{"id":"https://openalex.org/W2939926306","doi":"https://doi.org/10.1145/3312614.3312649","title":"Securing Over-The-Air IoT Firmware Updates using Blockchain","display_name":"Securing Over-The-Air IoT Firmware Updates using Blockchain","publication_year":2019,"publication_date":"2019-04-08","ids":{"openalex":"https://openalex.org/W2939926306","doi":"https://doi.org/10.1145/3312614.3312649","mag":"2939926306"},"language":"en","primary_location":{"id":"doi:10.1145/3312614.3312649","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3312614.3312649","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the International Conference on Omni-Layer Intelligent Systems","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5021614956","display_name":"Xinchi He","orcid":null},"institutions":[{"id":"https://openalex.org/I87208437","display_name":"University of Tulsa","ror":"https://ror.org/04wn28048","country_code":"US","type":"education","lineage":["https://openalex.org/I87208437"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Xinchi He","raw_affiliation_strings":["Tandy School of Computer Science, The University of Tulsa, Tulsa, OK, USA"],"affiliations":[{"raw_affiliation_string":"Tandy School of Computer Science, The University of Tulsa, Tulsa, OK, USA","institution_ids":["https://openalex.org/I87208437"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5057127359","display_name":"Sarra Alqahtani","orcid":"https://orcid.org/0000-0003-4572-7150"},"institutions":[{"id":"https://openalex.org/I87208437","display_name":"University of Tulsa","ror":"https://ror.org/04wn28048","country_code":"US","type":"education","lineage":["https://openalex.org/I87208437"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sarra Alqahtani","raw_affiliation_strings":["Tandy School of Computer Science, The University of Tulsa, Tulsa, OK, USA"],"affiliations":[{"raw_affiliation_string":"Tandy School of Computer Science, The University of Tulsa, Tulsa, OK, USA","institution_ids":["https://openalex.org/I87208437"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5088977884","display_name":"Rose Gamble","orcid":null},"institutions":[{"id":"https://openalex.org/I87208437","display_name":"University of Tulsa","ror":"https://ror.org/04wn28048","country_code":"US","type":"education","lineage":["https://openalex.org/I87208437"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Rose Gamble","raw_affiliation_strings":["Tandy School of Computer Science, The University of Tulsa, Tulsa, OK, USA"],"affiliations":[{"raw_affiliation_string":"Tandy School of Computer Science, The University of Tulsa, Tulsa, OK, USA","institution_ids":["https://openalex.org/I87208437"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5022613150","display_name":"Mauricio Papa","orcid":"https://orcid.org/0009-0000-5628-0548"},"institutions":[{"id":"https://openalex.org/I87208437","display_name":"University of Tulsa","ror":"https://ror.org/04wn28048","country_code":"US","type":"education","lineage":["https://openalex.org/I87208437"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mauricio Papa","raw_affiliation_strings":["Tandy School of Computer Science, The University of Tulsa, Tulsa, OK, USA"],"affiliations":[{"raw_affiliation_string":"Tandy School of Computer Science, The University of Tulsa, Tulsa, OK, USA","institution_ids":["https://openalex.org/I87208437"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5021614956"],"corresponding_institution_ids":["https://openalex.org/I87208437"],"apc_list":null,"apc_paid":null,"fwci":3.5288,"has_fulltext":false,"cited_by_count":37,"citation_normalized_percentile":{"value":0.93326949,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":95,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"164","last_page":"171"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/firmware","display_name":"Firmware","score":0.9113326668739319},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.786898672580719},{"id":"https://openalex.org/keywords/man-in-the-middle-attack","display_name":"Man-in-the-middle attack","score":0.7147178649902344},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.7141454815864563},{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.7078689336776733},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6160153746604919},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5310799479484558},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.49624353647232056},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.4709677994251251},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.4418792724609375},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.43848416209220886},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.43244582414627075},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.36693525314331055},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.32635194063186646},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.31491345167160034},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.1850457787513733},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.16422748565673828}],"concepts":[{"id":"https://openalex.org/C67212190","wikidata":"https://www.wikidata.org/wiki/Q104851","display_name":"Firmware","level":2,"score":0.9113326668739319},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.786898672580719},{"id":"https://openalex.org/C196491621","wikidata":"https://www.wikidata.org/wiki/Q554830","display_name":"Man-in-the-middle