<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Blockchain-Based Decentralized Authentication For Supply Chain Security In Smart Agriculture</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Azeddine Aissaoui</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Imene Aloui</string-name>
          <xref ref-type="aff" rid="aff3">3</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Ahmed Tibermacine</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Samir Doudibi</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Chahrazad Toumi</string-name>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Ilyes Naidji</string-name>
          <xref ref-type="aff" rid="aff4">4</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Centre de Recherche Scientifique et Technique sur les Régions Arides</institution>
          ,
          <addr-line>Campus Universitaire</addr-line>
          ,
          <institution>Université Mohamed Khider</institution>
          ,
          <addr-line>07000, Biskra</addr-line>
          ,
          <country country="DZ">Algeria</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>LESIA Laboratory, Department of Computer Science, Mohamed Khider University of Biskra</institution>
          ,
          <addr-line>BP 145 RP, 07000, Biskra</addr-line>
          ,
          <country country="DZ">Algeria</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>LINATI Laboratory, Department of Computer Science and Information Technology, Faculty of New Information and Communication Technologies, Kasdi Merbah University</institution>
          ,
          <addr-line>BP.511, 30000, Ouargla</addr-line>
          ,
          <country country="DZ">Algeria</country>
        </aff>
        <aff id="aff3">
          <label>3</label>
          <institution>LINFI Laboratory, Department of Computer Science, Mohamed Khider University of Biskra</institution>
          ,
          <addr-line>BP 145 RP, 07000, Biskra</addr-line>
          ,
          <country country="DZ">Algeria</country>
        </aff>
        <aff id="aff4">
          <label>4</label>
          <institution>RLP Laboratory, Department of Computer Science, Mohamed Khider University of Biskra</institution>
          ,
          <addr-line>BP 145 RP, 07000, Biskra</addr-line>
          ,
          <country country="DZ">Algeria</country>
        </aff>
      </contrib-group>
      <fpage>42</fpage>
      <lpage>54</lpage>
      <abstract>
        <p>Agricultural supply chains face increasing challenges in security, transparency and trust, particularly as global demand for food traceability and safety continues to rise. This paper proposes a blockchain-based decentralized authentication system tailored for smart agricultural supply chains. Using Hyperledger Fabric's permissioned blockchain and smart contracts, the proposed framework provides secure, scalable, and tamperproof authentication for all participants and IoT devices involved in the supply chain. The system ensures that each participant (farmers, suppliers, logistics providers, retailers) and IoT device undergoes a robust authentication process before interacting with the blockchain, enabling traceable and secure data sharing without the need for centralized control. Smart contracts automate key operations such as verification of product provenance, quality certification, and payment execution, improving operational eficiency, and reducing the risk of fraud. Simulation results demonstrate that the proposed decentralized system significantly enhances security by preventing common attacks such as man-in-the-middle (MITM) and distributed denial of service (DDoS), while maintaining high performance in terms of low latency and scalability. The proposed system ensures the end-to-end traceability of agricultural products, providing consumers with verifiable information on the origin, quality, and certification of the product. This research contributes to a novel approach to improving security, transparency, and scalability in agricultural supply chains using decentralized blockchain authentication.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Blockchain</kwd>
        <kwd>Decentralized authentication</kwd>
        <kwd>Supply Chain Security</kwd>
        <kwd>Smart Agriculture</kwd>
        <kwd>Smart Contracts</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>can compromise the entire supply chain’s integrity.</p>
      <p>
        In recent years, advancements in artificial intelligence
Ensuring global food security hinges on the resilience (AI), particularly in machine learning and deep
learnand eficiency of the agricultural supply chain, which ing, have transformed various fields by ofering
innocurrently grapples with persistent challenges in trans- vative solutions to complex problems. For example,
parency, security, and traceability [1, 2]. With increas- deep learning techniques have been employed for
EEGing consumer demand for sustainably sourced and certi- based brain-computer interface (BCI) systems to
enifed food products, stakeholders in the agriculture indus- hance classification accuracy in neurological
applicatry—including farmers, suppliers, logistics providers, and tions [
        <xref ref-type="bibr" rid="ref22 ref34">5, 6, 7, 8, 9, 10, 11, 12, 13, 14</xref>
        ]. Similarly,
comretailers—are under significant pressure to ensure that puter vision and robotics have leveraged AI to improve
their supply chains are both secure and transparent. Con- object detection, autonomous navigation, and
operaventional centralized supply chain management systems tional eficiency [ 15, 16, 17]. These breakthroughs
underoften lack real-time traceability capabilities, are vulner- score the potential of AI in addressing real-world
chalable to cyberattacks, and sufer from ineficiencies that lenges by enhancing decision-making, scalability, and
lead to delays, fraud, and data manipulation [3, 4]. For automation[18, 19, 20, 21, 22, 23, 24].
instance, a single point of failure in centralized databases Building upon these AI-driven advancements,
blockchain technology has emerged as a
complemenICYRIME 2025: 10th International Conference of Yearly Reports on tary solution to address issues of trust, security, and
Informatics, Mathematics, and Engineering. Czestochowa, January transparency in data-intensive domains. Blockchain’s
14-16, 2025 decentralized, tamper-proof, and transparent data
$ azeddine.aissaoui@gmail.com (A. Aissaoui); management systems can revolutionize supply chain
ahm00e0d9.t-i0b0e0r9m-1a9ci4n3e-@40u8n0i(vA-.biAs kisrsaa.dozui()A;0.0T0i9b-e0r0m0a4c-4in7e2)9-7128 operations by ensuring data integrity, immutability, and
(A. Tibermacine) verifiability across all stakeholders [ 19, 25]. However,
© 2025 Copyright for this paper by its authors. Use permitted under Creative Commons License integrating IoT devices and scaling blockchain solutions
Attribution 4.0 International (CC BY 4.0).
across diverse agricultural supply chains introduce these challenges in various sectors, including agriculture.
complexities related to authentication, scalability, and This section reviews key contributions in
blockchainsecurity [26, 27, 28]. based supply chain management, decentralized
authenti
      </p>
      <p>To address these challenges, we propose a blockchain- cation, and the security of agricultural supply chains.
based decentralized authentication framework that lever- Several advancements in smart grid networks have
ages Hyperledger Fabric, a permissioned blockchain, to explored innovative approaches to enhancing security,
secure interactions among all participants in the agricul- eficiency, and scalability in distributed energy
managetural supply chain [29, 30]. This framework ensures that ment systems [34], [35]. Prior research has investigated
each participant—farmers, suppliers, logistics providers, federated learning-based solutions for detecting
electricand retailers—and IoT device undergoes a secure authen- ity theft and optimizing power distribution in smart grids
tication process before engaging in the supply chain. [36], [37]. Additionally, the integration of multi-agent
By utilizing smart contracts, the system automates key systems and decentralized energy trading frameworks
functions, including the verification of product prove- has been studied to improve the resilience and
interopernance, certification validation, and payment execution ability of modern smart grids [38, 39, 40, 41].
