Recent Research Articles in Internet of Things (IoT)

International Journal of Computer Science and Information Technology (IJCSIT)

INSPEC Indexed

ISSN: 0975-3826(online); 0975-4660 (Print)

Environmental Monitoring And Controlling System For Mushroom Farm With Online Interface

Arjuna Marzuki and Soh Yan Ying

School of Electrical and Electronic Engineering, Universiti Sains Malaysia, Penang, Malaysia


Agriculture sensors play an important role in modern agriculture. The use of sensors in various agriculture sectors minimizes the environmental impact on crops, helps in increasing yield and saving cost of operation. Among all agriculture industries in Malaysia, the mushroom industry is a comparatively new and small. As most of the mushroom farms in Malaysia are small-scaled, their production capability is limited by inadequate environmental control system and the lack of financial resources to upgrade the systems. This paper presents an environmental monitoring and controlling system to monitor and control the environmental conditions in a mushroom farm. It enables user to monitor temperature, humidity, carbon dioxide concentration and light intensity in a mushroom farm on an android device by using ThingSpeak online platform. The control algorithm is able to control devices in a mushroom farm automatically based on feedback from the sensors to maintain the environment in an optimum condition for mushroom growth. The measured percentage error of temperature, humidity, carbon dioxide and the light using the developed system was as low as 0.4%, 1.5%, 2.2% and 1.34% respectively.


Agriculture, Interface Circuit, Internet of Things, Monitoring and Control, Sensor, Wireless.

For More Details :

Volume Link :


[1]      Unit Pengurusan Prestasi dan Pelaksanaan (2010) Economic Transformation Programme: A Roadmap for Malaysia (1 Malaysia). Performance Management and Delivery Unit, Jabatan Perdana Menteri.

[2]      Istikoma Qurat-ul-Ain., & Dahlan A. R. A, (2015) The Transformation of Agriculture Based Economy to an Industrial Sector through Crowd Sourcing In Malaysia”, Int. J. Comput. Sci. Inf. Technol. Res., Vol. 3, No. 1, pp.34–41.

[3]      Bakar B.B., (2009) “The Malaysian Agricultural Industry in the New Millennium – Issues and Challenges,” pp. 337–356.

[4]      Rosmiza M., Davies W., Aznie R. C., Jabil M., & Mazdi M, (2016) “Prospects for Increasing Commercial Mushroom Production in Malaysia: Challenges and Opportunities”, Mediterr. J. Soc. Sci., Vol. 7, No. 1, pp. 406–415.

[5]      Haimid M. T., Rahim H., & Dardak R. A, (2013) “Understanding the mushroom industry and its marketing strategies for fresh produce in Malaysia”, Econ. Technol. Manag. Rev., Vol. 8, pp. 27– 37.

[6]      Mat Amin M. Z., & Harun A, (2015) “Competitiveness of the Mushroom Industry in Malaysia” [Online]. Available:          [Accessed: 18-Oct-2016].

[7]      Australian Mushroom Growers Association, “Introduction to Mushroom Growing,” AMGA, pp. 1- 16.

[8]      Van Nieuwenhuijzen, Bram., & Oei, P (2005) Small-scale mushroom cultivation oyster, shiitake and wood ear mushrooms, Agrodok;40. Agromisa/CTA, Wageningen, The Netherlands.

[9]      Stamets P., & Chilton, J. S, (1983) “The Mushroom Cultivator: A Practical Guide to Growing Mushrooms at Home”, S. Cal. L. Rev., p. 416.

[10]    Grant, J.J (2002) An investigation of the airflow in mushroom growing structures, the development of an improved, three-dimensional solution technique for fluid flow and its evaluation for the modelling of mushroom growing structures. PhD thesis, Dublin City University.

[11]    Kwon H., & Kim, B. S (2004) Mushroom Grow. Handb. 1, pp. 192–196.

[12]    Tisdale T. E (2004) Cultivation of the Oyster Mushroom (Pleurotussp.) on Wood Substrates in Hawaii. MSc thesis, University of Hawai’i.

[13]    Wang X., (2014) “Temperature and Humidity Monitoring System Based on GSM Module”, International Journal of Computer, Consumer and Control., Vol. 3, No. 1, pp. 41–49.

[14]    Rahali A., Guerbaoui M., Ed-dahhak A., El Afou Y., Tannouche A., Lachhab A., & Bouchikhi, B, (2011) “Development of a data acquisition and greenhouse control system based on GSM”, Int. J. Eng. Sci. Technol., Vol. 3, No. 8, pp. 297–306.

