{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T13:12:17Z","timestamp":1744204337712,"version":"3.37.3"},"reference-count":61,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"11","license":[{"start":{"date-parts":[[2020,11,1]],"date-time":"2020-11-01T00:00:00Z","timestamp":1604188800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,11,1]],"date-time":"2020-11-01T00:00:00Z","timestamp":1604188800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,11,1]],"date-time":"2020-11-01T00:00:00Z","timestamp":1604188800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Ripple Centre of Excellence Scheme, Centre of Excellence (CoE) in Blockchain"},{"name":"Sanction no. International Institute of Information Technology (IIIT)\/R&D Office\/Internal","award":["Projects\/001\/2019"]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Ind. Inf."],"published-print":{"date-parts":[[2020,11]]},"DOI":"10.1109\/tii.2019.2942389","type":"journal-article","created":{"date-parts":[[2019,9,19]],"date-time":"2019-09-19T20:08:06Z","timestamp":1568923686000},"page":"7081-7093","source":"Crossref","is-referenced-by-count":173,"title":["Designing Secure Lightweight Blockchain-Enabled RFID-Based Authentication Protocol for Supply Chains in 5G Mobile Edge Computing Environment"],"prefix":"10.1109","volume":"16","author":[{"given":"Srinivas","family":"Jangirala","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5196-9589","authenticated-orcid":false,"given":"Ashok Kumar","family":"Das","sequence":"additional","affiliation":[]},{"given":"Athanasios V.","family":"Vasilakos","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1155\/2015\/875371"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-014-0116-z"},{"year":"0","key":"ref33","article-title":"Why supply chains need Blockchain solutions more than ever"},{"year":"2019","key":"ref32","article-title":"Supply Chain Solutions"},{"article-title":"Blockchain and Artificial Intelligence","year":"2018","author":"marwala","key":"ref31"},{"journal-title":"Blockchain Blueprint for a New Economy","year":"2015","author":"swan","key":"ref30"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46035-7_22"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056650"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2018.8538567"},{"year":"0","key":"ref34","article-title":"Waltonchain"},{"year":"2019","key":"ref60","article-title":"SPAN, the Security Protocol ANimator for AVISPA"},{"journal-title":"Secure Hash Standard","year":"0","key":"ref61"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2018.3620971"},{"year":"2018","key":"ref27","article-title":"Nebula AI (NBAI) – Decentralized AI Blockchain Whitepaper"},{"key":"ref29","first-page":"1","article-title":"Ethereum: A Secure Decentralised Generalised Transaction Ledger","volume":"151","author":"wood","year":"2014","journal-title":"Ethereum Project Yellow Paper"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2757384.2757397"},{"article-title":"Blockchain and 5G-Enabled Internet of Things (IoT) will redefine Supply Chains and Trade Finance","year":"0","author":"dewey","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2773666"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2014.2300753"},{"article-title":"Industrial Internet of Things (IIoT) and Its Impact on the Design of Automation Systems","year":"2017","author":"dhanani","key":"ref21"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-014-0761-7"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2780232"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1080\/17517570701504633"},{"year":"0","key":"ref25","article-title":"Watson IoT Platform"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-016-3647-4"},{"journal-title":"EPC™Radio-Frequency Identity Protocols Generation-2 UHF RFID","year":"2013","key":"ref51"},{"year":"2019","key":"ref59","article-title":"Automated Validation of Internet Security Protocols and Applications"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2018.2828306"},{"key":"ref57","article-title":"Targeted backdoor attacks on deep learning systems using data poisoning","volume":"abs 1712 5526","author":"chen","year":"2017","journal-title":"CoRR"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.3390\/logistics3010005"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-018-2538-8"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2890389"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-32004-3_9"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-77090-9_52"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2017.3571064"},{"key":"ref11","first-page":"305","article-title":"In search of an understandable consensus algorithm","author":"ongaro","year":"0","journal-title":"Proc USENIX Annu Tech Conf"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2013.02.004"},{"article-title":"Blockchain: One Truth Across Networks for the Supply Chain","year":"0","author":"khaitan","key":"ref12"},{"year":"0","key":"ref13","article-title":"Cibus Blockchain will transform the global food supply chain"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1701095"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2890507"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.05.001"},{"key":"ref17","first-page":"1","article-title":"Mobile edge computing-A key technology towards 5G","author":"hu","year":"0","journal-title":"ETSI Sophia Antipolis - France"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/8267838"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2013.01.010"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2881246"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2017.07.001"},{"year":"0","key":"ref6","article-title":"How Blockchain can impact the telecommunications industry and its relevance to the C-Suite"},{"article-title":"The Implications of Fusing 5 G and Blockchain","year":"0","author":"whittle","key":"ref5"},{"key":"ref8","article-title":"BlockChain technology","author":"michael","year":"2018","journal-title":"Journal"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.bushor.2018.08.012"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2720760"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/BigDataCongress.2017.85"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.05.005"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2874473"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-017-0564-6"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1314"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2360121"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1250"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2019.2899580"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2787800"}],"container-title":["IEEE Transactions on Industrial Informatics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9424\/9153960\/08844768.pdf?arnumber=8844768","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,27]],"date-time":"2022-04-27T16:58:51Z","timestamp":1651078731000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8844768\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11]]},"references-count":61,"journal-issue":{"issue":"11"},"URL":"https:\/\/doi.org\/10.1109\/tii.2019.2942389","relation":{},"ISSN":["1551-3203","1941-0050"],"issn-type":[{"type":"print","value":"1551-3203"},{"type":"electronic","value":"1941-0050"}],"subject":[],"published":{"date-parts":[[2020,11]]}}}