[31, 32, 33]. This decentralized approach eliminates the Recent research has made substantial strides in the
need for a central authority, thereby ensuring trust and integration of blockchain and IoT in agricultural supply
security in supply chain operations. chains. [42] proposed a novel framework that addresses</p>
      <p>The contributions of this paper are as follows. First, we scalability issues in earlier works by implementing a
hipropose a decentralized blockchain-based authentication erarchical blockchain structure designed specifically for
framework designed to enhance security and traceability agricultural IoT devices. Their approach demonstrated a
in smart agriculture supply chains. Second, we develop 60% reduction in transaction validation time compared to
and implement smart contracts that automate the veri- traditional blockchain architectures, all while
maintainifcation of product provenance, certification validation, ing high security standards. [43] built on [44] work and
and payment settlement, thereby reducing operational developed an advanced blockchain-IoT system that
inineficiencies and minimizing human intervention. Third, corporates edge computing to handle large data streams
we assess the security and scalability of the proposed sys- from agricultural sensors. Their system introduced a
tem through simulations, demonstrating its resilience novel consensus mechanism optimized for agricultural
against cyberattacks such as man-in-the-middle (MITM) supply chains, reducing energy consumption by 45%
and distributed denial of service (DDoS) attacks. Finally, while improving transaction throughput. While these
we conduct a performance analysis of the proposed sys- advancements address scalability and eficiency, they do
tem, highlighting its low latency and high-performance not tackle the critical need for simultaneous
authenticapabilities, ensuring scalability across diverse agricul- cation of both IoT devices and human participants in
tural supply chains. agricultural supply chains.</p>
      <p>The remainder of this paper is organized as follows. To address the authentication challenges, [45]
proSection 2 reviews related work in the field of blockchain posed a lightweight two-factor continuous
authenticafor supply chain security in agriculture. Section 3 in- tion protocol based on PUF and location. Their solution
troduces the proposed system architecture and details leverages the properties of PUF to resist physical attacks,
the underlying blockchain implementation. Section 4 uses simple cryptographic operations such as XORs and
describes the simulation setup used for evaluation. Sec- hash functions to ensure security, and reduces resource
tion 5 presents the experimental results, while Section consumption through continuous authentication. This
6 provides a comparative analysis of the proposed sys- work builds on the limitations of previous authentication
tem with existing approaches. Section 7 discusses the protocol [46] Further enhancing decentralized
authenimplications and key findings of the study. Section 8 out- tication, [47] developed a context-aware authentication
lines the limitations of the study and suggests directions framework that considers environmental factors unique
for future work. Finally, Section 9 concludes the paper, to agricultural settings. Their system demonstrated 99.7%
summarizing the main contributions and outcomes. accuracy in detecting compromised devices while
requiring 30% less computational resources than prior
solutions. However, the computational overhead introduced
2. Related Works by these solutions still limits their practical application
in resource-constrained agricultural environments.</p>
      <p>The application of blockchain technology in supply Recent work has also focused on addressing security
chains has been widely explored, particularly in enhanc- concerns in agricultural supply chains. [48, 49] developed
ing transparency, traceability, and security. The integra- a comprehensive security framework that combines
artition of blockchain with Internet of Things (IoT) devices ifcial intelligence with blockchain to detect and prevent
has gained significant attention as a solution to address sophisticated attacks. Their system successfully
identi</p>
      <p>42–54
The Data Collection Layer is responsible for capturing
real-time data from various IoT devices deployed across
the agricultural supply chain. This layer includes sensors
that monitor environmental conditions, track product
movement, and ensure quality assurance throughout the
supply chain. The layer is designed to handle large
volumes of data while minimizing latency and bandwidth
usage (see Figure2).
ifed 98% of attempted man-in-the-middle (MITM) attacks
while maintaining performance. Expanding on [50], [51]
proposed a scalable security architecture employing
dynamic access control mechanisms and quantum-resistant
encryption. Their framework efectively balances
security and performance, addressing scalability limitations
in previous approaches while maintaining robust security
measures.</p>
      <p>Additionally, the latest research integrates blockchain
with other emerging technologies to further enhance
agricultural supply chains. [52] combined blockchain
with digital twins to create virtual representations of
agricultural supply chains. This approach enabled
realtime monitoring and predictive analytics, while ensuring
data integrity through blockchain verification. [ 53]
introduced a framework that integrates blockchain with
artificial intelligence and machine learning to optimize
supply chain operations. Their system utilizes smart
contracts to automate decision-making processes, ensuring
transparency and traceability while addressing several
limitations identified in earlier works.</p>
      <p>Building on these advancements, our study introduces
a novel dual-layer authentication mechanism within
Hyperledger Fabric that integrates IoT devices and human
participants seamlessly. The framework enforces
rolebased access control through intelligent smart contracts
and optimizes computational resources with an
innovative consensus design. By implementing lightweight
security protocols specifically tailored for agricultural
environments, our solution reduces processing overhead
while maintaining accuracy in threat detection for MITM
and Distributed Denial of Service (DDoS) attacks.</p>
    </sec>
    <sec id="sec-2">
      <title>3. Proposed System Architecture</title>
      <sec id="sec-2-1">
        <title>To address the security and eficiency challenges in</title>
        <p>blockchain-based agricultural supply chains, we
propose a novel dual-layer authentication mechanism within 3.1.1. IoT Devices and Sensors
Hyperledger Fabric [29]. This mechanism integrates
both IoT devices and human participants, ensuring se- IoT devices, such as environmental sensors, RFID tags,
cure interactions and access control across the entire and GPS trackers, are deployed across farms, storage
fasupply chain. The system architecture leverages intel- cilities, and distribution channels. These devices collect
ligent smart contracts to enforce role-based access con- data on environmental factors (e.g., temperature,
humidtrol (RBAC) and utilizes a consensus design to optimize ity), product quality (e.g., ripeness, freshness), and the
computational resources while maintaining robust se- movement of goods through the supply chain [56]. This
curity [54]. The architecture aims to reduce processing data forms the foundation for product traceability and
overhead, particularly for mitigating Man-In-The-Middle quality assurance.
(MITM) and Distributed Denial-of-Service (DDoS)
attacks [55], without compromising threat detection ac- 3.1.2. Edge Devices
curacy.</p>
        <p>The proposed system architecture consists of three
main layers: the Data Collection Layer, the Blockchain
Layer, and the Application Layer. Each layer plays a
crucial role in ensuring the seamless integration of IoT</p>
      </sec>
      <sec id="sec-2-2">
        <title>Edge devices aggregate and preprocess the sensor data, re</title>
        <p>ducing the volume of data transmitted to the blockchain.
These devices perform essential data filtering,
normalization, and encryption tasks, ensuring that only relevant,
secure information is sent to the blockchain [57]. By
reducing network congestion and processing load, edge
devices help optimize system performance, particularly
in bandwidth-constrained agricultural environments.</p>
        <sec id="sec-2-2-1">
          <title>3.1.3. Data Encryption</title>
          <p>To secure the data transmitted between IoT devices and
the blockchain, encryption protocols such as AES-256 are
employed [58]. This ensures that the sensitive
information from the IoT devices, including product certifications
and logistics data, is protected from unauthorized access
during transmission.
