{"id":"https://openalex.org/W7136843404","doi":"https://doi.org/10.1186/s13677-026-00879-5","title":"BIoT-Chain: a hyperledger blockchain cloud framework with SHA-3 keccak-enabled privacy for robust drone IoT network security","display_name":"BIoT-Chain: a hyperledger blockchain cloud framework with SHA-3 keccak-enabled privacy for robust drone IoT network security","publication_year":2026,"publication_date":"2026-03-16","ids":{"openalex":"https://openalex.org/W7136843404","doi":"https://doi.org/10.1186/s13677-026-00879-5"},"language":"en","primary_location":{"id":"doi:10.1186/s13677-026-00879-5","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13677-026-00879-5","pdf_url":"https://link.springer.com/content/pdf/10.1186/s13677-026-00879-5.pdf","source":{"id":"https://openalex.org/S2486819371","display_name":"Journal of Cloud Computing Advances Systems and Applications","issn_l":"2192-113X","issn":["2192-113X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cloud Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://link.springer.com/content/pdf/10.1186/s13677-026-00879-5.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5080933055","display_name":"Abdullah Ayub Khan","orcid":"https://orcid.org/0000-0003-2838-7641"},"institutions":[{"id":"https://openalex.org/I51569856","display_name":"Sultan Zainal Abidin University","ror":"https://ror.org/00bnk2e50","country_code":"MY","type":"education","lineage":["https://openalex.org/I51569856"]},{"id":"https://openalex.org/I59225215","display_name":"Bahria University","ror":"https://ror.org/02v8d7770","country_code":"PK","type":"education","lineage":["https://openalex.org/I59225215"]}],"countries":["MY","PK"],"is_corresponding":true,"raw_author_name":"Abdullah Ayub Khan","raw_affiliation_strings":["Department of Computer Science, Bahria University Karachi Campus, Karachi, 75260, Pakistan","Faculty of Informatics and Computing, Universiti Sultan Zainal Abidin, Besut Campus, Kuala Terengganu, Malaysia"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Bahria University Karachi Campus, Karachi, 75260, Pakistan","institution_ids":["https://openalex.org/I59225215"]},{"raw_affiliation_string":"Faculty of Informatics and Computing, Universiti Sultan Zainal Abidin, Besut Campus, Kuala Terengganu, Malaysia","institution_ids":["https://openalex.org/I51569856"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5117386745","display_name":"Hamad Almansour","orcid":null},"institutions":[{"id":"https://openalex.org/I47164929","display_name":"Najran University","ror":"https://ror.org/05edw4a90","country_code":"SA","type":"education","lineage":["https://openalex.org/I47164929"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Hamad Almansour","raw_affiliation_strings":["Department of Information Systems, Applied College, Najran University, Najran, 61441, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Department of Information Systems, Applied College, Najran University, Najran, 61441, Saudi Arabia","institution_ids":["https://openalex.org/I47164929"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5031690947","display_name":"Ahod Alghuried","orcid":"https://orcid.org/0009-0002-5681-7223"},"institutions":[{"id":"https://openalex.org/I142608572","display_name":"Prince Sattam Bin Abdulaziz University","ror":"https://ror.org/04jt46d36","country_code":"SA","type":"education","lineage":["https://openalex.org/I142608572"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Ahod Alghuried","raw_affiliation_strings":["College of Computer Engineering and Sciences, Prince Sattam bin Abdulaziz University, Al- Kharj, KSA, 16278, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"College of Computer Engineering and Sciences, Prince Sattam bin Abdulaziz University, Al- Kharj, KSA, 16278, Saudi Arabia","institution_ids":["https://openalex.org/I142608572"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5129461200","display_name":"Jamil Abedalrahim Jamil Alsayaydeh","orcid":null},"institutions":[{"id":"https://openalex.org/I32589535","display_name":"Technical University of Malaysia Malacca","ror":"https://ror.org/01xb6rs26","country_code":"MY","type":"education","lineage":["https://openalex.org/I32589535"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Jamil