<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Increasing protection and autonomy in the IoT through a two-tier blockchain framework</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>(Discussion Paper)</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Enrico Corradini</string-name>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Serena Nicolazzo</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Antonino Nocera</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Domenico Ursino</string-name>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Luca Virgili</string-name>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Daisy Lab, Politechnic University of Marche</institution>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Department of Electrical, Computer and Biomedical Engineering, University of Pavia</institution>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Department of Information Engineering, Polytechnic University of Marche</institution>
        </aff>
      </contrib-group>
      <abstract>
        <p>In this paper, we propose an approach that uses a two-tier blockchain framework and a trust-based protection mechanism to increase the security and autonomy of smart objects in the IoT. The proposed approach groups the involved smart objects into suitable communities. The two blockchains perform diferent, but complementary, tasks. Indeed, the first-tier blockchain is local and records probing transactions performed to evaluate the trust of one smart object in another. Periodically, after a time window, the probing transactions are aggregated to determine the reputation of each smart object within its community and the trust of one community in each of the others. These values are stored in the second-tier blockchain. This paper describes the proposed approach, the underlying framework, the behavior, the security model and a test carried out to evaluate its performance.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Internet of Things</kwd>
        <kwd>Blockchain</kwd>
        <kwd>Protection</kwd>
        <kwd>Autonomy</kwd>
        <kwd>Reliability</kwd>
        <kwd>Trust</kwd>
        <kwd>Reputation</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>In recent years, the Internet of Things (IoT) paradigm has become increasingly successful and
pervasive. However, at the same time, it has posed new challenges. Indeed, the IoT involves the
presence of a large number of smart objects cooperating with each other. These objects are often
characterized by constraints on storage, computational capability, criticality and sensitivity of
used services and applications. At the same time, they show a great dynamism. In this scenario,
the protection of smart objects and the possibility of granting them autonomy represent two
challenges that must be faced simultaneously.</p>
      <p>
        As for protection, [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] presents an approach to address this issue when it comes to privacy. It
partially hides object features, but allows for their full usage to support inter-object
communication. However, this approach does not provide a scalable, reliable and secure framework
for the IoT devices. As for autonomy, in order to make objects independent from each other
during their interactions, it is necessary to include a solution allowing objects to add/remove
contacts, and to identify which features/services are provided by other objects [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. Moreover,
it is crucial to design a mechanism assessing the ability of an object to correctly provide the
necessary features/services. The previous reasoning shows that protection and autonomy are
two strongly correlated aspects whose efective management requires the definition of trust
and reputation mechanisms. However, due to the peculiarities of the IoT scenario discussed
above, existing solutions for sensors or P2P networks are not directly applicable [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ].
      </p>
      <p>
        To achieve a fully distributed solution in this context, each smart object should be able to
build a representation of the behavior of other objects in the IoT. To this end, it should be
capable of unambiguously knowing the sequence of actions of its peers. To achieve this goal,
the blockchain technology is unanimously recognized as one of the most efective strategy [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ].
However, even the only monitoring of the public ledger is a heavy and expensive task for smart
objects with a low computational capability in presence of a high volume of transactions. To
overcome this problem, some authors have proposed to adopt approaches based on the use of
a validity window and the aggregation of historical data within it. However, if the volume of
transactions is big, this approach may be too expensive and unfeasible for the IoT [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ].
      </p>
      <p>
        This paper aims at providing a contribution in this setting. In fact, it proposes a two-tier
blockchain framework to increase the protection and autonomy of smart objects in the IoT.
Following the intuition proposed in [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], our approach organizes smart objects into communities.
Moreover, it uses the local first tier of the framework to manage the reputation of each smart
object within the community it belongs to. It also uses a validity window, coupled with a
lightweight blockchain, to face the high transaction volume. The organization of objects in
communities allows our approach to control the size of the blockchain, thus avoiding excessive
loads for smart objects. Finally, it uses the second global tier to record aggregate data related
to communities, as well as the trust values that each community assigns to the others. To
implement the tasks of our approach, we leverage the blockchain’s smart contract technology.
