, Guwahati, Assam","institution_ids":["https://openalex.org/I1317621060"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102962564","display_name":"Soumyashree S. Panda","orcid":"https://orcid.org/0000-0002-1552-1672"},"institutions":[{"id":"https://openalex.org/I4210097016","display_name":"International Institute of Information Technology","ror":"https://ror.org/00qryer39","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210097016"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Soumyashree S. Panda","raw_affiliation_strings":["IIIT,Department of Computer Science & Engineering,Bhubaneshwar,Odisha,India,751003","IIIT, Bhubaneshwar, Odisha, India"],"affiliations":[{"raw_affiliation_string":"IIIT,Department of Computer Science & Engineering,Bhubaneshwar,Odisha,India,751003","institution_ids":["https://openalex.org/I4210097016"]},{"raw_affiliation_string":"IIIT, Bhubaneshwar, Odisha, India","institution_ids":["https://openalex.org/I4210097016"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102728428","display_name":"Debasish Jena","orcid":"https://orcid.org/0000-0002-1360-7544"},"institutions":[{"id":"https://openalex.org/I4210097016","display_name":"International Institute of Information Technology","ror":"https://ror.org/00qryer39","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210097016"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Debasish Jena","raw_affiliation_strings":["IIIT,Department of Computer Science & Engineering,Bhubaneshwar,Odisha,India,751003","IIIT, Bhubaneshwar, Odisha, India"],"affiliations":[{"raw_affiliation_string":"IIIT,Department of Computer Science & Engineering,Bhubaneshwar,Odisha,India,751003","institution_ids":["https://openalex.org/I4210097016"]},{"raw_affiliation_string":"IIIT, Bhubaneshwar, Odisha, India","institution_ids":["https://openalex.org/I4210097016"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5091045705"],"corresponding_institution_ids":["https://openalex.org/I4210097016"],"apc_list":null,"apc_paid":null,"fwci":1.8683,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.8943415,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9944999814033508,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.9193308353424072},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7243838310241699},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6997201442718506},{"id":"https://openalex.org/keywords/cyber-physical-system","display_name":"Cyber-physical system","score":0.615584671497345},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5835832357406616},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.580733597278595},{"id":"https://openalex.org/keywords/trustworthiness","display_name":"Trustworthiness","score":0.5068123936653137},{"id":"https://openalex.org/keywords/trust-anchor","display_name":"Trust anchor","score":0.48680469393730164},{"id":"https://openalex.org/keywords/data-integrity","display_name":"Data integrity","score":0.4820078909397125},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.44566476345062256},{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.44256827235221863},{"id":"https://openalex.org/keywords/trusted-computing","display_name":"Trusted Computing","score":0.4278775751590729},{"id":"https://openalex.org/keywords/trust-management","display_name":"Trust management (information system)","score":0.4130100607872009},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.31597915291786194},{"id":"https://openalex.org/keywords/computational-trust","display_name":"Computational trust","score":0.24611973762512207}],"concepts":[{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.9193308353424072},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7243838310241699},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6997201442718506},{"id":"https://openalex.org/C179768478","wikidata":"https://www.wikidata.org/wiki/Q1120057","display_name":"Cyber-physical system","level":2,"score":0.615584671497345},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5835832357406616},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.580733597278595},{"id":"https://openalex.org/C153701036","wikidata":"https://www.wikidata.org/wiki/Q659974","display_name":"Trustworthiness","level":2,"score":0.5068123936653137},{"id":"https://openalex.org/C154800190","wikidata":"https://www.wikidata.org/wiki/Q16941470","display_name":"Trust anchor","level":4,"score":0.48680469393730164},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.4820078909397125},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.44566476345062256},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.44256827235221863},{"id":"https://openalex.org/C2776831232","wikidata":"https://www.wikidata.org/wiki/Q966812","display_name":"Trusted