Abedalrahim Jamil Alsayaydeh","raw_affiliation_strings":["Department of Engineering Technology, Fakulti Teknologi Dan Kejuruteraan Elektronik Dan Komputer (FTKEK), Universiti Teknikal Malaysia Melaka (UTeM), Melaka, 76100, Malaysia"],"affiliations":[{"raw_affiliation_string":"Department of Engineering Technology, Fakulti Teknologi Dan Kejuruteraan Elektronik Dan Komputer (FTKEK), Universiti Teknikal Malaysia Melaka (UTeM), Melaka, 76100, Malaysia","institution_ids":["https://openalex.org/I32589535"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5022414691","display_name":"Mohamad Afendee Mohamed","orcid":"https://orcid.org/0000-0001-5985-3970"},"institutions":[{"id":"https://openalex.org/I51569856","display_name":"Sultan Zainal Abidin University","ror":"https://ror.org/00bnk2e50","country_code":"MY","type":"education","lineage":["https://openalex.org/I51569856"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Mohamad Afendee Mohamed","raw_affiliation_strings":["Faculty of Informatics and Computing, Universiti Sultan Zainal Abidin, Besut Campus, Kuala Terengganu, Malaysia"],"affiliations":[{"raw_affiliation_string":"Faculty of Informatics and Computing, Universiti Sultan Zainal Abidin, Besut Campus, Kuala Terengganu, Malaysia","institution_ids":["https://openalex.org/I51569856"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5008010846","display_name":"Sajid Ullah","orcid":"https://orcid.org/0000-0001-6309-4989"},"institutions":[{"id":"https://openalex.org/I3131932481","display_name":"Nangarhar University","ror":"https://ror.org/05n47cs30","country_code":"AF","type":"education","lineage":["https://openalex.org/I3131932481"]}],"countries":["AF"],"is_corresponding":false,"raw_author_name":"Sajid Ullah","raw_affiliation_strings":["Department of Water Resources and Environmental Engineering, Nangarhar University, Jalalabad, 2600, Nangarhar, Afghanistan"],"affiliations":[{"raw_affiliation_string":"Department of Water Resources and Environmental Engineering, Nangarhar University, Jalalabad, 2600, Nangarhar, Afghanistan","institution_ids":["https://openalex.org/I3131932481"]}]}],"institutions":[],"countries_distinct_count":4,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5080933055"],"corresponding_institution_ids":["https://openalex.org/I51569856","https://openalex.org/I59225215"],"apc_list":{"value":990,"currency":"GBP","value_usd":1214},"apc_paid":{"value":990,"currency":"GBP","value_usd":1214},"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.63399555,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"15","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11133","display_name":"UAV Applications and Optimization","score":0.965399980545044,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11133","display_name":"UAV Applications and Optimization","score":0.965399980545044,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.012900000438094139,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.00570000009611249,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/drone","display_name":"Drone","score":0.5891000032424927},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.5687000155448914},{"id":"https://openalex.org/keywords/resilience","display_name":"Resilience (materials science)","score":0.555400013923645},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5307999849319458},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.45500001311302185},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.4377000033855438},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.4165000021457672},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.35370001196861267}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7843000292778015},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6355000138282776},{"id":"https://openalex.org/C59519942","wikidata":"https://www.wikidata.org/wiki/Q650665","display_name":"Drone","level":2,"score":0.5891000032424927},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.5687000155448914},{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.555400013923645},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5307999849319458},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.45500001311302185},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.4377000033855438},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.4165000021457672},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.37369999289512634},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.35370001196861267},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.314300000667572},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.30959999561309814},{"id":"https://openalex.org/C168021876","wikidata":"https://www.wikidata.org/wiki/Q1353446","display_name":"Byzantine