{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T15:36:07Z","timestamp":1725809767930},"reference-count":73,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2020,11,1]],"date-time":"2020-11-01T00:00:00Z","timestamp":1604188800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Journal of Parallel and Distributed Computing"],"published-print":{"date-parts":[[2020,11]]},"DOI":"10.1016\/j.jpdc.2020.06.008","type":"journal-article","created":{"date-parts":[[2020,6,30]],"date-time":"2020-06-30T18:55:41Z","timestamp":1593543341000},"page":"75-97","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":37,"special_numbering":"C","title":["Lightweight collaborative anomaly detection for the IoT using blockchain"],"prefix":"10.1016","volume":"145","author":[{"given":"Yisroel","family":"Mirsky","sequence":"first","affiliation":[]},{"given":"Tomer","family":"Golomb","sequence":"additional","affiliation":[]},{"given":"Yuval","family":"Elovici","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.jpdc.2020.06.008_b1","series-title":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security","first-page":"743","article-title":"C-FLAT: control-flow attestation for embedded systems software","author":"Abera","year":"2016"},{"issue":"1","key":"10.1016\/j.jpdc.2020.06.008_b2","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1016\/j.jnca.2005.06.001","article-title":"D-SCIDS: Distributed soft computing intrusion detection system","volume":"30","author":"Abraham","year":"2007","journal-title":"J. Netw. Comput. Appl."},{"key":"10.1016\/j.jpdc.2020.06.008_b3","series-title":"Internet X. 509 Public Key Infrastructure Certificate Management Protocol (CMP)","author":"Adams","year":"2005"},{"key":"10.1016\/j.jpdc.2020.06.008_b4","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1016\/j.jnca.2015.11.016","article-title":"A survey of network anomaly detection techniques","volume":"60","author":"Ahmed","year":"2016","journal-title":"J. Netw. Comput. Appl."},{"issue":"12","key":"10.1016\/j.jpdc.2020.06.008_b5","doi-asserted-by":"crossref","first-page":"3448","DOI":"10.1016\/j.comnet.2007.02.001","article-title":"An overview of anomaly detection techniques: Existing solutions and latest technological trends","volume":"51","year":"2007","journal-title":"Comput. Netw."},{"key":"10.1016\/j.jpdc.2020.06.008_b6","unstructured":"M. Antonakakis, T. April, M. Bailey, M. Bernhard, E. Bursztein, J. Cochran, Z. Durumeric, J.A. Halderman, L. Invernizzi, M. Kallitsis, et al. Understanding the mirai botnet, in: 26th {USENIX} Security Symposium ,{USENIX} Security 17, 2017, pp. 1093\u20131110."},{"key":"10.1016\/j.jpdc.2020.06.008_b7","series-title":"Inside the numbers: 100 billion ARM-based chips - processors blog - processors - arm community","author":"ARM","year":"2017"},{"key":"10.1016\/j.jpdc.2020.06.008_b8","series-title":"Trustzone for cortex-M \u2013 Arm","author":"ARM","year":"2019"},{"key":"10.1016\/j.jpdc.2020.06.008_b9","series-title":"Computer Communication and Networks (ICCCN), 2016 25th International Conference on","first-page":"1","article-title":"Behavioral modeling intrusion detection system (BMIDS) using Internet of Things (IoT) behavior-based anomaly detection via immunity-inspired algorithms","author":"Arrington","year":"2016"},{"key":"10.1016\/j.jpdc.2020.06.008_b10","series-title":"An Introduction to Queueing Theory","first-page":"115","article-title":"Extended Markov models","author":"Bhat","year":"2008"},{"key":"10.1016\/j.jpdc.2020.06.008_b11","series-title":"Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security","first-page":"30","article-title":"Jump-oriented programming: a new class of code-reuse attack","author":"Bletsch","year":"2011"},{"key":"10.1016\/j.jpdc.2020.06.008_b12","series-title":"Mongoose","author":"cesanta","year":"2010"},{"issue":"5","key":"10.1016\/j.jpdc.2020.06.008_b13","doi-asserted-by":"crossref","first-page":"823","DOI":"10.1109\/TKDE.2010.235","article-title":"Anomaly