It has already been successfully used in the context of the IoT, e.g., to implement single and
multi-party authentication for an IoT device (see [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] for an example).
      </p>
      <p>The outline of this paper is as follows: Section 2 describes the proposed framework. Section
3 illustrates our security model. Section 4 presents an experimental comparison with two other
approaches. Finally, Section 5 draws conclusions and takes a look at some possible future
developments.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Technical description of our approach</title>
      <p>In our model, the main actor is the smart object. It has a profile characterized by: (i) an identifier;
(ii) a set of features regarding it; (iii) a set of services it ofers; (iv) the information that other
smart objects need for communicating with it (e.g., its MAC and IP addresses, etc.). The smart
objects of our framework can be partitioned into communities, based on some rules. Each smart
object belongs to exactly one community. A source smart object can communicate with a target
one through suitable transactions. These last can be classified in: (i) ordinary, if the source
requests a service/feauture to the target; (ii) probing, if the source (called trustor) wants to test
what the target (called trustee) declared to assess its reliability. Transactions can also be
intracommunity (resp., inter-community) if they involve smart objects from the same community
(resp., from diferent communities).</p>
      <p>Each community has an associated local blockchain that records information about
transactions having one of its smart objects as trustor. The overall IoT has associated a global blockchain,
which records aggregate information produced periodically from probing transactions recorded
in the local blockchains. Specifically, the global blockchain stores: (i) the list of smart objects
belonging to each community and, for each of them, the corresponding reputation scores; (ii)
the trust of each community in the others of the IoT.</p>
      <p>
        The interaction mechanisms between smart objects allows each of them to understand which
features/services can be provided by another one with which it is in contact [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. To allow
a smart object to asses whether another one is reliable in providing the features/services it
advertises, we adopt the approach of [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] based on probing transactions. To certify them, we use a
blockchain-based solution. Adopting blockchains in the IoT context poses important challenges
concerning the large number of nodes involved, the large amount of data generated, and the low
computational power of many smart objects. As specified in the Introduction, to address these
challenges, our approach leverages a two-tier blockchain framework. It groups smart objects into
appropriate communities, based on certain criteria. Within these communities, smart objects
adopt control mechanisms to identify anomalous behaviors and make interactions as secure as
possible. Our approach is independent of the way communities are built. It only requires that
smart objects in a community should have some level of redundancy in the features/services
ofered.
      </p>
      <p>
        Thus, the first layer of the framework is a blockchain underlying a community; it represents a
local public ledger storing all the probing transactions performed within the community. There
are several approaches to implement lightweight blockchains for the IoT context [
        <xref ref-type="bibr" rid="ref10 ref9">9, 10</xref>
        ] that
could be adopted to create this layer. In our case, we could use any of them, for instance IOTA
(www.iota.org), which supports smart contracts via the QUBIC protocol [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]. The second layer
of the framework is a global blockchain that involves the whole IoT and only stores the aggregate
information of the diferent communities. It could be implemented with any blockchain, such as
Ethereum (www.ethereum.org) or HyperLedger (www.hyperledger.org). In Figure 1, we report
the general architecture of our approach.
      </p>
      <p>In order to limit the volume of transactions to be analyzed, communications between devices
take place within time windows, where the devices perform ordinary and probing transactions.
These last are randomly generated; each smart object can decide to test another one belonging to
its community with a certain probability, while considering the features and services ofered by
it. The reliability of the tested smart object can be verified thanks to the support of other smart
objects belonging to the same community of the tester and providing the same feature/service.