[15]   Kalinin Y. S., Velikov E. K., & Markova, V. I, (2015) “Design of Indoor Environment Monitoring System Using Arduino”, Int. J. Innov. Sci. Mod. Eng., Vol. 3, No. 7, pp. 46–49, 20.

[16]   Lokesh Krishna K., Madhuri J., & Anuradha K, (2016) “A ZigBee based Energy Efficient Environmental Monitoring Alerting and Controlling System”, in International Conference On Information Communication And Embedded Systems (ICICES2016).


Arjuna Marzuki is a lecturer at Universiti Sains Malaysia. He teaches Analog Circuit design at School of Electrical and Electronic Engineering Yan Ying Soh is a stude nt of electronic engineering at School of Electrical and Electronic Engineering

Architectural Aspect-Aware Design For Iot Applications: Conceptual Proposal

Anas M. R. AlSobeh and Aws A. Magableh

Department of Computer Information System, Yarmouk University, Irbid, Jordan


Aspect-Oriented Programming (AOP) provides new constructs and concepts to handle secondary requirements in applications. Secondary requirements, i.e. crosscutting concerns, of the Internet of things (IoT) applications is inherited from the nature of the complexity of interactions, and implementation crosscutting concerns over core IoT architecture. Realizing the full potential of the IoT application requires a new abstraction design technique. This paper proposes an abstract class element toward a design approach to providing better means better separation of concerns. The proposed approach is accompanied by gathering relevant contextual properties pertaining to the environment of IoT interactions. A new architectural aspect-aware definition is proposed for tracking the logic of interaction characteristics on the IoT components being designed


Aspect-Oriented Programming, Aspect Orientation, Modularization, Behavior-Interaction-Priority Model, BIP Components, Internet of things, IoT, crosscutting concerns, Aspects

For More Details :

Volume Link :


[1]     Lekidis, A., Stachtiari, E., Katsaros, P., Bozga, M., &Georgiadis, C. K. (2018). Model‐based design of IoT systems with the BIP component framework. Software: Practice and Experience, 48(6), 1167-1194.

[2]   Tselentis, G., &Galis, A. (Eds.). (2010). Towards the future Internet: emerging trends from European research. IOS press.

[3]   Borgia, E (2014), “The Internet of Things vision: Key features, applications and open issues”, Computer Communications,Vol.54, pp.1-31.

[4]   Balakrishnan, S. M., &Sangaiah, A. K. (2015). Aspect oriented middleware for Internet of things: a state-of-the art survey of service discovery approaches. Int. J. Intell. Eng. Syst, 8(4), 16-28.

[5]   Shanmughaneethi, V., Praveen, R. Y., &Swamynathan, S. (2012). CIVD: detection of command injection vulnerabilities in web services through aspect–oriented programming. International Journal of Computer Applications in Technology, 44(4), 312-320.

[6]   Basu, A., Bensalem, B., Bozga, M., Combaz, J., Jaber, M., Nguyen, T. H., &Sifakis, J. (2011). Rigorous component-based system design using the BIP framework. IEEE software, 28(3), 41-48.

[7]   El-Hokayem, A., Falcone, Y., &Jaber, M. (2016, July). Modularizing crosscutting concerns in component-based systems. In International Conference on Software Engineering and Formal Methods (pp. 367-385). Springer, Cham.

[8]   Djoko, S. D., Douence, R., &Fradet, P. (2012). Aspects preserving properties. Science of Computer Programming, 77(3), 393-422.

[9]   Katz, S. (2006). Aspect categories and classes of temporal properties. In Transactions on aspect-oriented software development I (pp. 106-134). Springer, Berlin, Heidelberg.

[10] Verimag: BIP Tools,,93.html

[11] Nazarpour, H., Falcone, Y., Jaber, M., Bensalem, S., &Bozga, M. (2017). Monitoring Distributed Component-Based Systems. arXiv preprint arXiv:1705.05242.

[12] Ma, K., Sun, R., & Abraham, A. (2013). Toward a Module-centralized and Aspect-oriented Monitoring Framework in Clouds. J. UCS, 19(15), 2241-2265.

[13] Abbes, M., Khomh, F., Gueheneuc, Y. G., &Antoniol, G. (2011, March). An empirical study of the impact of two antipatterns, blob and spaghetti code, on program comprehension. In Software maintenance and reengineering (CSMR), 2011 15th European conference on (pp. 181-190). IEEE.