detection for discrete sequences: A survey","volume":"24","author":"Chandola","year":"2010","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"10.1016\/j.jpdc.2020.06.008_b14","series-title":"Joint European Conference on Machine Learning and Knowledge Discovery in Databases","first-page":"149","article-title":"Host based intrusion detection system with combined cnn\/rnn model","author":"Chawla","year":"2018"},{"key":"10.1016\/j.jpdc.2020.06.008_b15","series-title":"Genetic and Evolutionary Computing (ICGEC), 2011 Fifth International Conference on","first-page":"311","article-title":"A novel secure architecture for the internet of things","author":"Chen","year":"2011"},{"key":"10.1016\/j.jpdc.2020.06.008_b16","series-title":"Buffer Overflow Attacks: Detect, Exploit, Prevent","author":"Deckard","year":"2005"},{"key":"10.1016\/j.jpdc.2020.06.008_b17","series-title":"Proceedings of the 2014 Conference on Internet Measurement Conference","first-page":"475","article-title":"The matter of heartbleed","author":"Durumeric","year":"2014"},{"key":"10.1016\/j.jpdc.2020.06.008_b18","article-title":"Gartner: 21 Billion IoT devices to invade by 2020","volume":"10","author":"Eddy","year":"2015","journal-title":"InformationWeek"},{"key":"10.1016\/j.jpdc.2020.06.008_b19","unstructured":"S. El\u00a0Sherei, Return to libc."},{"key":"10.1016\/j.jpdc.2020.06.008_b20","series-title":"Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX\u201901, Vol. 1","first-page":"165","article-title":"Modeling system calls for intrusion detection with dynamic window sizes","author":"Eskin","year":"2001"},{"key":"10.1016\/j.jpdc.2020.06.008_b21","series-title":"Discovery overview ethereum\/devp2p Wiki Github","author":"Ethereum","year":"2019"},{"key":"10.1016\/j.jpdc.2020.06.008_b22","series-title":"Proceedings 1996 IEEE Symposium on Security and Privacy","first-page":"120","article-title":"A sense of self for unix processes","author":"Forrest","year":"1996"},{"key":"10.1016\/j.jpdc.2020.06.008_b23","series-title":"Proceedings. International Conference on Machine Learning and Cybernetics, Vol. 1","first-page":"381","article-title":"Hmms (hidden markov models) based on anomaly intrusion detection method","author":"Gao","year":"2002"},{"key":"10.1016\/j.jpdc.2020.06.008_b24","series-title":"Proc. 11th IEEE Int\u2019L. Conf","article-title":"A multi-layer model for anomaly intrusion detection using program sequences of system calls","author":"Hoang","year":"2003"},{"issue":"3","key":"10.1016\/j.jpdc.2020.06.008_b25","doi-asserted-by":"crossref","first-page":"151","DOI":"10.3233\/JCS-980109","article-title":"Intrusion detection using sequences of system calls","volume":"6","author":"Hofmeyr","year":"1998","journal-title":"J. Comput. Secur."},{"issue":"1","key":"10.1016\/j.jpdc.2020.06.008_b26","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1109\/MNET.2009.4804323","article-title":"A simple and efficient hidden Markov model scheme for host-based anomaly intrusion detection","volume":"23","author":"Hu","year":"2009","journal-title":"IEEE Netw."},{"key":"10.1016\/j.jpdc.2020.06.008_b27","unstructured":"R. Huuck, IoT: The internet of threats and static program analysis defense, in: EmbeddedWorld 2015: Exibition & Conferences, 2015, pp. 493."},{"key":"10.1016\/j.jpdc.2020.06.008_b28","series-title":"Proceedings of the 12th International Conference on Availability, Reliability and Security","first-page":"95","article-title":"Rolling DICE: Lightweight remote attestation for COTS IoT hardware","author":"J\u00e4ger","year":"2017"},{"key":"10.1016\/j.jpdc.2020.06.008_b29","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1016\/j.future.2019.01.026","article-title":"PTAS: Privacy-preserving thin-client authentication scheme in blockchain-based PKI","volume":"96","author":"Jiang","year":"2019","journal-title":"Future Gener. Comput. Syst."