3.2. Blockchain Layer
The Blockchain Layer is the backbone of the proposed
system, providing decentralized management and secure
transaction recording. Hyperledger Fabric, a
permissioned blockchain platform, is utilized to ensure that only
authorized participants can interact with the blockchain
[29]. This layer incorporates a dual-layer authentication
mechanism that provides secure authentication for both
IoT devices and human participants, ensuring that all
transactions are authorized and verifiable (see Figure3).</p>
        </sec>
        <sec id="sec-2-2-2">
          <title>3.2.1. Dual-Layer Authentication</title>
        </sec>
      </sec>
      <sec id="sec-2-3">
        <title>The dual-layer authentication mechanism integrates both</title>
        <p>IoT devices and human participants into the blockchain
network. Each IoT device is assigned a unique identity,
which is verified using a lightweight cryptographic
protocol to authenticate devices before allowing them to
transmit data. Human participants, such as farmers,
distributors, and retailers, are authenticated through
rolebased access control (RBAC) mechanisms, ensuring that
each participant can only access and perform actions
within their designated scope.</p>
        <sec id="sec-2-3-1">
          <title>3.2.2. Consensus Mechanism</title>
        </sec>
      </sec>
      <sec id="sec-2-4">
        <title>An consensus mechanism is employed to balance secu</title>
        <p>rity and performance. The system uses a lightweight
Proof of Authority (PoA) consensus, where pre-approved
validators (such as certifying agencies and trusted
regulatory bodies) confirm the validity of transactions. This
mechanism minimizes processing overhead compared to
traditional consensus models like Proof of Work (PoW),
making it suitable for agricultural environments with
limited computational resources [59].</p>
        <sec id="sec-2-4-1">
          <title>3.2.3. Role-Based Access Control (RBAC)</title>
          <p>Role-based access control (RBAC) is enforced through
intelligent smart contracts. These smart contracts are
designed to automatically assign permissions based on
the roles of the participants in the supply chain [54]. For
example, farmers can register product details, distributors
can verify product quality, and consumers can access
product provenance data. The system ensures that each
participant only interacts with the data relevant to their
role, enhancing security and minimizing unauthorized
access.
3.3. Application Layer
The Application Layer provides the interfaces through
which users interact with the blockchain system. This
layer includes decentralized applications (DApps)
tailored to the needs of diferent stakeholders in the
agricultural supply chain, such as farmers, distributors, retailers,
auditors, and consumers (see Figure 4).</p>
        </sec>
        <sec id="sec-2-4-2">
          <title>3.3.1. DApp for Farmers</title>
        </sec>
      </sec>
      <sec id="sec-2-5">
        <title>Farmers use the DApp to register critical data about their</title>
        <p>crops, including planting schedules, pesticide usage, and
harvest times. The DApp allows them to directly interact
with the blockchain, ensuring that their data is securely
recorded and verified by the system.</p>
        <sec id="sec-2-5-1">
          <title>3.3.2. DApp for Distributors and Retailers</title>
        </sec>
      </sec>
      <sec id="sec-2-6">
        <title>Distributors and retailers use the DApp to track the move</title>
        <p>ment of products through the supply chain, monitor
storage conditions, and verify product certifications. The
application provides real-time insights into the status of
shipments, enabling them to ensure product quality and
compliance with regulatory standards.</p>
        <sec id="sec-2-6-1">
          <title>3.3.3. DApp for Consumers</title>
          <p>Consumers can access a mobile DApp to scan product QR
codes and view detailed provenance information. The
application provides transparent, verifiable data about the
product’s journey, including environmental conditions
during transportation and any quality certifications. This
enhances consumer trust and empowers them to make
informed purchasing decisions.</p>
        </sec>
        <sec id="sec-2-6-2">
          <title>3.3.4. Regulatory and Auditing Tools</title>
          <p>Regulatory bodies and auditors use specialized tools to
monitor compliance with industry standards. These tools
allow them to verify certifications, track product
movements, and detect any irregularities or fraud. The
immutable nature of blockchain ensures that all data is
tamper-proof and auditable, facilitating eficient
regulatory oversight.</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>4. Simulation Setup</title>
      <p>To evaluate the performance of the proposed
blockchainbased decentralized authentication framework in a smart
agriculture supply chain, we conducted a series of
simulations using a realistic supply chain model. The primary
focus of the simulation is to assess the system’s eficiency,
scalability, security, and ability to handle real-time data
from IoT devices while maintaining end-to-end
traceability and authentication (see Figure 5).
4.1. Simulation Environment</p>
      <sec id="sec-3-1">
        <title>The simulation was designed to model the agricultural</title>
        <p>supply chain from farm production to retail
distribution. We simulated multiple stakeholders, including
farmers, distributors, retailers, and consumers, interacting
through a permissioned blockchain network powered by
Hyperledger Fabric (see Figure 6). The following tools
and platforms were used to build the simulation
environment:
• Hyperledger Fabric: This permissioned
blockchain framework was used for simulating
the decentralized authentication system and
implementing smart contracts for automating
supply chain operations.
• MATLAB/Simulink or AnyLogic: These tools
were used for modeling the interactions among
various participants in the supply chain and
simulating real-time data flows from IoT devices.
This included environmental sensor data, product
tracking, and quality monitoring information.
• IoT Simulation Platform: A virtual IoT
environment was created to simulate data generated from
sensors deployed in farms, distribution centers,
and retail locations. This data was integrated with
the blockchain network to trigger smart contract
execution and record key events in the supply
chain.
• Performance Monitoring Tools: Tools such as
Hyperledger Caliper were used to measure the
performance of the blockchain system, focusing
on transaction throughput, latency, and network
scalability.
4.2. Simulation Parameters
The following parameters were defined to replicate a
realworld smart agriculture supply chain and assess the
impact of decentralized authentication on its performance
(as showing in Figure 7):
• Participants: The simulation includes 50 farmers,
20 distributors, 30 retailers, and 10 regulatory
bodies, each acting as a peer node in the blockchain
network. Consumers interact with the system
through decentralized applications (DApps) to
verify product provenance.
• IoT Devices: Each farm and distribution center
are equipped with multiple IoT sensors for
monitoring environmental conditions, product
quality, and location. The simulation models 200 IoT
sensors that continuously generate data, which
is transmitted to edge devices and eventually
recorded on the blockchain.
• Transaction Types: Diferent types of
transactions are simulated, including:
– Data recording: IoT devices push
environmental and product quality data to the
blockchain.
– Product transfers: Products are transferred
from one participant to another (from
farmers to distributors).
– Certification verification: Regulatory
bodies verify product certifications such as
organic and non-GMO labels.
• Payment execution: Smart contracts trigger
payment settlements based on predefined conditions.