fault tolerance","level":3,"score":0.29750001430511475},{"id":"https://openalex.org/C27353603","wikidata":"https://www.wikidata.org/wiki/Q16948622","display_name":"Hash tree","level":4,"score":0.2924000024795532},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.2867000102996826},{"id":"https://openalex.org/C11560541","wikidata":"https://www.wikidata.org/wiki/Q1756025","display_name":"Replay attack","level":3,"score":0.2847999930381775},{"id":"https://openalex.org/C116537","wikidata":"https://www.wikidata.org/wiki/Q2169973","display_name":"Service provider","level":3,"score":0.28450000286102295},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.2800000011920929},{"id":"https://openalex.org/C145804949","wikidata":"https://www.wikidata.org/wiki/Q478123","display_name":"Situation awareness","level":2,"score":0.2759000062942505},{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.27300000190734863},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.2689000070095062},{"id":"https://openalex.org/C2777505653","wikidata":"https://www.wikidata.org/wiki/Q4470796","display_name":"Sybil attack","level":3,"score":0.26190000772476196}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1186/s13677-026-00879-5","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13677-026-00879-5","pdf_url":"https://link.springer.com/content/pdf/10.1186/s13677-026-00879-5.pdf","source":{"id":"https://openalex.org/S2486819371","display_name":"Journal of Cloud Computing Advances Systems and Applications","issn_l":"2192-113X","issn":["2192-113X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cloud Computing","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:1069ada2f1ae4fbdbc2cc3f4708b456e","is_oa":true,"landing_page_url":"https://doaj.org/article/1069ada2f1ae4fbdbc2cc3f4708b456e","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Journal of Cloud Computing: Advances, Systems and Applications, Vol 15, Iss 1 (2026)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s13677-026-00879-5","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13677-026-00879-5","pdf_url":"https://link.springer.com/content/pdf/10.1186/s13677-026-00879-5.pdf","source":{"id":"https://openalex.org/S2486819371","display_name":"Journal of Cloud Computing Advances Systems and Applications","issn_l":"2192-113X","issn":["2192-113X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cloud Computing","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G3338858046","display_name":null,"funder_award_id":"PSAU/","funder_id":"https://openalex.org/F4320311227","funder_display_name":"Prince Sattam bin Abdulaziz University"}],"funders":[{"id":"https://openalex.org/F4320311227","display_name":"Prince Sattam bin Abdulaziz University","ror":"https://ror.org/04jt46d36"},{"id":"https://openalex.org/F4320322873","display_name":"Universiti Teknikal Malaysia Melaka","ror":"https://ror.org/01xb6rs26"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W7136843404.pdf","grobid_xml":"https://content.openalex.org/works/W7136843404.grobid-xml"},"referenced_works_count":46,"referenced_works":["https://openalex.org/W3137986712","https://openalex.org/W4295789114","https://openalex.org/W4308529607","https://openalex.org/W4309579721","https://openalex.org/W4391847476","https://openalex.org/W4399311029","https://openalex.org/W4400076000","https://openalex.org/W4401611247","https://openalex.org/W4402132223","https://openalex.org/W4403572952","https://openalex.org/W4405179198","https://openalex.org/W4405241694","https://openalex.org/W4405429365","https://openalex.org/W4406311203","https://openalex.org/W4407693409","https://openalex.org/W4407721280","https://openalex.org/W4407796363","https://openalex.org/W4407917880","https://openalex.org/W4408100147","https://openalex.org/W4408476406","https://openalex.org/W4408859370","https://openalex.org/W4408867684","https://openalex.org/W4409310868","https://openalex.org/W4409325838","https://openalex.org/W4409557359","https://openalex.org/W4410230365","https://openalex.org/W4410536828","https://openalex.org/W4411019394","https://openalex.org/W4411055186","https://openalex.org/W4411446348","https://openalex.org/W4411864235","https://openalex.org/W4412605994","https://openalex.org/W4413104734","https://openalex.org/W4413127974","https://openalex.org/W4413355240","https://openalex.org/W4413407966","https://openalex.org/W4414079849","https://openalex.org/W4414221827","https://openalex.org/W4415034270","https://openalex.org/W4415047702","https://openalex.org/W4416530258","https://openalex.org/W4416582708","https://openalex.org/W4417337074","https://openalex.org/W7081927084","https://openalex.org/W7081948076","https://openalex.org/W7092284764"],"related_works":[],"abstract_inverted_index":{"The":[0,134,169],"robust":[1],"development":[2],"in":[3,32,45,146,182,196],"the":[4,29,71,89,92,103,107,142,179,215],"technology":[5],"of":[6,9,17,47,50,73,100,137,144,148,178,187,228],"Drone-enabled":[7],"Internet":[8],"Things":[10],"(DIoT)":[11],"infrastructure":[12],"has":[13],"revolutionized":[14],"major":[15,170],"fields":[16],"disaster":[18],"management,":[19],"real-time":[20],"surveillance,":[21],"agricultural":[22],"activities,":[23],"and":[24,38,82,111,154,163,191,201,223,231],"smart":[25],"city":[26],"management.":[27,133],"However,":[28],"inherent":[30],"vulnerabilities":[31],"communication":[33],"channels,":[34],"privacy":[35,75],"preservation,":[36],"security,":[37,81],"data":[39,219],"integrity":[40],"pose":[41],"a":[42,48,56,97,194],"critical":[43],"risk":[44],"terms":[46,147],"lack":[49],"security.":[51],"This":[52],"paper":[53],"proposes":[54],"BIoT-Chain,":[55],"Hyperledger":[57,110],"Fabric-enabled":[58],"Blockchain":[59],"(BDLT)":[60],"cloud":[61],"framework":[62],"integrated":[63],"with":[64,122,131],"Hash":[65],"encryption":[66],"version":[67],"3":[68],"(SHA-3),":[69],"especially":[70],"association":[72],"Keccak-based":[74],"protocols":[76],"to":[77,199,205,208],"ensure":[78],"robust,":[79],"scalable":[80],"tamper-proof":[83],"for":[84,109,114,129],"Drone":[85],"IoT":[86],"networks.":[87],"On":[88],"other":[90,209],"side,":[91],"classical":[93],"BDLT":[94,211],"solution":[95,105],"requires":[96],"high":[98],"cost":[99],"transactions,":[101],"whereas":[102],"proposed":[104,216],"leverages":[106],"module":[108],"permissioned,":[112],"designed":[113],"lightweight":[115],"consensus":[116],"that":[117,173],"ensures":[118,218],"energy":[119],"efficiency,":[120],"along":[121],"maintaining":[123],"low":[124],"latency,":[125],"which":[126],"is":[127],"suitable":[128],"drones":[130,167],"resource":[132],"successful":[135],"integration":[136],"SHA-3":[138],"Keccak":[139],"hashing":[140],"improved":[141],"resilience":[143,224],"cryptography":[145],"collision":[149],"resistance":[150],"against":[151,225],"node-to-node":[152],"transactions":[153],"preimage":[155],"attacks.":[156,233],"Thereby,":[157],"it":[158],"guarantees":[159],"secure":[160],"identity":[161],"management":[162],"privacy-preserving":[164],"intercommunication":[165],"among":[166],"block-to-block.":[168],"performance":[171],"evaluations":[172],"are":[174,176],"addressed":[175],"one":[177],"significant":[180],"enhancements":[181],"this":[183],"paper,":[184],"achieving":[185],"98.33%":[186],"malicious":[188],"traffic":[189],"classification":[190],"detection":[192],"accuracy,":[193],"reduction":[195],"latency":[197],"down":[198],"37%,":[200],"higher":[202],"throughput":[203],"up":[204],"42%":[206],"compared":[207],"state-of-the-art":[210],"methods.":[212],"In":[213],"addition,":[214],"BIoT-Chain":[217],"transability,":[220],"integrity,":[221],"provenance,":[222],"distributed":[226],"denial":[227],"service":[229],"(DDoS)":[230],"replay":[232]},"counts_by_year":[],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2026-03-17T00:00:00"}