[14] Mikkonen, T., &Taivalsaari, A. (2007). Web Applications: Spaghetti code for the 21st century.

[15] Bilal, M. (2017). A Review of Internet of Things Architecture, Technologies and Analysis Smartphone-based Attacks Against 3D printers. arXiv preprint arXiv1708.04560.

[16] Perera, C., Zaslavsky, A., Christen, P., Compton, M., & Georgakopoulos, D. (2013, June). Context-aware sensor search, selection and ranking model for internet of things middleware. In Mobile Data Management (MDM), 2013 IEEE 14th International Conference on (Vol. 1, pp. 314-322). IEEE.

[17] AlSobeh, A., & Clyde, S. Unified Conceptual Model for Joinpoints in Distributed Transactions. In ICSE (Vol. 14, pp. 8-15).


Dr.AnasAlSobeh, Dr.AlSobeh received his B.Sc. and M.Sc. degrees in computer information systems from Yarmouk University in 2007 and 2010, respectively. He also received PhD degree in computer science from Utah State University/USA with honour in Dec. 2015. He joined Yarmouk University academic staff in 2016. He is currently an assistant professor of computer information systems (CIS). His research interests include web technology, e-learning systems, software engineering, distributed systems, cloud systems, Internet of things (IoT) and data modelling. He has many scientific publications. He also has European-funded projects. He is also an active member of credit mobility projects to exchange academic members.

Aws A. Magableh is an Assistant Professor at the Faculty of Information Technology and Computer Science in Yarmouk University, Jordan. He obtained his PhD from the National University of Malaysia (UKM) in 2015, he obtained his master in Software Engineering from University Malaysia (UM) in 2008, and Bachelor’s in Software Engineering from the Hashemite University in 2006. His research interests include Web technology, Web Services, Cloud Computing, Aspect-Orientation, Software Engineering, System design and modelling. Aws is very passionate about Learning &Development (L&D) and I have been immersed in the training industries with Nokia, Microsoft and Huawei for the past 10 years focusing on building skillsets

Future and Challenges of Internet of Things

Falguni Jindal1, Rishabh Jamar2, Prathamesh Churi3

1,2Bachelors of Technology in Computer Engineering

SVKM’s NMIMS Mukesh Patel School of Technology Management and Engineering, Mumbai, India

3Assistant Professor (Computer Engineering) SVKM’s NMIMS Mukesh Patel School of Technology Management and Engineering, Mumbai, India


The world is moving forward at a fast pace, and the credit goes to ever growing technology. One such concept is IOT (Internet of things) with which automation is no longer a virtual reality. IOT connects various non-living objects through the internet and enables them to share information with their community network to automate processes for humans and makes their lives easier. The paper presents the future challenges of IoT , such as the technical (connectivity , compatibility and longevity , standards , intelligent analysis and actions , security), business ( investment , modest revenue model etc. ), societal (changing demands , new devices, expense, customer confidence etc. ) and legal challenges ( laws, regulations, procedures, policies etc. ). A section also discusses the various myths that might hamper the progress of IOT, security of data being the most critical factor of all. An optimistic approach to people in adopting the unfolding changes brought by IOT will also help in its growth.


IoT, Internet of Things, Security, Sensors

For More Details :

Volume Link :


[1]     Gubbi, J., Buyya, R., Marusic, S., & Palaniswami, M. (2013). Internet of Things (IoT): A vision, architectural elements, and future directions. Future generation computer systems, 29(7), 1645-1660.

[2]     Li, S., Da Xu, L., & Zhao, S. (2015). The internet of things: a survey. Information Systems Frontiers, 17(2), 243-259.

[3]     Guo, B., Zhang, D., Wang, Z., Yu, Z., & Zhou, X. (2013). Opportunistic IoT: Exploring the harmonious interaction between human and the internet of things. Journal of Network and Computer Applications, 36(6), 1531-1539.

[4]     Banafa, A. (2014). IoT Standardization and Implementation Challenges. IEEE. org Newsletter.

[5]     Banafa, A. (2015). „What is next for IoT and IIoT”. Enterprise Mobility Summit.

[6]     Coetzee, L., & Eksteen, J. (2011, May). The Internet of Things-promise for the future? Anintroduction. In IST-Africa Conference Proceedings, 2011 (pp. 1-9). IEEE.

[7]     Cai, H., Da Xu, L., Xu, B., Xie, C., Qin, S., & Jiang, L. (2014). IoT-based configurable informationservice platform for product lifecycle management. IEEE Transactions on Industrial Informatics, 10(2), 1558-1567.