},{"key":"10.1016\/j.jpdc.2020.06.008_b30","series-title":"Frontiers of Information Technology (FIT), 2012 10th International Conference on","first-page":"257","article-title":"Future internet: the internet of things architecture, possible applications and key challenges","author":"Khan","year":"2012"},{"key":"10.1016\/j.jpdc.2020.06.008_b31","doi-asserted-by":"crossref","first-page":"186","DOI":"10.1016\/j.infsof.2017.07.009","article-title":"An anomaly detection system based on variable N-gram features and one-class SVM","volume":"91","author":"Khreich","year":"2017","journal-title":"Inf. Softw. Technol."},{"key":"10.1016\/j.jpdc.2020.06.008_b32","series-title":"LSTM-Based system-call language modeling and robust ensemble method for designing host-based intrusion detection systems","author":"Kim","year":"2016"},{"issue":"5","key":"10.1016\/j.jpdc.2020.06.008_b33","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1109\/52.605929","article-title":"Intrusion detection via system call traces","volume":"14","author":"Kosoresow","year":"1997","journal-title":"IEEE Softw."},{"key":"10.1016\/j.jpdc.2020.06.008_b34","series-title":"Data mining approaches for intrusion detection","author":"Lee","year":"1998"},{"key":"10.1016\/j.jpdc.2020.06.008_b35","unstructured":"W. Lee, S.J. Stolfo, P.K. Chan, Learning patterns from unix process execution traces for intrusion detection, in: AAAI Workshop on AI Approaches To Fraud Detection and Risk Management,New York, 1997, pp. 50\u201356."},{"key":"10.1016\/j.jpdc.2020.06.008_b36","series-title":"2016 International Conference on Inventive Computation Technologies, Vol. 2","first-page":"1","article-title":"Advanced anomaly intrusion detection technique for host based system using system call patterns","author":"Maske","year":"2016"},{"key":"10.1016\/j.jpdc.2020.06.008_b37","series-title":"41st ACM Southeast Regional Conference Proceedings","article-title":"Probabilistic trees and automata for application behavior modeling","author":"Mazeroff","year":"2003"},{"issue":"1","key":"10.1016\/j.jpdc.2020.06.008_b38","doi-asserted-by":"crossref","first-page":"90","DOI":"10.1016\/j.patcog.2007.04.006","article-title":"Probabilistic suffix models for API sequence analysis of Windows XP applications","volume":"41","author":"Mazeroff","year":"2008","journal-title":"Pattern Recognit."},{"key":"10.1016\/j.jpdc.2020.06.008_b39","series-title":"Proceedings 16th Annual Computer Security Applications Conference","first-page":"21","article-title":"Two state-based approaches to program-based anomaly detection","author":"Michael","year":"2000"},{"key":"10.1016\/j.jpdc.2020.06.008_b40","article-title":"This POODLE bites: exploiting the SSL 3.0 fallback","author":"M\u00f6ller","year":"2014","journal-title":"Secur. Advis."},{"key":"10.1016\/j.jpdc.2020.06.008_b41","series-title":"Advances in Computer Science and Ubiquitous Computing","first-page":"713","article-title":"A functional relationship based attestation scheme for detecting compromised nodes in large IoT networks","author":"Moon","year":"2015"},{"key":"10.1016\/j.jpdc.2020.06.008_b42","series-title":"Encyclopedia of Cryptography and Security","first-page":"1332","article-title":"Trusted platform module","author":"Morris","year":"2011"},{"key":"10.1016\/j.jpdc.2020.06.008_b43","series-title":"Bitcoin: A peer-to-peer electronic cash system","author":"Nakamoto","year":"2008"},{"issue":"12","key":"10.1016\/j.jpdc.2020.06.008_b44","doi-asserted-by":"crossref","first-page":"24188","DOI":"10.3390\/s141224188","article-title":"A malicious pattern detection engine for embedded security systems in the Internet of Things","volume":"14","author":"Oh","year":"2014","journal-title":"Sensors"},{"key":"10.1016\/j.jpdc.2020.06.008_b45","series-title":"2018 Second World Conference on Smart Trends in Systems, Security