[1] Al-Sarawi S.,Anbar M.,Abdullah R.,Hawari A. B. .2020 .July). In 2020 Fourth World Conference on smart trends in systems, security and sustainability (WorldS4), : 449-453.
[2] Hendriks S. .2016 .Internet of Things: How the world will be connected in 2025 (Master's thesis). , : .
[3] Jha R. S.,Sahoo P. R. .2020 .Internet of things (IoT)-enabler for connecting world. In ICT for competitive strategies, : 1-7.
[4] Espinoza H.,Kling G.,McGroarty F.,O'Mahony M.,Ziouvelou X. .2020 .Estimating the impact of the Internet of Things on productivity in Europe. , 6(5) : .
[5] Zhang X.,Upton O.,Beebe N. L.,Choo K. K. R. .2020 .Iot botnet forensics: A comprehensive digital forensic case study on mirai botnet servers. Forensic Science International: Digital Investigation, 32 : 300926.
[6] Antonakakis M.,April T.,Bailey M.,Bernhard M.,Bursztein E.,Cochran J.,Zhou Y. .2017 .Understanding the mirai botnet. In 26th USENIX security symposium (USENIX Security 17), : 1093-1110.
[7] Chatterjee U.,Ray S. .2022 .Security issues on IoT communication and evolving solutions. Soft Computing in Interdisciplinary Sciences, : 183-204.
[8] Kumar G. E. P.,Lydia M.,Levron Y. .2022 .Security challenges in 5G and IoT networks: A review. Secure Communication for 5G and IoT Networks, : 1-13.
[9] Otaibi Al,M. N. Al .2019 .Internet of Things (IoT) Saudi Arabia healthcare systems: state-of-the-art, future opportunities and open challenges. Journal of Health Informatics in Developing Countries, 13(1) : .
[10] Bakar N. A. A.,Ramli W. M. W.,Hassan N. H. .2019 .The internet of things in healthcare: an overview, challenges and model plan for security risks management process. Indonesian Journal of Electrical Engineering and Computer Science (IJEECS), 15(1) : 414-420.
[11] Kandi M. A.,Kouicem D. E.,Lakhlef H.,Bouabdallah A.,Challal Y. .2020 .A blockchain-based key management protocol for secure device-to-device communication in the Internet of Things. In 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), : 1868-1873.
[12] Zhang K.,Khan F.,Alturki R.,Khan R.,Rehman A. U. .2021 .A mutual authentication scheme for establishing secure device-to-device communication sessions in the edgeenabled smart cities. Journal of Information Security and Applications, 58 : 102683.
[13] Khan A. A.,Laghari A. A.,Shaikh Z. A.,Dacko-Pikiewicz Z.,Kot S. .2022 .Internet of Things (IoT) security with blockchain technology: A state-of-the-art review. IEEE Access, 10 : 122679-122695.
[14] Gugueoth V.,Safavat S.,Shetty S.,Rawat D. .2023 .A review of IoT security and privacy using decentralized blockchain techniques. Computer Science Review, 50 : 100585.
[15] Khan A. A.,Laghari A. A.,Shaikh Z. A.,Dacko-Pikiewicz Z.,Kot S. .2022 .Internet of Things (IoT) security with blockchain technology: A state-of-the-art review. IEEE Access, 10 : 122679-122695.
[16] Khan D.,Jung L. T.,Hashmani M. A. .2021 .Systematic literature review of challenges in blockchain scalability. Applied Sciences, 11(20) : 9372.
[17] Zhou Q.,Huang H.,Zheng Z.,Bian J. .2020 .Solutions to scalability of blockchain: A survey. Ieee Access, 8 : 16440-16455.
[18] Uddin M. A.,Stranieri A.,Gondal I.,Balasubramanian V. .2021 .A survey on the adoption of blockchain in iot: Challenges and solutions. Blockchain: Research and Applications, 2(2) : 100006.
[19] Kharche A.,Badholia S.,Upadhyay R. K. .2024 .Implementation of blockchain technology in integrated IoT networks for constructing scalable ITS systems in India. Blockchain: Research and Applications, 100188 : .
[20] Dargaoui S.,Azrour M.,El Allaoui A.,Amounas F.,Guezzaz A.,Attou H.,Bouazza S. H. .2023 .Advanced technology for smart environment. , 151 : 160.
[21] Sarker I. H.,Khan A. I.,Abushark Y. B.,Alsolami F. .2023 .Internet of things (iot) security intelligence: a comprehensive overview, machine learning solutions and research directions. Mobile Networks and Applications, 28(1) : 296-312.
[22] Alqarawi G.,Alkhalifah B.,Alharbi N.,El Khediri S. .2023 .Internet-of-things security and vulnerabilities: case study. Journal of Applied Security Research, 18(3) : 559-575.
[23] Pourrahmani H.,Yavarinasab A.,Monazzah A. M. H. .2023 .A review of the security vulnerabilities and countermeasures in the Internet of Things solutions: A bright future for the Blockchain. Internet of Things, 23 : 100888.
[24] Smith K. .2023 .Enhancing Industrial Control Systems Security: A Knowledge-Based Approach for Mitigating Socio-Technical Risks (Doctoral dissertation. , : .
[25] Sharma A.,Kaur P. .2023 .Tamper-proof multitenant data storage using blockchain. Peer-topeer Networking and Applications, 16(1) : 431-449.
[26] Yang J.,Wen J.,Jiang B.,Wang H. .2020 .Blockchain-based sharing and tamper-proof framework of big data networking. IEEE Network, 34(4) : 62-67.
[27] Fotiou N.,Polyzos G. C. .2018 .Smart contracts for the internet of things: Opportunities and challenges. In 2018 European conference on networks and communications (EuCNC), : 256-260.
[28] Islam ,M. D. .2023 .A survey on the use of blockchains to achieve supply chain security. Information Systems, 117 : 102232.
[29] Chen W.,Zhang Z.,Hong Z.,Chen C.,Wu J.,Maharjan S.,Zhang Y. .2019 .Cooperative and distributed computation offloading for blockchain-empowered industrial Internet of Things. IEEE Internet of Things Journal, 6(5) : 8433-8446.
[30] Martinez C. R. M. .2024 .Understanding Its Difficulty in Terms of Hashing Algorithm Efficiency. , : .
[31] Kharche A.,Badholia S.,Upadhyay R. K. .2024 .Implementation of blockchain technology in integrated IoT networks for constructing scalable ITS systems in India. Blockchain: Research and Applications, 100188 : .
[32] Liu B. .2021 .Overview of the basic principles of blockchain. In 2021 International Conference on Intelligent Computing, Automation and Applications (ICAA), : 588-593.
[33] Mueller-Bloch C.,Andersen J. V.,Spasovski J.,Hahn J. .2024 .Understanding decentralization of decision-making power in proof-of-stake blockchains: an agent-based simulation approach. European journal of information systems, 33(3) : 267-286.