[8]      Khan, R., Khan, S. U., Zaheer, R., & Khan, S. (2012, December). Future internet: the internet of things architecture, possible applications and key challenges. In Frontiers of Information Technology (FIT), 2012 10th International Conference on (pp. 257-260). IEEE.

[9]     Liu, Y., & Zhou, G. (2012, January). Key technologies and applications of internet of things. In Intelligent Computation Technology and Automation (ICICTA), 2012 Fifth International Conference on (pp. 197-200). IEEE.

[10]  Sadeghi, A. R., Wachsmann, C., & Waidner, M. (2015, June). Security and privacy challenges in industrial internet of things. In Proceedings of the 52nd annual design automation conference (p. 54). ACM.

[11] Banafa, A. (2014). IoT and Blockchain Convergence: Benefits and Challenges. IEEE Internet of Things.

[12]  Marjani, M., Nasaruddin, F., Gani, A., Karim, A., Hashem, I. A. T., Siddiqa, A., & Yaqoob, I. (2017). Big IoT data analytics: Architecture, opportunities, and open research challenges. IEEE Access, 5, 5247-5261.

[13]  Desai, P., Sheth, A., & Anantharam, P. (2015, June). Semantic gateway as a service architecture for iot interoperability. In Mobile Services (MS), 2015 IEEE International Conference on(pp. 313-319). IEEE.

[14]  Koivu, A., Koivunen, L., Hosseinzadeh, S., Laurén, S., Hyrynsalmi, S., Rauti, S., & Leppänen, V. (2016, December). Software Security Considerations for IoT. In Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), 2016 IEEE International Conference on (pp. 392-397). IEEE.

[15] Sundmaeker, H., Guillemin, P., Friess, P., & Woelfflé, S. (2010). Vision and challenges for realizing the Internet of Things. Cluster of European Research Projects on the Internet of Things, European Commision, 3(3), 34-36.

[16]   Vermesan, O., Friess, P., Guillemin, P., Gusmeroli, S., Sundmaeker, H., Bassi, A., … & Doody, P. (2011). Internet of things strategic research roadmap. Internet of Things-Global Technological and Societal Trends, 1(2011), 9-52.

[17]   Sheng, Z., Yang, S., Yu, Y., Vasilakos, A., Mccann, J., & Leung, K. (2013). A survey on the ietf protocol suite for the internet of things: Standards, challenges, and opportunities. IEEE Wireless Communications, 20(6), 91-98.

[18] Theoleyre, F., & Pang, A. C. (Eds.). (2013). Internet of Things and M2M Communications. River Publishers.

[19]   Coetzee, L., & Eksteen, J. (2011, May). The Internet of Things-promise for the future? An introduction. In IST-Africa Conference Proceedings, 2011 (pp. 1-9). IEEE.

[20]   Ji, Z., & Anwen, Q. (2010, November). The application of internet of things (IOT) in emergency management system in China. In Technologies for Homeland Security (HST), 2010 IEEE International Conference on (pp. 139-142). IEEE.

[21] James Kirkland , “Internet of Things: insights from Red Hat” , Website: , Accesed : 2nd February 2018


Falguni Jindal is a final year student pursuing B.Tech in Computer Science from SVKM’s NMIMS Mukesh Patel School of Technology Management and Engineering (MPSTME), Mumbai, India. She is a passionate student and has a strong determination for gathering knowledge and learning new things every day. Falguni has published two research papers in the field of IOT and Web Security respectively. Currently, she is also working on a few   other projects in other domains of Computer Science.

Rishabh Jamar is a final year student pursuing B.Tech in Computer Science from SVKM’s NMIMS Mukesh Patel School of Technology Management and Engineering (MPSTME), Mumbai, India. He is hard working, enthusiastic and his quest for more k  nowledge led him to gain interest in exploring new domains like Network Security, Artificial Intelligence, Data Analytics and Internet of Things. He has published four research papers in the same fields at national and International level. He has also done a major project on internet security and several other minor projects in different domains of Computer Science.