4.3. Key Performance Metrics</p>
      </sec>
      <sec id="sec-3-2">
        <title>The following key performance indicators (KPIs) were used to evaluate the system’s performance (as showing in Figure 8):</title>
        <p>• Transaction Latency: The time it takes to validate
a transaction and add it to the blockchain. Lower
latency is critical for real-time applications where
IoT devices constantly generate data.
• Throughput: The number of transactions that can
be processed per second by the blockchain
network. High throughput indicates that the system
can handle large volumes of data generated by
IoT devices.
• Scalability: The system’s ability to maintain
performance (latency and throughput) as the number
of participants, IoT devices, and transactions
increases.
• Energy Consumption: The total energy
consumed by the blockchain network, particularly
during transaction validation. This is crucial for
ensuring the system’s environmental
sustainability, especially in agriculture.
• Energy Consumption: The total energy
consumed by the blockchain network, particularly
during transaction validation. This is crucial for
ensuring the system’s environmental
sustainability, especially in agriculture.
• Security Resilience: The system’s ability to
prevent and mitigate common attacks such as
manin-the-middle (MITM), distributed denial of
service (DDoS), and unauthorized access by
unregistered participants or IoT devices.
4.4. Transaction Receipt</p>
      </sec>
      <sec id="sec-3-3">
        <title>The proposed system employs a robust transaction receipt mechanism to ensure transparency, verifiability,</title>
        <p>system had minimal impact on latency, with
authentication checks completed within 500 milliseconds, indicating
that the integration of security protocols did not impede
the speed of transaction processing (see Figure 9.a.).</p>
        <p>The PoA consensus mechanism ensures timely
processing of large-scale data in agriculture, where quick
decisions based on sensor data can be critical for crop
management and supply chain optimization.
5.2. Throughput
and accountability in blockchain operations. The key
elements of the transaction receipt are as follows:</p>
        <p>The scalability test of the system showed that it
maintained stable performance as the number of transactions
increased. When the transaction volume was scaled up to
3,000 transactions per day, the system maintained a
stable transaction latency of 3.1 seconds and a throughput
of 1,000 TPS. These results indicate that the
blockchainbased decentralized authentication framework can
handle the growing complexity of smart agriculture supply
chains, including increased transaction volume from both
IoT sensors and human participants (see Figure 9.c).</p>
        <p>The system is capable of supporting agricultural
operations of varying scales, from small farms to large,
multi-stakeholder supply chains, ensuring its versatility
across diferent scenarios.</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>5. Experimental Results</title>
      <sec id="sec-4-1">
        <title>The following results from the simulation of the</title>
        <p>blockchain-based decentralized authentication system
for smart agriculture supply chains demonstrate the
system’s performance, scalability, energy eficiency, and
security resilience.
5.1. Transaction Latency</p>
      </sec>
      <sec id="sec-4-2">
        <title>The simulation results demonstrated that the Proof of</title>
        <p>Authority (PoA) consensus mechanism facilitated
lowlatency transaction validation, with an average latency
of 2.3 seconds per transaction. This performance is
crucial for ensuring that real-time data generated by IoT
sensors, such as environmental or crop health data, is
processed and recorded on the blockchain without
significant delays. Notably, the decentralized authentication</p>
      </sec>
      <sec id="sec-4-3">
        <title>In comparison to traditional blockchain systems that use</title>
        <p>the Proof of Work (PoW) consensus mechanism, the PoA
mechanism resulted in 70% lower energy consumption.
This reduced energy footprint is essential for
promoting environmentally sustainable practices in agriculture.
Furthermore, the adoption of edge devices to process
data locally minimized the need for extensive
computational resources at the blockchain layer, reducing overall
network energy consumption (see Figure 9.d.).
6.1. Transparency and Traceability</p>
        <p>The decentralized authentication protocol demonstrated
robust resilience against common security threats.
Simulated man-in-the-middle (MITM) and distributed denial
of service (DDoS) attacks were successfully thwarted
using a combination of Public Key Infrastructure (PKI) for
secure communications and role-based access control
(RBAC) for managing user permissions. No unauthorized
participants or IoT devices were able to inject fraudulent
data into the blockchain, ensuring the integrity of the
recorded information (see Figure 9.e.).</p>
        <p>This high level of security is critical in agriculture,
where data authenticity and integrity are paramount for
certification, regulatory compliance, and consumer trust.
The ability to prevent unauthorized access strengthens
the overall reliability of the system.</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>6. Comparative Analysis</title>
      <p>The performance of the proposed blockchain-based
decentralized authentication system was compared against
a traditional centralized supply chain management
system, focusing on several key factors: transaction
throughput, security, data integrity, traceability, and cost
eficiency. The comparative results are summarized below:
The blockchain network is inherently more secure
against tampering or fraud. The Proof of Authority (PoA)
consensus mechanism ensures that only trusted
validators can approve transactions, thus preventing
unauthorized parties from injecting fraudulent data into the
system. Further, the integration of Public Key Infrastructure
(PKI) and role-based access control (RBAC) ofers strong
encryption and control over who can access sensitive
data. Zero-knowledge proofs (ZKPs) can be integrated
for added privacy protection without compromising the
data’s integrity (Figure 10.b).</p>
      <p>The system performed exceptionally well against
common security attacks like man-in-the-middle (MITM) or
DDoS attacks. With the decentralization of the
validation process, the system resists attempt to manipulate or
compromise data at a central point.</p>
      <p>This security framework is critical for preventing data
breaches, fraud, and unauthorized modifications to the
supply chain data. For example, in agricultural supply
chains, securing data regarding pesticides or
certifications helps avoid potential fraud or harmful
contamination incidents.</p>
      <p>In traditional centralized systems, the security of data
is reliant on the central authority. While these systems
may implement strong encryption and security
protocols, they are more vulnerable to attacks, as the central
server is a prime target for cyber threats. Moreover,
single points of failure can lead to catastrophic breaches if
compromised.</p>
      <p>The centralized nature makes it easier for malicious
actors to disrupt the entire system by attacking the central
server or manipulating records before they are finalized.
The lack of distributed control makes it harder to
ensure continuous integrity, especially in the face of insider
threats.
6.3. Transaction Throughput and Latency
The blockchain-based system uses PoA, which is a more
lightweight consensus mechanism compared to others
like Proof of Work (PoW). This allows for faster
transaction validation with minimal latency (2-3 seconds per
transaction). The throughput of the system reached
1,200 transactions per second (TPS) during simulated
real-world conditions, which is suficient for handling
high-volume IoT data in agricultural supply chains.</p>
      <p>Although the system’s throughput is slightly lower
than centralized systems, the decentralized nature does
not substantially afect the speed of transactions due to
the use of eficient consensus mechanisms.</p>
      <p>The PoA consensus mechanism allows the system to
handle a significant volume of transactions in real-time,
ensuring that IoT sensor data from farms is processed
without delay. This is particularly crucial in applications
where rapid decision-making is essential, such as
monitoring crop health or adjusting irrigation systems based
on sensor data.</p>
      <p>Centralized systems are often optimized for high
throughput, with the central server capable of handling
thousands of transactions per second without significant
delays. This makes centralized systems attractive for
applications where transaction speed is critical and
scalability is easily achieved (Figure 10.c).</p>
      <p>However, while these systems ofer high throughput,
they may become bottlenecked if the server fails or if
network congestion occurs. Additionally, the reliance on
a single server introduces potential downtime, which can
disrupt agricultural operations.
