{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T21:13:28Z","timestamp":1773782008752,"version":"3.50.1"},"reference-count":38,"publisher":"Wiley","issue":"5","license":[{"start":{"date-parts":[[2023,8,28]],"date-time":"2023-08-28T00:00:00Z","timestamp":1693180800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Int J Network Mgmt"],"published-print":{"date-parts":[[2023,9]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>The technological integration of the Internet of Things (IoT)\u2010Cloud paradigm has enabled intelligent linkages of things, data, processes, and people for efficient decision making without human intervention. However, it poses various challenges for IoT networks that cannot handle large amounts of operation technology (OT) data due to physical storage shortages, excessive latency, higher transfer costs, a lack of context awareness, impractical resiliency, and so on. As a result, the fog network emerged as a new computing model for providing computing capacity closer to IoT edge devices. The IoT\u2010Fog\u2010Cloud network, on the other hand, is more vulnerable to multiple security flaws, such as missing key management problems, inappropriate access control, inadequate software update mechanism, insecure configuration files and default passwords, missing communication security, and secure key exchange algorithms over unsecured channels. Therefore, these networks cannot make good security decisions, which are significantly easier to hack than to defend the fog\u2010enabled IoT environment. This paper proposes the cooperative flow for securing edge devices in fog\u2010enabled IoT networks using a permissioned blockchain system (pBCS). The proposed fog\u2010enabled IoT network provides efficient security solutions for key management issues, communication security, and secure key exchange mechanism using a blockchain system. To secure the fog\u2010based IoT network, we proposed a mechanism for identification and authentication among fog, gateway, and edge nodes that should register with the blockchain network. The fog nodes maintain the blockchain system and hold a shared smart contract for validating edge devices. The participating fog nodes serve as validators and maintain a distributed ledger\/blockchain to authenticate and validate the request of the edge nodes. The network services can only be accessed by nodes that have been authenticated against the blockchain system. We implemented the proposed pBCS network using the private Ethereum 2.0 that enables secure device\u2010to\u2010device communication and demonstrated performance metrics such as throughput, transaction delay, block creation response time, communication, and computation overhead using state\u2010of\u2010the\u2010art techniques. Finally, we conducted a security analysis of the communication network to protect the IoT edge devices from unauthorized malicious nodes without data loss.<\/jats:p>","DOI":"10.1002\/nem.2248","type":"journal-article","created":{"date-parts":[[2023,8,29]],"date-time":"2023-08-29T02:06:45Z","timestamp":1693274805000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":18,"title":["Fog\u2010Sec: Secure end\u2010to\u2010end communication in fog\u2010enabled IoT network using permissioned blockchain system"],"prefix":"10.1002","volume":"33","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7799-8855","authenticated-orcid":false,"given":"Erukala Suresh","family":"Babu","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering National Institute of Technology  Warangal India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7706-8028","authenticated-orcid":false,"given":"Mekala Srinivasa","family":"Rao","sequence":"additional","affiliation":[{"name":"Department of CSE Lakireddy Bali Reddy College of Engineering  Mylavaram India"}]},{"given":"Gandharba","family":"Swain","sequence":"additional","affiliation":[{"name":"Department of Artificial Intelligence and Data Science Koneru Lakshmaiah Education Foundation  Vaddeswaram India"}]},{"given":"A. Kousar","family":"Nikhath","sequence":"additional","affiliation":[{"name":"Department of CSE (AIML &amp; IoT) VNR Vignana Jyothi Institute of Engineering and Technology Hyderabad  Hyderabad India"}]},{"given":"Rajesh","family":"Kaluri","sequence":"additional","affiliation":[{"name":"School of Information Technology and Engineering VIT  Vellore India"}]}],"member":"311","published-online":{"date-parts":[[2023,8,28]]},"reference":[{"key":"e_1_2_8_2_1","doi-asserted-by":"publisher","DOI":"10.3390\/electronics10172110"},{"key":"e_1_2_8_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2022.108234"},{"key":"e_1_2_8_4_1","first-page":"77","volume-title":"Convergence of Internet of Things and Blockchain Technologies","author":"Venkadeshan R","year":"2021"},{"key":"e_1_2_8_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eng.2020.06.018"},{"key":"e_1_2_8_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOMWKSHPS50562.2020.9162706"},{"key":"e_1_2_8_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2757384.2757397"},{"key":"e_1_2_8_8_1","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/8621230"},{"key":"e_1_2_8_9_1","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2018.091071"},{"key":"e_1_2_8_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2017.3680960"},{"key":"e_1_2_8_11_1","article-title":"Authentication systems in internet of things","author":"Borgohain T","year":"2015","journal-title":"arXiv"},{"key":"e_1_2_8_12_1","doi-asserted-by":"publisher","DOI":"10.3390\/s19081788"},{"key":"e_1_2_8_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2999213"},{"key":"e_1_2_8_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2022.12.001"},{"key":"e_1_2_8_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2892009"},{"key":"e_1_2_8_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2021.102802"},{"key":"e_1_2_8_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2018.8487449"},{"key":"e_1_2_8_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/Indo-TaiwanICAN48429.2020.9181356"},{"key":"e_1_2_8_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.2986585"},{"key":"e_1_2_8_20_1","volume-title":"CS & IT Conference Proceedings (Vol. 11, No. 6). CS & IT conference proceedings","author":"Banoun N","year":"2021"},{"key":"e_1_2_8_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978\u20103\u2010030\u201057328\u20107_11"},{"key":"e_1_2_8_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978\u2010981\u201016\u20101941\u20100_41"},{"key":"e_1_2_8_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2019.04.050"},{"key":"e_1_2_8_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISESD.2018.8605485"},{"key":"e_1_2_8_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/SSIC.2018.8556668"},{"key":"e_1_2_8_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/AICCSA.2018.8612856"},{"key":"e_1_2_8_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00091"},{"key":"e_1_2_8_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2020.08.021"},{"key":"e_1_2_8_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3050562"},{"key":"e_1_2_8_30_1","doi-asserted-by":"publisher","DOI":"10.1111\/exsy.12941"},{"key":"e_1_2_8_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2022.108287"},{"key":"e_1_2_8_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3035849"},{"key":"e_1_2_8_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2018.03.017"},{"key":"e_1_2_8_34_1","volume-title":"The source code link of the proposed work"},{"key":"e_1_2_8_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2022.12.042"},{"key":"e_1_2_8_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2871706"},{"key":"e_1_2_8_37_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2020.106555"},{"key":"e_1_2_8_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3010893"},{"key":"e_1_2_8_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2909004"}],"container-title":["International Journal of Network Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/nem.2248","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,12]],"date-time":"2023-09-12T01:42:08Z","timestamp":1694482928000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/nem.2248"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,28]]},"references-count":38,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2023,9]]}},"alternative-id":["10.1002\/nem.2248"],"URL":"https:\/\/doi.org\/10.1002\/nem.2248","archive":["Portico"],"relation":{},"ISSN":["1055-7148","1099-1190"],"issn-type":[{"value":"1055-7148","type":"print"},{"value":"1099-1190","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,8,28]]},"assertion":[{"value":"2023-03-05","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-08-08","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-08-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"e2248"}}