These tests compute the trust scores associated with smart objects in their communities, and
all of them are stored in their corresponding local blockchain. Figure 2 shows a summary
representation of our intra-community probing scheme and the computation of the trust of a
trustor  in a trustee  .</p>
      <p>After a defined time window, the reputation of each smart object in its community is derived,
thanks to the aggregation of the results of its probing transactions. A smart contract of the
blockchain is responsible for the reputation computation. The results of this task, which consists
of the list of community members and the corresponding reputation scores, is published in the
global blockchain (see Figure 3). Smart objects having a reputation below a certain threshold
are automatically removed from their community.</p>
      <p>Our approach also provides protection during the interactions between objects from diferent
communities. Specifically, when two objects from diferent communities contact each other,
one of them may undergo a test with a certain probability. To perform this test, the tester object
requests a feature/service among those provided by the tested object. This request is also sent
to other objects in the same community of the tested object. The test result is stored in the local
blockchain of the community of the tester object. After a certain time window, the results of
the tests performed by the smart objects belonging to diferent communities are aggregated.
Following this reasoning, it is possible to obtain a trust value of a community towards other
communities with which at least one transaction between the corresponding objects has taken
place. These trust values are also saved in the global blockchain.</p>
      <p>Thanks to the information stored in the global blockchain, when a smart object  of a
community  wants to interact with a smart object  of a community ,  ̸= ,  can
compute the reliability of  taking into account the reputation of  within  and the trust
of  in .</p>
    </sec>
    <sec id="sec-3">
      <title>3. Security Model</title>
      <p>In this section, we present the security model associated with our framework. Preliminarily,
we highlight that it is based on the assumption that a suficient number of nodes are available
in such a way as to successfully implement our approach. Therefore, our model does not
consider anomalous situations or the startup time, in which the number of nodes available in
the framework is less than the minimum required.</p>
      <p>
        In the analysis of security properties, we will consider that our threat model includes the
following assumptions: (i) At most  smart objects can collude to break the security properties
of the protocol; (ii) the size of all the pruned support partitions is greater than ; (iii) an attacker
cannot control a whole group of smart objects; moreover, she cannot own all the smart objects
providing a certain service; (iv) an attacker has no additional knowledge derived from any direct
physical access to smart objects; (v) the blockchain technologies adopted to implement both
the local and the global tiers are compliant with the standard security requirements already
adopted for common blockchain applications. As for the first assumption, we recall that probing
transactions are produced collaboratively by several smart objects in our protocol. Some of
them might be corrupted, but, according to [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ], we assume the honesty of the majority of them.
      </p>
      <p>In the following, we report the list of the security properties that our framework must assure
(due to space limitations, we cannot report here the corresponding security analysis):
• Resistance to the attacks to local and global blockchains conceived to find vulnerabilities in
them.
• Resistance to self-promoting attacks, occurring when a smart object manipulates its own
reputation to increase it falsely and promote itself.
• Resistance to whitewashing or self-serving attacks, occurring when a malicious smart object,
with a compromised reputation, tries to quickly degrade the latter with the goal of being
removed from the framework and asking to rejoin it again with a fresh start.
• Resistance to slandering or bad-mouthing attacks, occurring when one or more attackers
try to manipulate the reputation of other smart objects by reporting false data.
• Resistance to opportunistic service attacks, occurring when a malicious smart object can
provide good or bad services opportunistically.
• Resistance to ballot stufing attacks , occurring when an attacker tries to boost the reputation
of bad objects providing good recommendations for them.
• Resistance to Denial of Service (DoS) attacks, occurring when an attacker tries to prevent a
reputation system from operating properly by flooding it with an excessive number of
transactions.
• Resistance to orchestrated attacks, occurring when malicious smart objects orchestrate
their actions and leverage several of the previous strategies to perform a coordinated and
multi-faced attack, which can change over time.</p>
    </sec>
    <sec id="sec-4">
      <title>4. Experimental comparison with other approaches</title>
      <p>In this section, we compare our approach with other related strategies proposed in the past
literature. The related approaches we selected have many similarities with our own in both the
reference scenario and the adopted methodologies; instead, their goal is diferent.</p>
      <p>
        The first approach we selected concerns an intrusion detection system protecting smart
devices in vehicular networks [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ]. The authors proposed to group the nodes into “clusters”,
so that security is achieved through the collaboration of nodes inside the identified protected
zones. This approach and ours are very similar in two aspects, even if their goals are diferent.