and Sustainability","first-page":"78","article-title":"IoT infrastructure secured by TLS level authentication and PKI identity system","author":"Oniga","year":"2018"},{"issue":"3","key":"10.1016\/j.jpdc.2020.06.008_b46","doi-asserted-by":"crossref","first-page":"1413","DOI":"10.1109\/SURV.2013.112813.00168","article-title":"Anomaly detection in wireless sensor networks in a non-stationary environment","volume":"16","author":"O\u2019Reilly","year":"2014","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"10.1016\/j.jpdc.2020.06.008_b47","series-title":"ISSE 2015","first-page":"121","article-title":"Trust evidence for IoT: Trust establishment from servers to sensors","author":"Ott","year":"2015"},{"key":"10.1016\/j.jpdc.2020.06.008_b48","series-title":"Pibrella Github","author":"pimoroni","year":"2013"},{"issue":"6","key":"10.1016\/j.jpdc.2020.06.008_b49","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1109\/MSP.2012.152","article-title":"Return-oriented programming","volume":"10","author":"Prandini","year":"2012","journal-title":"IEEE Secur. Priv."},{"issue":"8","key":"10.1016\/j.jpdc.2020.06.008_b50","doi-asserted-by":"crossref","first-page":"2661","DOI":"10.1016\/j.adhoc.2013.04.014","article-title":"SVELTE: Real-time intrusion detection in the Internet of Things","volume":"11","author":"Raza","year":"2013","journal-title":"Ad Hoc Netw."},{"key":"10.1016\/j.jpdc.2020.06.008_b51","series-title":"Attacks on ssl a comprehensive study of beast, crime, time, breach, lucky 13 & rc4 biases","author":"Sarkar","year":"2013"},{"key":"10.1016\/j.jpdc.2020.06.008_b52","unstructured":"B. Schneier, E-Mail Vulnerabilities and Disclosure, URL https:\/\/www.schneier.com\/blog\/archives\/2018\/06\/e-mail_vulnerab.html."},{"key":"10.1016\/j.jpdc.2020.06.008_b53","article-title":"The Internet of things is wildly insecure\u2013and often unpatchable","volume":"6","author":"Schneier","year":"2014","journal-title":"Schneier Secur."},{"key":"10.1016\/j.jpdc.2020.06.008_b54","series-title":"Zimperlich sources","author":"Sebastian","year":"2011"},{"key":"10.1016\/j.jpdc.2020.06.008_b55","series-title":"Proceedings of the 11th ACM Conference on Computer and Communications Security","first-page":"298","article-title":"On the effectiveness of address-space randomization","author":"Shacham","year":"2004"},{"key":"10.1016\/j.jpdc.2020.06.008_b56","series-title":"Blockchain for Distributed Systems Security","author":"Shetty","year":"2019"},{"key":"10.1016\/j.jpdc.2020.06.008_b57","series-title":"2018 IEEE 4th International Conference on Collaboration and Internet Computing","first-page":"9","article-title":"Blockchain-based PKI solutions for IoT","author":"Singla","year":"2018"},{"key":"10.1016\/j.jpdc.2020.06.008_b58","unstructured":"S.R. Snapp, J. Brentano, G.V. Dias, T.L. Goan, L.T. Heberlein, C.-L. Ho, K.N. Levitt, B. Mukherjee, S.E. Smaha, T. Grance, et al. DIDS (distributed intrusion detection system)-motivation, architecture, and an early prototype, in: Proceedings of the 14th National Computer Security Conference, Vol. 1,Washington, DC, 1991, pp. 167\u2013176."},{"key":"10.1016\/j.jpdc.2020.06.008_b59","unstructured":". Strukton, 2000 IoT sensors to monitor rail infrastructure assets in the Netherlands."},{"key":"10.1016\/j.jpdc.2020.06.008_b60","series-title":"VLSI Design, Automation and Test (VLSI-DAT), 2011 International Symposium on","first-page":"1","article-title":"Multi-core software\/hardware co-debug platform with ARM CoreSight, on-chip test architecture and AXI\/AHB bus monitor","author":"Su","year":"2011"},{"key":"10.1016\/j.jpdc.2020.06.008_b61","series-title":"Blockchain: Blueprint for a New Economy","author":"Swan","year":"2015"},{"key":"10.1016\/j.jpdc.2020.06.008_b62","series-title":"Learning Rules from System Call Arguments and Sequences for Anomaly Detection","author":"Tandon","year":"2003"},{"key":"10.1016\/j.jpdc.2020.06.008_b63","series-title":"ICT