{"id":"https://openalex.org/W7117413549","doi":"https://doi.org/10.7494/csci.2025.26.4.6414","title":"Optchain: An Advanced Optimization Method for Enhancing IoT Data Security via Blockchain","display_name":"Optchain: An Advanced Optimization Method for Enhancing IoT Data Security via Blockchain","publication_year":2025,"publication_date":"2025-12-28","ids":{"openalex":"https://openalex.org/W7117413549","doi":"https://doi.org/10.7494/csci.2025.26.4.6414"},"language":null,"primary_location":{"id":"doi:10.7494/csci.2025.26.4.6414","is_oa":true,"landing_page_url":"https://doi.org/10.7494/csci.2025.26.4.6414","pdf_url":"https://journals.agh.edu.pl/csci/article/download/6414/3315","source":{"id":"https://openalex.org/S57947533","display_name":"Computer Science","issn_l":"1508-2806","issn":["1508-2806","2300-7036"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320333","host_organization_name":"Wydawnictwa AGH","host_organization_lineage":["https://openalex.org/P4310320333"],"host_organization_lineage_names":["Wydawnictwa AGH"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computer Science","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://journals.agh.edu.pl/csci/article/download/6414/3315","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5067989032","display_name":"Shatakshi Kokate","orcid":"https://orcid.org/0000-0002-3257-8099"},"institutions":[{"id":"https://openalex.org/I4210146358","display_name":"Raisoni Group of Institutions","ror":"https://ror.org/03dp11s58","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210146358"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"SHATAKSHI KOKATE","raw_affiliation_strings":["G. H. Raisoni College of Engineering Nagpur, Department of Computer Science and Engineering, India"],"affiliations":[{"raw_affiliation_string":"G. H. Raisoni College of Engineering Nagpur, Department of Computer Science and Engineering, India","institution_ids":["https://openalex.org/I4210146358"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5067989032"],"corresponding_institution_ids":["https://openalex.org/I4210146358"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.78130149,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"26","issue":"4","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.44440001249313354,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.44440001249313354,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13038","display_name":"Internet of Things and AI","score":0.08590000122785568,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.053199999034404755,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.9059000015258789},{"id":"https://openalex.org/keywords/volume","display_name":"Volume (thermodynamics)","score":0.6100999712944031},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.5751000046730042},{"id":"https://openalex.org/keywords/reduction","display_name":"Reduction (mathematics)","score":0.4729999899864197},{"id":"https://openalex.org/keywords/computer-data-storage","display_name":"Computer data storage","score":0.4634999930858612},{"id":"https://openalex.org/keywords/data-security","display_name":"Data security","score":0.3846000134944916},{"id":"https://openalex.org/keywords/data-transmission","display_name":"Data transmission","score":0.37059998512268066}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.9124000072479248},{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.9059000015258789},{"id":"https://openalex.org/C20556612","wikidata":"https://www.wikidata.org/wiki/Q4469374","display_name":"Volume (thermodynamics)","level":2,"score":0.6100999712944031},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.5751000046730042},{"id":"https://openalex.org/C111335779","wikidata":"https://www.wikidata.org/wiki/Q3454686","display_name":"Reduction (mathematics)","level":2,"score":0.4729999899864197},{"id":"https://openalex.org/C194739806","wikidata":"https://www.wikidata.org/wiki/Q66221","display_name":"Computer data storage","level":2,"score":0.4634999930858612},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.3846000134944916},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.37369999289512634},{"id":"https://openalex.org/C557945733","wikidata":"https://www.wikidata.org/wiki/Q389772","display_name":"Data