The former is the definition of a security model operating on smart devices and the IoT, whereas
the latter is the usage of groups and clusters of things (corresponding to communities of smart
objects in our model). The second approach we considered focuses on the modeling of a scheme
for grouping objects in such a way as to preserve their privacy [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. The modeled scheme
guarantees the protection of user’s privacy in all the IoT scenarios where the knowledge of the
object characteristics may lead to attacks based on the collection of user habits and behaviors.
      </p>
      <p>
        A way to compare the approaches of [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ] and [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] with ours consists of measuring the
communication delay introduced by them against the community size. In our approach, we
defined this parameter as the average diference, in terms of delivery time, between a scenario
adopting our approach and another not adopting it. Figure 4 shows the results obtained. As we
can see, the average delay introduced by our approach ranges from 20  to 100 . The delay
of [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ] ranges between 24  and 170 , whereas the one of [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] ranges from 22  to 300
. This result tells that our approach is clearly comparable with, and even better performing
than, the ones described in [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ] and [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. In conclusion, we can say that our approach returns
satisfactory results still keeping low the IoT overhead.
      </p>
    </sec>
    <sec id="sec-5">
      <title>5. Conclusion</title>
      <p>In this paper, we proposed an approach adopting a two-tier blockchain framework and a
trustbased protection mechanism for increasing the security and autonomy of smart objects in the
IoT. The proposed approach and the results obtained are not to be intended as an ending point.
By contrast, they represent a starting point for further future activities. For example, we plan to
combine our approach with other community-based strategies aiming at ensuring the privacy
of smart objects and their owners. The ultimate goal of such a task would be the definition of a
single solution handling both privacy and security in the IoT.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>S.</given-names>
            <surname>Nicolazzo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Nocera</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Ursino</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Virgili</surname>
          </string-name>
          ,
          <article-title>A privacy-preserving approach to prevent feature disclosure in an iot scenario</article-title>
          ,
          <source>in: Future Generation Computer Systems</source>
          , volume
          <volume>105</volume>
          ,
          <year>2019</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>8</lpage>
          . IEEE.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>J.</given-names>
            <surname>Quevedo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Antunes</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Corujo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Gomes</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Aguiar</surname>
          </string-name>
          ,
          <article-title>On the application of contextual iot service discovery in information centric networks</article-title>
          ,
          <source>Computer Communications</source>
          <volume>89</volume>
          (
          <year>2016</year>
          )
          <fpage>117</fpage>
          -
          <lpage>127</lpage>
          . Elsevier.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>F.</given-names>
            <surname>Buccafurri</surname>
          </string-name>
          , G. Lax,
          <string-name>
            <given-names>S.</given-names>
            <surname>Nicolazzo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Nocera</surname>
          </string-name>
          ,
          <string-name>
            <surname>Accountability-Preserving Anonymous</surname>
          </string-name>
          Delivery of Cloud Services,
          <source>in: Proc. of the International Conference on Trust, Privacy and Security in Digital Business (TRUSTBUS</source>
          <year>2015</year>
          ), Springer,
          <year>2015</year>
          , pp.
          <fpage>124</fpage>
          -
          <lpage>135</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>M.</given-names>
            <surname>Shen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Tang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Zhu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Du</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Guizani</surname>
          </string-name>
          ,
          <article-title>Privacy-Preserving Support Vector Machine Training over Blockchain-Based Encrypted IoT Data in Smart Cities</article-title>
          ,
          <source>IEEE Internet of Things Journal</source>
          (
          <year>2019</year>
          ). IEEE.