Convergence (ICTC), 2013 International Conference on","first-page":"38","article-title":"An analytics framework to detect compromised IoT devices using mobility behavior","author":"Taneja","year":"2013"},{"key":"10.1016\/j.jpdc.2020.06.008_b64","series-title":"International Workshop on Recent Advances in Intrusion Detection","first-page":"121","article-title":"On the expressiveness of return-into-libc attacks","author":"Tran","year":"2011"},{"key":"10.1016\/j.jpdc.2020.06.008_b65","series-title":"Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security","first-page":"1313","article-title":"Key reinstallation attacks: Forcing nonce reuse in WPA2","author":"Vanhoef","year":"2017"},{"key":"10.1016\/j.jpdc.2020.06.008_b66","series-title":"Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No. 99CB36344)","first-page":"133","article-title":"Detecting intrusions using system calls: Alternative data models","author":"Warrender","year":"1999"},{"key":"10.1016\/j.jpdc.2020.06.008_b67","series-title":"WiringPi","author":"WiringPi","year":"2012"},{"key":"10.1016\/j.jpdc.2020.06.008_b68","series-title":"2013 6th International Congress on Image and Signal Processing, Vol. 3","first-page":"1711","article-title":"Evaluating host-based anomaly detection systems: A preliminary analysis of adfa-ld","author":"Xie","year":"2013"},{"issue":"1","key":"10.1016\/j.jpdc.2020.06.008_b69","doi-asserted-by":"crossref","first-page":"229","DOI":"10.1016\/S0031-3203(02)00026-2","article-title":"Host-based intrusion detection using dynamic and static behavioral models","volume":"36","author":"Yeung","year":"2003","journal-title":"Pattern Recognit."},{"key":"10.1016\/j.jpdc.2020.06.008_b70","unstructured":"J. Yiu, ARMv8-M architecture technical overview, ARM WHITE PAPER, 2015."},{"key":"10.1016\/j.jpdc.2020.06.008_b71","series-title":"Proceedings of the Second International Conference on Internet-of-Things Design and Implementation","first-page":"191","article-title":"Learning execution contexts from system call distribution for anomaly detection in smart embedded system","author":"Yoon","year":"2017"},{"key":"10.1016\/j.jpdc.2020.06.008_b72","series-title":"2015 52nd ACM\/EDAC\/IEEE Design Automation Conference","first-page":"1","article-title":"Memory Heat Map: Anomaly detection in real-time embedded systems using memory behavior","author":"Yoon","year":"2015"},{"issue":"4","key":"10.1016\/j.jpdc.2020.06.008_b73","doi-asserted-by":"crossref","first-page":"796","DOI":"10.1109\/TSG.2011.2159818","article-title":"Distributed intrusion detection system in a multi-layer network architecture of smart grids","volume":"2","author":"Zhang","year":"2011","journal-title":"IEEE Trans. Smart Grid"}],"container-title":["Journal of Parallel and Distributed Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0743731520303154?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0743731520303154?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2020,9,1]],"date-time":"2020-09-01T16:31:58Z","timestamp":1598977918000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0743731520303154"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11]]},"references-count":73,"alternative-id":["S0743731520303154"],"URL":"https:\/\/doi.org\/10.1016\/j.jpdc.2020.06.008","relation":{},"ISSN":["0743-7315"],"issn-type":[{"value":"0743-7315","type":"print"}],"subject":[],"published":{"date-parts":[[2020,11]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Lightweight collaborative anomaly detection for the IoT using blockchain","name":"articletitle","label":"Article Title"},{"value":"Journal of Parallel and Distributed Computing","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.jpdc.2020.06.008","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2020 Elsevier Inc. All rights reserved.","name":"copyright","label":"Copyright"}]}}