transmission","level":2,"score":0.37059998512268066},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.35929998755455017},{"id":"https://openalex.org/C2776175482","wikidata":"https://www.wikidata.org/wiki/Q1195816","display_name":"Transfer (computing)","level":2,"score":0.34060001373291016},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.32760000228881836},{"id":"https://openalex.org/C2778820799","wikidata":"https://www.wikidata.org/wiki/Q3454688","display_name":"Cost reduction","level":2,"score":0.31189998984336853},{"id":"https://openalex.org/C78548338","wikidata":"https://www.wikidata.org/wiki/Q2493","display_name":"Data compression","level":2,"score":0.29899999499320984},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.29409998655319214},{"id":"https://openalex.org/C138827492","wikidata":"https://www.wikidata.org/wiki/Q6661985","display_name":"Data processing","level":2,"score":0.2903999984264374},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.2847000062465668},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.2797999978065491},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.25600001215934753}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.7494/csci.2025.26.4.6414","is_oa":true,"landing_page_url":"https://doi.org/10.7494/csci.2025.26.4.6414","pdf_url":"https://journals.agh.edu.pl/csci/article/download/6414/3315","source":{"id":"https://openalex.org/S57947533","display_name":"Computer Science","issn_l":"1508-2806","issn":["1508-2806","2300-7036"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320333","host_organization_name":"Wydawnictwa AGH","host_organization_lineage":["https://openalex.org/P4310320333"],"host_organization_lineage_names":["Wydawnictwa AGH"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computer Science","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.7494/csci.2025.26.4.6414","is_oa":true,"landing_page_url":"https://doi.org/10.7494/csci.2025.26.4.6414","pdf_url":"https://journals.agh.edu.pl/csci/article/download/6414/3315","source":{"id":"https://openalex.org/S57947533","display_name":"Computer Science","issn_l":"1508-2806","issn":["1508-2806","2300-7036"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320333","host_organization_name":"Wydawnictwa AGH","host_organization_lineage":["https://openalex.org/P4310320333"],"host_organization_lineage_names":["Wydawnictwa AGH"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computer Science","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","score":0.44174009561538696,"id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W7117413549.pdf","grobid_xml":"https://content.openalex.org/works/W7117413549.grobid-xml"},"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"The":[0,105],"increased":[1],"use":[2],"of":[3,121],"IoT":[4,112],"devices":[5],"in":[6,69,129],"various":[7],"domains":[8],"generates":[9],"abundant":[10],"data":[11,15,58,76,88,130,133],"traffic.":[12],"Securing":[13],"this":[14,49,70],"during":[16],"transfer":[17],"and":[18,79,81,102],"storage":[19,94],"is":[20,23,36,67,108,134,137],"essential.":[21],"Blockchain":[22],"now":[24],"a":[25,126],"trending":[26],"technology":[27],"to":[28,31,55,63,85,89,115,152],"provide":[29],"security":[30,151],"the":[32,57,64,86,118,122,141,145,153],"data.":[33,46,113,155],"However,":[34],"it":[35,62,136],"observed":[37],"that":[38],"blockchain":[39,65,142],"performs":[40],"poorly":[41],"while":[42],"managing":[43],"large":[44],"volume":[45],"To":[47],"mitigate":[48],"issue,":[50],"an":[51],"advanced":[52],"Optchain":[53,147],"method":[54,73,107,148],"reduce":[56,90],"size":[59],"before":[60],"submitting":[61],"network":[66],"introduced":[68],"paper.":[71],"This":[72,92],"first":[74],"classifies":[75],"as":[77],"relevant":[78],"irrelevant":[80],"then":[82],"applies":[83],"compression":[84],"appropriate":[87],"size.":[91,131],"reduces":[93],"requirements,":[95],"improves":[96],"processing":[97],"efficiency,":[98],"ensures":[99],"faster":[100],"transactions,":[101],"lowers":[103],"cost.":[104],"proposed":[106,146],"tested":[109],"for":[110],"healthcare":[111],"Compared":[114],"current":[116],"systems,":[117],"evaluation":[119],"findings":[120],"suggested":[123],"solution":[124],"show":[125],"notable":[127],"reduction":[128],"As":[132],"reduced,":[135],"easily":[138],"managed":[139],"by":[140],"network.":[143],"Thus,":[144],"provides":[149],"better":[150],"IoT-generated":[154]},"counts_by_year":[],"updated_date":"2026-03-13T14:20:09.374765","created_date":"2025-12-28T00:00:00"}