42–54
6.4. Cost Eficiency</p>
      <sec id="sec-5-1">
        <title>The cost of the blockchain-based system is largely associ</title>
        <p>ated with the setup and maintenance of the network and
the integration of edge computing devices for data
processing. However, after the initial investment, the system
ofers significant savings in terms of reduced fraud,
improved transparency, and elimination of intermediaries.
Smart contracts automate manual processes, reducing
overhead costs related to human intervention.</p>
        <p>The blockchain-based system is cost-efective in the
long term, as it reduces the need for centralized
intermediaries and provides a self-sustaining mechanism for
verification and trust, which minimizes operating costs.
Furthermore, the energy eficiency of the PoA
mechanism reduces operational costs compared to more
energyintensive systems like PoW.</p>
        <p>Over time, blockchain’s decentralized structure
reduces costs by eliminating intermediaries, lowering the
risk of fraud, and reducing administrative overhead in
managing and verifying transactions.</p>
        <p>Centralized systems are typically cheaper to
implement initially, as they don’t require extensive
infrastructure or blockchain integration. The system’s operation is
also less complex and can be managed by a single central
authority.</p>
        <p>However, over time, centralized systems may incur
higher costs due to maintenance, security breaches, and
intermediary fees for validation and verification. The
reliance on manual processes and third-party
certifications further drives up costs, especially in large-scale
agricultural systems.
6.5. Real-World Applicability</p>
      </sec>
      <sec id="sec-5-2">
        <title>The blockchain system is highly adaptable and well</title>
        <p>suited for applications in smart agriculture, especially in
large-scale, multi-stakeholder supply chains. Its ability
to provide real-time, immutable records makes it ideal
for food safety, quality assurance, and regulatory
compliance in industries where transparency and traceability
are critical. Security is another vital advantage. The
decentral</p>
        <p>This is particularly beneficial in agriculture, where ized nature of blockchain, combined with cryptographic
provenance, food safety, and certification processes play protocols and the Proof of Authority (PoA) consensus
a significant role in consumer trust. By providing detailed, mechanism, ensures robust protection against fraud and
verifiable product histories, the blockchain can enhance unauthorized data manipulation. The system’s use of
consumer confidence and promote sustainable practices. Public Key Infrastructure (PKI) and role-based access</p>
        <p>While centralized systems may be easier to deploy control (RBAC) enhances security by controlling access
initially, their lack of transparency and vulnerability to to sensitive data, mitigating insider threats.
security risks limit their efectiveness in providing verifi- Performance analysis of the blockchain-based system
able, trusted data across multiple stakeholders in a supply shows its capability to handle transaction throughput
chain. of 1,200 transactions per second (TPS) with low latency</p>
        <p>For industries like agriculture, the lack of transparency of 2-3 seconds per transaction. These metrics are
sufand potential for data manipulation could lead to con- ficient for real-time applications in agricultural supply
sumer distrust, making centralized systems less suitable chains, such as IoT-based monitoring of crop health and
for traceability and verification purposes. environmental conditions.</p>
        <p>From a cost perspective, blockchain incurs higher
initial expenses due to the need for infrastructure, such
7. Discussion as IoT devices and network setup. However, the
system’s long-term cost eficiency, driven by automation
through smart contracts and the elimination of
intermediaries, ofers significant savings over time. Additionally,
PoA’s lower energy requirements compared to
consensus mechanisms like Proof of Work (PoW) enhance the
sustainability of the system.</p>
        <p>This study demonstrates the real-world applicability of
blockchain technology in managing large-scale
agricultural supply chains involving multiple stakeholders. The
system’s ability to provide verifiable, immutable records
addresses critical concerns such as food safety, product
certification, and sustainable farming practices.</p>
        <p>The integration of blockchain-based decentralized
authentication into agricultural supply chains represents
a transformative approach to addressing long-standing
issues of transparency, security, and traceability. This
study underscores the advantages of blockchain
technology, particularly in enhancing food safety and
accountability, over traditional centralized systems. By
leveraging a decentralized ledger, the proposed framework
ensures reliable, tamper-proof record-keeping, providing
stakeholders with greater trust in supply chain
operations.</p>
        <p>A key strength of the blockchain system lies in its
ability to enhance transparency and traceability. The
immutable ledger records every transaction in real-time, 8. Conclusion
enabling seamless tracking of products from farm to
consumer. Unlike centralized systems, which depend on a This study presents a blockchain-based decentralized
single authority and are vulnerable to data manipulation, authentication framework aimed at addressing critical
blockchain ofers distributed control, reducing the risk challenges in the agricultural supply chain, including
of fraud and inaccuracies. This transparency is crucial in transparency, traceability, and security. By leveraging
industries like agriculture, where consumer confidence the Proof of Authority (PoA) consensus mechanism and
in product safety and quality is paramount. smart contracts, the proposed system ensures real-time</p>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>9. Declaration on Generative AI</title>
      <sec id="sec-6-1">
        <title>During the preparation of this work, the authors used</title>
        <p>ChatGPT, Grammarly in order to: Grammar and spelling
check, Paraphrase and reword. After using this
tool/service, the authors reviewed and edited the content as
needed and take full responsibility for the publication’s
content.
authentication and tamper-proof data recording,
mitigating issues such as fraud, ineficiency, and lack of trust
among stakeholders. Experimental results demonstrate
significant improvements in transaction throughput, data
integrity, and operational eficiency, making this
framework a promising solution for modern smart agriculture.
The integration of blockchain technology with IoT
devices has further enabled real-time data acquisition and
traceability, essential for ensuring product quality and
compliance.</p>
        <p>Despite its strengths, this study also identifies several
limitations, including scalability challenges, high initial
costs, integration complexities, and concerns regarding
data privacy and regulatory compliance. The scalability
of the blockchain framework, particularly in large-scale
agricultural environments, remains a challenge as
transaction volumes grow. Additionally, the high initial costs
of IoT infrastructure and blockchain setup can hinder
adoption, particularly for small-scale farmers.
Integrating blockchain with existing legacy systems requires
significant efort, and ensuring data privacy while
maintaining transparency poses regulatory challenges.</p>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          <string-name>
            <surname>tronica</surname>
          </string-name>
          ,
          <source>Automatica</source>
          <volume>72</volume>
          (
          <year>2024</year>
          ).
          <article-title>tics litter detection</article-title>
          , in: 2024 IEEE Mediterranean [17]
          <string-name>
            <given-names>S.</given-names>
            <surname>Russo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Napoli</surname>
          </string-name>
          ,
          <article-title>A comprehensive solution for and Middle-East Geoscience</article-title>
          and Remote Sensing
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          <article-title>psychological treatment and therapeutic path plan- Symposium (M2GARSS)</article-title>
          , IEEE,
          <year>2024</year>
          , pp.