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>S.</given-names>
            <surname>Huh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Cho</surname>
          </string-name>
          , S. Kim,
          <article-title>Managing IoT devices using blockchain platform</article-title>
          ,
          <source>in: Proc. of the International Conference on Advanced Communication Technology (ICACT'17)</source>
          , PyeongChang, Korea,
          <year>2017</year>
          , pp.
          <fpage>464</fpage>
          -
          <lpage>467</lpage>
          . IEEE.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>M.</given-names>
            <surname>Khan</surname>
          </string-name>
          , K. Salah, IoT security: Review, blockchain solutions, and open challenges,
          <source>Future Generation Computer Systems</source>
          <volume>82</volume>
          (
          <year>2018</year>
          )
          <fpage>395</fpage>
          -
          <lpage>411</lpage>
          . Elsevier.
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>S.</given-names>
            <surname>Bandyopadhyay</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Sengupta</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Maiti</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Dutta</surname>
          </string-name>
          ,
          <article-title>A survey of middleware for Internet of Things, in: Recent trends in wireless and mobile networks</article-title>
          ,
          <year>2011</year>
          , pp.
          <fpage>288</fpage>
          -
          <lpage>296</lpage>
          . Springer.
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>F.</given-names>
            <surname>Buccafurri</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Coppolino</surname>
          </string-name>
          , S. D'Antonio,
          <string-name>
            <given-names>A.</given-names>
            <surname>Garofalo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Lax</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Nocera</surname>
          </string-name>
          , L. Romano,
          <article-title>Trust-Based Intrusion Tolerant Routing in Wireless Sensor Networks</article-title>
          ,
          <source>in: Proc. of the International Conference on Computer Safety, Reliability and Security (SAFECOMP</source>
          <year>2014</year>
          ), Springer, Firenze, Italy,
          <year>2014</year>
          , pp.
          <fpage>214</fpage>
          -
          <lpage>229</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>M.</given-names>
            <surname>Rehman</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Javaid</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Awais</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Imran</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Naseer</surname>
          </string-name>
          ,
          <article-title>Cloud based secure service providing for IoTs using blockchain</article-title>
          ,
          <source>in: Proc. of the IEEE Global Communications Conference (GLOBCOM</source>
          <year>2019</year>
          ), Puako, Hawaii, USA,
          <year>2019</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>7</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>A.</given-names>
            <surname>Dwivedi</surname>
          </string-name>
          , G. Srivastava,
          <string-name>
            <given-names>S.</given-names>
            <surname>Dhar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Singh</surname>
          </string-name>
          ,
          <article-title>A decentralized privacy-preserving healthcare blockchain for IoT</article-title>
          ,
          <source>Sensors</source>
          <volume>19</volume>
          (
          <year>2019</year>
          )
          <fpage>326</fpage>
          . Multidisciplinary Digital Publishing Institute.
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>T.</given-names>
            <surname>Moellers</surname>
          </string-name>
          ,
          <article-title>IOTA-based Business Model Configurations</article-title>
          , https://www.alexandria.unisg.ch/257117/ (
          <year>2018</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>P.</given-names>
            <surname>Fouque</surname>
          </string-name>
          , G. Poupard,
          <string-name>
            <given-names>J.</given-names>
            <surname>Stern</surname>
          </string-name>
          ,
          <article-title>Sharing decryption in the context of voting or lotteries</article-title>
          ,
          <source>in: Proc. of the International Conference on Financial Cryptography (FC'00)</source>
          , Anguilla, Anguilla,
          <year>2000</year>
          , pp.
          <fpage>90</fpage>
          -
          <lpage>104</lpage>
          . Springer.
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>M.</given-names>
            <surname>Aloqaily</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Otoum</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I. A.</given-names>
            <surname>Ridhawi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Jararweh</surname>
          </string-name>
          ,
          <article-title>An intrusion detection system for connected vehicles in smart cities</article-title>
          ,
          <source>Ad Hoc Networks</source>
          <volume>90</volume>
          (
          <year>2019</year>
          )
          <fpage>101842</fpage>
          . Elsevier.
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>