Computing","level":2,"score":0.4278775751590729},{"id":"https://openalex.org/C2776384856","wikidata":"https://www.wikidata.org/wiki/Q17145767","display_name":"Trust management (information system)","level":2,"score":0.4130100607872009},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.31597915291786194},{"id":"https://openalex.org/C160521178","wikidata":"https://www.wikidata.org/wiki/Q5157345","display_name":"Computational trust","level":3,"score":0.24611973762512207},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0},{"id":"https://openalex.org/C48798503","wikidata":"https://www.wikidata.org/wiki/Q877546","display_name":"Reputation","level":2,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icccnt49239.2020.9225272","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccnt49239.2020.9225272","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 11th International Conference on Computing, Communication and Networking Technologies (ICCCNT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4000000059604645,"id":"https://metadata.un.org/sdg/17","display_name":"Partnerships for the goals"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W893234787","https://openalex.org/W2100885421","https://openalex.org/W2117435128","https://openalex.org/W2149713648","https://openalex.org/W2751559473","https://openalex.org/W2794170508","https://openalex.org/W2810652557","https://openalex.org/W2887759323","https://openalex.org/W2887977547","https://openalex.org/W2907415053","https://openalex.org/W2947170660","https://openalex.org/W2983935921","https://openalex.org/W2994783385","https://openalex.org/W2994825217","https://openalex.org/W2995831815","https://openalex.org/W2996881940","https://openalex.org/W2997035848","https://openalex.org/W2997502230","https://openalex.org/W2997956957","https://openalex.org/W2998010531","https://openalex.org/W3005233709","https://openalex.org/W3012049423","https://openalex.org/W3012425590","https://openalex.org/W3014678190","https://openalex.org/W3026150618","https://openalex.org/W6770090690"],"related_works":["https://openalex.org/W2129567949","https://openalex.org/W1981078071","https://openalex.org/W2339500151","https://openalex.org/W2940914837","https://openalex.org/W2362020614","https://openalex.org/W4243605140","https://openalex.org/W2122014853","https://openalex.org/W2736431337","https://openalex.org/W2579190509","https://openalex.org/W2364450600"],"abstract_inverted_index":{"Cyber-physical":[0],"Systems":[1],"(CPS)":[2],"are":[3],"reshaping":[4],"the":[5,10,14,52,60,83,88,102,105,110,123,143,165,172],"way":[6],"of":[7,17,104,133,175],"interaction":[8],"with":[9],"physical":[11],"world.":[12],"Moreover,":[13],"true":[15],"potential":[16],"CPS":[18,135],"will":[19,26],"be":[20,27],"realized":[21],"when":[22],"a":[23,79,114,130],"decentralized":[24,67],"approach":[25],"taken":[28],"into":[29],"account.":[30],"Blockchain":[31,49],"is":[32,85,108,126],"an":[33],"up-and-coming":[34],"technology":[35],"which":[36,107,125],"can":[37],"establish":[38],"trust":[39,46,57,94,121],"in":[40,95,177],"CPS,":[41],"where":[42],"participants":[43,124],"do":[44],"not":[45,100],"each":[47],"other.":[48],"applications":[50],"eliminate":[51],"middle":[53],"man":[54],"to":[55,75,119,129],"provide":[56],"and":[58,69,77,146,160,168],"making":[59],"processes":[61],"more":[62],"efficient":[63],"&":[64],"cheaper.":[65],"It's":[66],"nature":[68],"cryptographic":[70],"algorithm":[71],"make":[72],"it":[73,90,163],"immune":[74],"attack":[76],"becomes":[78,91],"secure":[80],"technology.":[81],"When":[82],"data":[84],"stored":[86],"on":[87],"blockchain":[89,176],"immutable,":[92],"ensuring":[93],"data.":[96,111],"Nevertheless,":[97],"this":[98],"does":[99],"guarantee":[101],"trustworthiness":[103],"device":[106,156],"generating":[109],"We":[112,137],"propose":[113],"blockchain-based":[115,134],"signature":[116],"storage":[117,166,169],"solution":[118,151],"ensure":[120],"among":[122],"further":[127],"applicable":[128],"diverse":[131],"range":[132],"applications.":[136],"have":[138],"implemented":[139],"our":[140],"system":[141],"using":[142],"Ethereum":[144],"network":[145],"Docker":[147],"Tools.":[148],"Our":[149],"proposed":[150],"guarantees":[152],"security":[153],"properties":[154],"i.e.":[155],"identification,":[157],"authentication,":[158],"integrity,":[159],"non-repudiation.":[161],"Also,":[162],"reduces":[164],"space":[167],"cost":[170],"than":[171],"traditional":[173],"usage":[174],"CPS.":[178]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