          <fpage>36</fpage>
          -
          <lpage>40</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          <article-title>ning based on knowledge base and expertise shar-</article-title>
          [28]
          <string-name>
            <given-names>V.</given-names>
            <surname>Ponzi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Russo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Wajda</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Brociek</surname>
          </string-name>
          , C. Napoli,
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          ing,
          <source>in: CEUR Workshop Proceedings</source>
          , volume
          <volume>2472</volume>
          ,
          <article-title>Analysis pre and post covid-19 pandemic rorschach</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          <year>2019</year>
          , p.
          <fpage>41</fpage>
          -
          <lpage>47</lpage>
          .
          <article-title>test data of using em algorithms</article-title>
          and gmm mod[18]
          <string-name>
            <given-names>E.</given-names>
            <surname>Iacobelli</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Pelella</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Ponzi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Russo</surname>
          </string-name>
          , C. Napoli, els,
          <source>in: CEUR Workshop Proceedings</source>
          , volume
          <volume>3360</volume>
          ,
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          et al.,
          <source>A fast and accessible neural network based 2022</source>
          , p.
          <fpage>55</fpage>
          -
          <lpage>63</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          <article-title>eye-tracking system for real-time psychometric</article-title>
          and [29]
          <string-name>
            <given-names>M.</given-names>
            <surname>Rahaman</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Tabassum</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Arya</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Bansal</surname>
          </string-name>
          , Se-
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          <string-name>
            <surname>INGS</surname>
          </string-name>
          , volume
          <volume>3870</volume>
          ,
          <string-name>
            <surname>CEUR-WS</surname>
          </string-name>
          ,
          <year>2024</year>
          , pp.
          <fpage>32</fpage>
          -
          <lpage>41</lpage>
          .
          <article-title>framework based on hyperledger fabric technology</article-title>
          , [19]
          <string-name>
            <given-names>M.</given-names>
            <surname>Asante</surname>
          </string-name>
          , G. Epiphaniou,
          <string-name>
            <given-names>C.</given-names>
            <surname>Maple</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Al-Khateeb</surname>
          </string-name>
          ,
          <source>Cyber Security and Applications</source>
          <volume>2</volume>
          (
          <year>2024</year>
          )
          <fpage>100045</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          <string-name>
            <given-names>M.</given-names>
            <surname>Bottarelli</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K. Z.</given-names>
            <surname>Ghafoor</surname>
          </string-name>
          , Distributed ledger [30]
          <string-name>
            <given-names>B.</given-names>
            <surname>Ladjal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I. E.</given-names>
            <surname>Tibermacine</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Bechouat</surname>
          </string-name>
          , M. Se-
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          <source>Engineering Management</source>
          <volume>70</volume>
          (
          <year>2021</year>
          )
          <fpage>713</fpage>
          -
          <lpage>739</lpage>
          .
          <article-title>study of ghardaia zone (algeria</article-title>
          ),
          <source>Natural Hazards</source>
          [20]
          <string-name>
            <given-names>A.</given-names>
            <surname>Tibermacine</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. M.</given-names>
            <surname>Amine</surname>
          </string-name>
          ,
          <string-name>
            <surname>An</surname>
          </string-name>
          end-to-end train-
          <volume>120</volume>
          (
          <year>2024</year>
          )
          <fpage>14703</fpage>
          -
          <lpage>14725</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          <article-title>able capsule network for image-based character</article-title>
          [31]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Liu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>He</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Chen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Liu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Peng</surname>
          </string-name>
          , H. Cao,
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          <source>Processing</source>
          <volume>11</volume>
          (
          <year>2021</year>
          ). Information
          <string-name>
            <surname>Integration</surname>
          </string-name>
          (
          <year>2024</year>
          )
          <fpage>100674</fpage>
          . [21]
          <string-name>
            <given-names>G.</given-names>
            <surname>Zimatore</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Cavagnaro</surname>
          </string-name>
          , Recurrence anal- [32]
          <string-name>
            <given-names>B.</given-names>
            <surname>Nail</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Djaidir</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I. E.</given-names>
            <surname>Tibermacine</surname>
          </string-name>
          , C. Napoli,
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          <string-name>
            <given-names>Complex</given-names>
            <surname>Systems</surname>
          </string-name>
          (
          <year>2015</year>
          )
          <fpage>253</fpage>
          -
          <lpage>278</lpage>
          . doi:
          <volume>10</volume>
          .
          <article-title>1007/ monitoring based on real data and neuro-fuzzy sys-</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          <source>978-3-319-07155-8_8. tem, Diagnostyka</source>
          <volume>25</volume>
          (
          <year>2024</year>
          ). [22]
          <string-name>
            <given-names>A.</given-names>
            <surname>Tibermacine</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Djedi</surname>
          </string-name>
          , Gene regulatory network [33]
          <string-name>
            <given-names>E.</given-names>
            <surname>Iacobelli</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Ponzi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Russo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Napoli</surname>
          </string-name>
          , Eye-
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          <string-name>
            <surname>tion</surname>
          </string-name>
          (
          <year>2015</year>
          ).
          <article-title>ment and evaluation</article-title>
          ,
          <source>Information</source>
          <volume>14</volume>
          (
          <year>2023</year>
          )
          <fpage>644</fpage>
          . [23]
          <string-name>
            <given-names>G.</given-names>
            <surname>Zimatore</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Serantoni</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. C.</given-names>
            <surname>Gallotta</surname>
          </string-name>
          , [34]
          <string-name>
            <surname>I. Naidji.</surname>
          </string-name>
          ,
          <string-name>
            <surname>O. Mosbahi.</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Khalgui.</surname>
          </string-name>
          ,
          <string-name>
            <surname>A. Bachir.</surname>
          </string-name>
          , Co-
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          <article-title>matic detection of aerobic threshold through re- worked microgrids</article-title>
          ,
          <source>in: Proceedings of the 14th</source>
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          series,
          <source>International Journal of Environmental</source>
          Re- - ICSOFT, INSTICC, SciTePress,
          <year>2019</year>
          , pp.
          <fpage>428</fpage>
          -
          <lpage>438</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          <source>search and Public Health</source>
          <volume>20</volume>
          (
          <year>2023</year>
          ). doi:
          <volume>10</volume>
          .3390/ doi:10.5220/0007965604280438.
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          ijerph20031998. [35]
          <string-name>
            <given-names>I.</given-names>
            <surname>Naidji</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. B.</given-names>
            <surname>Smida</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Khalgui</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Bachir</surname>
          </string-name>
          , Non [24]
          <string-name>
            <given-names>A.</given-names>
            <surname>Tibermacine</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Djedi</surname>
          </string-name>
          ,
          <article-title>Neat neural networks to cooperative game theoretic approach for residen-</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          <source>in: 2014 International Conference on Multimedia 32nd Annual European Simulation and Modelling</source>
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          <source>Computing and Systems (ICMCS)</source>
          , IEEE,
          <year>2014</year>
          , pp.