attack","level":3,"score":0.7147178649902344},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.7141454815864563},{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.7078689336776733},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6160153746604919},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5310799479484558},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.49624353647232056},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.4709677994251251},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.4418792724609375},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.43848416209220886},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.43244582414627075},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.36693525314331055},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.32635194063186646},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.31491345167160034},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.1850457787513733},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.16422748565673828},{"id":"https://openalex.org/C136264566","wikidata":"https://www.wikidata.org/wiki/Q159810","display_name":"Economy","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3312614.3312649","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3312614.3312649","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the International Conference on Omni-Layer Intelligent Systems","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Sustainable cities and communities","id":"https://metadata.un.org/sdg/11","score":0.4399999976158142}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W1995264769","https://openalex.org/W2035939328","https://openalex.org/W2313130692","https://openalex.org/W2519293460","https://openalex.org/W2528851540","https://openalex.org/W2601306580","https://openalex.org/W2747652295","https://openalex.org/W2750322463","https://openalex.org/W2760866949","https://openalex.org/W2766404321","https://openalex.org/W2768975126","https://openalex.org/W2772148428","https://openalex.org/W2783098776","https://openalex.org/W2901957411","https://openalex.org/W2914442289","https://openalex.org/W2948552929","https://openalex.org/W2982562810","https://openalex.org/W4247058344","https://openalex.org/W4248175462"],"related_works":["https://openalex.org/W4386213766","https://openalex.org/W3094219975","https://openalex.org/W4249439583","https://openalex.org/W4362509363","https://openalex.org/W3199079654","https://openalex.org/W3026018975","https://openalex.org/W3195816032","https://openalex.org/W2802409081","https://openalex.org/W2147257953","https://openalex.org/W3093917656"],"abstract_inverted_index":{"Over-the-air":[0],"(OTA)":[1],"firmware":[2,77],"updates":[3],"are":[4,18,103],"very":[5],"common":[6],"in":[7,68,87],"IoT":[8],"(Internet":[9],"of":[10,48,75,96,143],"Things)":[11],"devices":[12,49,97],"with":[13,63,92],"wireless":[14],"capabilities.":[15],"Although":[16],"they":[17,20],"convenient,":[19],"may":[21,30],"also":[22],"be":[23,32],"open":[24],"to":[25,42,71,141],"attack":[26],"since":[27],"physical":[28],"access":[29],"not":[31],"needed.":[33],"In":[34],"addition,":[35],"most":[36],"frameworks":[37],"use":[38,86],"a":[39,44,60,93,129,160,164],"centralized":[40,165],"architecture":[41],"update":[43,78,108],"potentially":[45],"large":[46,94],"number":[47,95],"increasing":[50],"the":[51,73,76,155],"threat":[52],"landscape.":[53],"An":[54],"alternative":[55],"solution,":[56],"that":[57,154],"relies":[58],"on":[59],"blockchain":[61,126],"framework":[62,127],"smart":[64,88,114],"contracts,":[65],"is":[66,83,157],"proposed":[67,81],"this":[69],"paper":[70],"protect":[72],"integrity":[74],"process.":[79],"The":[80,133],"system":[82,118,134],"suitable":[84],"for":[85,137,163],"cities":[89],"or":[90],"scenarios":[91],"and":[98,107,111,121,128,139,146,159],"service":[99,144],"providers":[100],"where":[101],"nodes":[102],"authenticated,":[104],"communications":[105],"protected,":[106],"conditions":[109],"specified":[110],"enforced":[112],"through":[113],"contracts.":[115],"A":[116],"proof--of--concept":[117],"was":[119,135],"implemented":[120],"tested":[122],"using":[123],"an":[124],"open--source":[125],"WiFi--capabable":[130],"ESP8266--based":[131],"board.":[132],"evaluated":[136],"scalability":[138],"response":[140],"denial":[142],"(DoS)":[145],"man--in--the--middle":[147],"(MitM)":[148],"attacks.":[149],"Preliminary":[150],"experimental":[151],"results":[152],"show":[153],"approach":[156],"feasible":[158],"viable":[161],"substitute":[162],"solution.":[166]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":7},{"year":2023,"cited_by_count":9},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":9},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":4}],"updated_date":"2026-04-15T08:11:43.952461","created_date":"2025-10-10T00:00:00"}