          <source>Conference</source>
          , Ghent, Belgium,
          <year>2018</year>
          , pp.
          <fpage>164</fpage>
          -
          <lpage>170</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          9-
          <fpage>14</fpage>
          . [36]
          <string-name>
            <given-names>I.</given-names>
            <surname>Naidji</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C. E.</given-names>
            <surname>Choucha</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Ramdani</surname>
          </string-name>
          , Electricity [25]
          <string-name>
            <given-names>A.</given-names>
            <surname>Tibermacine</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Akrour</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Khamar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I. E.</given-names>
            <surname>Tiber</surname>
          </string-name>
          <article-title>- theft detection techniques using artificial intelli-</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          <string-name>
            <surname>macine</surname>
          </string-name>
          , A. Rabehi,
          <article-title>Comparative analysis of svm gence: a survey</article-title>
          , in: 2024 IEEE International Con-
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          <article-title>response to diferent auditory stimuli, in: 2024 nologies (IC_ASET)</article-title>
          , IEEE,
          <year>2024</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          <source>International Conference on Telecommunications [37] I. Naidji</source>
          .,
          <string-name>
            <given-names>C.</given-names>
            <surname>Choucha</surname>
          </string-name>
          .,
          <string-name>
            <surname>M. Ramdani.</surname>
          </string-name>
          , Decentral-
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          <source>and Intelligent Systems (ICTIS)</source>
          , IEEE,
          <year>2024</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>8</lpage>
          .
          <article-title>ized federated learning architecture for networked</article-title>
          [26]
          <string-name>
            <given-names>C.</given-names>
            <surname>Nartey</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E. T.</given-names>
            <surname>Tchao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. D.</given-names>
            <surname>Gadze</surname>
          </string-name>
          , E. Keelson, G. S. microgrids,
          <source>in: Proceedings of the 20th Inter-</source>
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          <article-title>iot integration platforms: current implementation Automation</article-title>
          and Robotics - Volume
          <volume>1</volume>
          : ICINCO,
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          <article-title>challenges and future perspectives</article-title>
          , Wireless Com- INSTICC, SciTePress,
          <year>2023</year>
          , pp.
          <fpage>291</fpage>
          -
          <lpage>294</lpage>
          . doi:10.
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          <source>munications and Mobile Computing</source>
          <year>2021</year>
          (
          <year>2021</year>
          )
          <volume>5220</volume>
          /
          <fpage>0012215200003543</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          6672482. [38]
          <string-name>
            <given-names>I.</given-names>
            <surname>Naidji</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. B.</given-names>
            <surname>Smida</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Khalgui</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Bachir</surname>
          </string-name>
          , Multi [27]
          <string-name>
            <given-names>S.</given-names>
            <surname>Bouchelaghem</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I. E.</given-names>
            <surname>Tibermacine</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Balsi</surname>
          </string-name>
          ,
          <string-name>
            <surname>M.</surname>
          </string-name>
          <article-title>Mo- agent system-based approach for enhancing cyber-</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          <article-title>of the the 33rd Annual European Simulation</article-title>
          and [50]
          <string-name>
            <surname>T. M. Fernández-Caramés</surname>
          </string-name>
          ,
          <article-title>From pre-quantum to</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          <year>2019</year>
          , pp.
          <fpage>177</fpage>
          -
          <lpage>182</lpage>
          .
          <article-title>resistant cryptosystems for the internet of things</article-title>
          , [39]
          <string-name>
            <given-names>B.</given-names>
            <surname>Nail</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. A.</given-names>
            <surname>Atoussi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Saadi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I. E.</given-names>
            <surname>Tibermacine</surname>
          </string-name>
          ,
          <source>IEEE Internet of Things Journal</source>
          <volume>7</volume>
          (
          <year>2019</year>
          )
          <fpage>6457</fpage>
          -
          <lpage>6480</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          <string-name>
            <given-names>C.</given-names>
            <surname>Napoli</surname>
          </string-name>
          ,
          <article-title>Real-time synchronisation of multiple</article-title>
          [51]
          <string-name>
            <given-names>H.</given-names>
            <surname>Shekhawat</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D. S.</given-names>
            <surname>Gupta</surname>
          </string-name>
          , Quantum-resistance
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          <source>tional 8</source>
          (
          <year>2024</year>
          )
          <article-title>104</article-title>
          . metering infrastructure,
          <source>Pervasive and Mobile Com</source>
          [40]
          <string-name>
            <given-names>C.</given-names>
            <surname>Napoli</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Ponzi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Puglisi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Russo</surname>
          </string-name>
          , I. Tiber- puting
          <volume>100</volume>
          (
          <year>2024</year>
          )
          <fpage>101919</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref35">
        <mixed-citation>
          <string-name>
            <surname>macine</surname>
            , et al., Exploiting robots as healthcare re- [52]
            <given-names>C.</given-names>
          </string-name>
          <string-name>
            <surname>Roumeliotis</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Dasygenis</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          <string-name>
            <surname>Lazaridis</surname>
          </string-name>
          , M. Dos-
        </mixed-citation>
      </ref>
      <ref id="ref36">
        <mixed-citation>
          caregivers,
          <source>in: CEUR Workshop Proceedings</source>
          , vol-
          <volume>4</volume>
          .0:
          <article-title>The use case of supply chain-a review of in-</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref37">
        <mixed-citation>
          <source>ume 3686</source>
          ,
          <string-name>
            <surname>CEUR-WS</surname>
          </string-name>
          ,
          <year>2024</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>10</lpage>
          .
          <article-title>tegration techniques and applications</article-title>
          ,
          <source>Designs</source>
          <volume>8</volume>
          [41]
          <string-name>
            <given-names>I.</given-names>
            <surname>Naidji</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Mosbahi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Khalgui</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Bachir</surname>
          </string-name>
          , Two
          <string-name>
            <surname>-</surname>
          </string-name>
          (
          <year>2024</year>
          )
          <fpage>105</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref38">
        <mixed-citation>
          <article-title>stage game theoretic approach for energy manage</article-title>
          - [53]
          <string-name>
            <given-names>M.</given-names>
            <surname>Arunmozhi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Venkatesh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Arisian</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Shi</surname>
          </string-name>
          ,
          <string-name>
            <surname>V. R.</surname>
          </string-name>
        </mixed-citation>
      </ref>
      <ref id="ref39">
        <mixed-citation>
          gies, Springer International Publishing, Cham,
          <year>2020</year>
          , experimental design, Transportation Research Part
        </mixed-citation>
      </ref>
      <ref id="ref40">
        <mixed-citation>
          pp.
          <fpage>205</fpage>
          -
          <lpage>228</lpage>
          . E: Logistics and
          <source>Transportation Review</source>
          <volume>165</volume>
          (
          <year>2022</year>
          ) [42]
          <string-name>
            <surname>P. M. Dhulavvagol</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          <string-name>
            <surname>Totad</surname>
            ,
            <given-names>A. M.</given-names>
          </string-name>
          <string-name>
            <surname>Anagal</surname>
          </string-name>
          , S. Ane-
          <volume>102864</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref41">
        <mixed-citation>
          <string-name>
            <surname>gundi</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          <string-name>
            <surname>Devadkar</surname>
            ,
            <given-names>V. S.</given-names>
          </string-name>
          <string-name>
            <surname>Kone</surname>
            , Shardedscale: Em- [54]
            <given-names>P.</given-names>
          </string-name>
          <string-name>
            <surname>Kamboj</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          <string-name>
            <surname>Khare</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          <string-name>
            <surname>Pal</surname>
          </string-name>
          , User authentication us-
        </mixed-citation>
      </ref>
      <ref id="ref42">
        <mixed-citation>
          <source>ence 233</source>
          (
          <year>2024</year>
          )
          <fpage>432</fpage>
          -
          <lpage>443</lpage>
          . plications 14 (
          <year>2021</year>
          )
          <fpage>2961</fpage>
          -
          <lpage>2976</lpage>
          . [43]
          <string-name>
            <given-names>T.</given-names>
            <surname>Nguyen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Nguyen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T. N.</given-names>
            <surname>Gia</surname>
          </string-name>
          , Exploring the [55]
          <string-name>
            <given-names>V.</given-names>
            <surname>Tyagi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Saraswat</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Bansal</surname>
          </string-name>
          ,
          <article-title>An analysis of</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref43">
        <mixed-citation>
          <article-title>Journal of Network and Computer Applications in: Smart Cities</article-title>
          , CRC Press,
          <year>2023</year>
          , pp.
          <fpage>337</fpage>
          -
          <lpage>357</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref44">
        <mixed-citation>
          (
          <year>2024</year>
          )
          <fpage>103884</fpage>
          . [56]
          <string-name>
            <given-names>W. C.</given-names>
            <surname>Tan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. S.</given-names>
            <surname>Sidhu</surname>
          </string-name>
          , Review of rfid and iot inte[44]
          <string-name>
            <given-names>M.</given-names>
            <surname>Torky</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. E.</given-names>
            <surname>Hassanein</surname>
          </string-name>
          ,
          <article-title>Integrating blockchain gration in supply chain management</article-title>
          , Operations
        </mixed-citation>
      </ref>
      <ref id="ref45">
        <mixed-citation>
          <article-title>and the internet of things in precision agriculture: Research Perspectives 9 (</article-title>
          <year>2022</year>
          )
          <fpage>100229</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref46">
        <mixed-citation>
          <string-name>
            <surname>Analysis</surname>
            , opportunities, and challenges, Computers [57]
            <given-names>P.</given-names>
          </string-name>
          <string-name>
            <surname>Kumar</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          <string-name>
            <surname>Kumar</surname>
            ,
            <given-names>G. P.</given-names>
          </string-name>
          <string-name>
            <surname>Gupta</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          <string-name>
            <surname>Tripathi</surname>
            ,
            <given-names>A</given-names>
          </string-name>
          . Jol-
        </mixed-citation>
      </ref>
      <ref id="ref47">
        <mixed-citation>
          <source>and Electronics in Agriculture</source>
          <volume>178</volume>
          (
          <year>2020</year>
          )
          <article-title>105476</article-title>
          .
          <string-name>
            <surname>faei</surname>
            ,
            <given-names>A. N.</given-names>
          </string-name>
          <string-name>
            <surname>Islam</surname>
            , A blockchain-orchestrated deep [45]
            <given-names>T.</given-names>
          </string-name>
          <string-name>
            <surname>Wan</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          <string-name>
            <surname>Ge</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          <string-name>
            <surname>Liao</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          <string-name>
            <surname>Zhao</surname>
          </string-name>
          ,
          <article-title>A lightweight learning approach for secure data transmission in</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref48">
        <mixed-citation>
          <article-title>agricultural iot devices, Wireless Personal Commu-</article-title>
          and
          <source>Distributed Computing</source>
          <volume>172</volume>
          (
          <year>2023</year>
          )
          <fpage>69</fpage>
          -
          <lpage>83</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref49">
        <mixed-citation>
          <source>nications 136</source>
          (
          <year>2024</year>
          )
          <fpage>921</fpage>
          -
          <lpage>945</lpage>
          . [58]
          <string-name>
            <given-names>P.</given-names>
            <surname>Williams</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I. K.</given-names>
            <surname>Dutta</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Daoud</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Bayoumi</surname>
          </string-name>
          ,
          <string-name>
            <surname>A</surname>
          </string-name>
          [46]
          <string-name>
            <given-names>A.</given-names>
            <surname>Shamsoshoara</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Korenda</surname>
          </string-name>
          ,
          <string-name>
            <surname>F.</surname>
          </string-name>
          <article-title>Afghah, survey on security in internet of things with a focus</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref50">
        <mixed-citation>
          <article-title>function (puf)-based security solutions for internet of Things 19 (</article-title>
          <year>2022</year>
          )
          <fpage>100564</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref51">
        <mixed-citation>
          of things,
          <source>Computer Networks</source>
          <volume>183</volume>
          (
          <year>2020</year>
          )
          <fpage>107593</fpage>
          . [59]
          <string-name>
            <given-names>A. J.</given-names>
            <surname>Alkhodair</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. P.</given-names>
            <surname>Mohanty</surname>
          </string-name>
          , E. Kougianos, Con[47]
          <string-name>
            <given-names>N.</given-names>
            <surname>Javaid</surname>
          </string-name>
          ,
          <article-title>Integration of context awareness in in- sensus algorithms of distributed ledger technology-</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref52">
        <mixed-citation>
          <article-title>ternet of agricultural things</article-title>
          ,
          <source>ICT Express 9</source>
          (
          <year>2023</year>
          )
          <article-title>a comprehensive analysis</article-title>
          ,
          <source>arXiv preprint</source>
        </mixed-citation>
      </ref>
      <ref id="ref53">
        <mixed-citation>
          189-
          <fpage>196</fpage>
          . arXiv:
          <volume>2309</volume>
          .13498 (
          <year>2023</year>
          ). [48]
          <string-name>
            <given-names>S.</given-names>
            <surname>Selvarajan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Srivastava</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. O.</given-names>
            <surname>Khadidos</surname>
          </string-name>
          ,
          <string-name>
            <surname>A. O.</surname>
          </string-name>
        </mixed-citation>
      </ref>
      <ref id="ref54">
        <mixed-citation>
          <source>Journal of Cloud Computing</source>
          <volume>12</volume>
          (
          <year>2023</year>
          )
          <fpage>38</fpage>
          . [49]
          <string-name>
            <given-names>S.</given-names>
            <surname>eddine Boukredine</surname>
          </string-name>
          , E. Mehallel,
          <string-name>
            <surname>A</surname>
          </string-name>
          . Boualleg,
        </mixed-citation>
      </ref>
      <ref id="ref55">
        <mixed-citation>
          <article-title>cut-corner techniques</article-title>
          ,
          <source>ITEGAM-JETIA</source>
          <volume>11</volume>
          (
          <year>2025</year>
          )
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>