Prof. Prathamesh Churi is Assistant Professor in Computer Engineering Department of SVKM’s NMIMS Mukesh Patel School of Technology Management and Engineering (MPSTME), Mumbai, India. He has Completed his Bachelor’s degree in Engineering (Computer science) from University of Mumbai and completed his Master’s Degree in Engineering (Information Technology) from University of Mumbai. He started his journey as a professo  r and has been working successfully in this field since past 3 years where outcome of learning is different for every day. He is having outstanding technical knowledge in the field of Network Security and Cryptography, Education Technology, Internet of Things. He has published many research papers in the same field at national and International level. He is a reviewer, TPC member, Session Chair, guest speaker of many IEEE/ Springer Conferences and Institutes at International Level. . He has bagged with many awards in the education field. His relaxation and change lies in pursuing his hobbies which mainly includes expressing views be it in public ¬writing columns or blogging.

A Systematic Mapping Study On Current Research Topics In Smart Contracts 

Maher Alharby1,2 and Aad van Moorsel1 

1School of Computing Science, Newcastle University, Newcastle, UK 

2College of Computer Science and Engineering, Taibah University, Medina, KSA


An appealing feature of blockchain technology is smart contracts. A smart contract is executable code that runs on top of the blockchain to facilitate, execute and enforce an agreement between untrusted parties without the involvement of a trusted third party. In this paper, we conduct a systematic mapping study to collect all research that is relevant to smart contracts from a technical perspective. The aim of doing so is to identify current research topics and open challenges for future studies in smart contract research. We extract 24 papers from different scientific databases. The results show that about two thirds of the papers focus on identifying and tackling smart contract issues. Four key issues are identified, namely, codifying, security, privacy and performance issues. The rest of the papers focuses on smart contract applications or other smart contract related topics. Research gaps that need to be addressed in future studies are provided.


Blockchain, Smart contracts, Systematic mapping study, Survey

For More Details :

Volume Link :


[1]     V. Buterin, “A next-generation smart contract and decentralized application platform.,” Available online at: [Accessed 19/02/2017].

[2]     K. Petersen, R. Feldt, S. Mujtaba, and M. Mattsson, “Systematic mapping studies in software engineering,” in Proceedings of the 12th International Conference on Evaluation and Assessment in Software Engineering, EASE’08, pp. 68-77, BCS Learning & Development Ltd., 2008.

[3]     S. Nakamoto, “Bitcoin: A peer-to-peer electronic cash system,” 2008.

[4]     X. Xu, C. Pautasso, L. Zhu, V. Gramoli, A. Ponomarev, A. B. Tran, and S. Chen, “The blockchain as a software connector,” in 2016 13th Working IEEE/IFIP Conference on Software Architecture (WICSA), pp. 182-191, IEEE, 2016.

[5] V. Buterin, “On public and private blockchains,” Available online at: [Accessed 01/03/2017].

[6]     N.Szabo, “Formalizing and securing relationships on public networks.,” Available online at: http:// [Accessed 15/02/2017].

[7] J. Stark, “Making sense of blockchain smart contracts,” Available online at: [Ac-cessed 06/03/2017].

[8]     K. Delmolino, M. Arnett, A. Kosba, A. Miller, and E. Shi, “Step by step towards creating a safe smart contract: Lessons and insights from a cryptocurrency lab,” in International Conference on Financial Cryptography and Data Security, pp. 79-94, Springer, 2016.

[9]     V. Morabito, “Smart contracts and licensing,” in Business Innovation Through Blockchain, pp.    101- 124, Springer, 2017.

[10]   A. Lewis, ”A gentle introduction to smart contracts,” Available online at: [Accessed 25/02/2017].

[11]   G. Wood, “Ethereum: A secure decentralised generalised transaction ledger,” Ethereum Project Yellow Paper, 2014.

[12]   K. Christidis and M. Devetsikiotis, “Blockchains and smart contracts for the internet of things,” IEEE Access, vol. 4, pp. 2292-2303, 2016.

[13]   W. Egbertsen, G. Hardeman, M. van den Hoven, G. van der Kolk, and A. van Rijsewijk, “Replacing paper contracts with ethereum smart contracts,” 2016.

[14] W. Banasik, S. Dziembowski, and D. Malinowski, “Efficient zero-knowledge contingent payments in cryptocurrencies without scripts,” in European Symposium on Research in Computer Security, pp. 261-280, Springer, 2016.

[15]   J. Yli-Huumo, D. Ko, S. Choi, S. Park, and K. Smolander, “Where is current research on blockchain technology?|a systematic review,” PloS one, vol. 11, no. 10, p. e0163477, 2016.

[16]   K. Bhargavan, A. Delignat-Lavaud, C. Fournet, A. Gollamudi, G. Gonthier, N. Kobeissi, N. Kulatova, A. Rastogi, T. Sibut-Pinote, N. Swamy, et al., “Formal verification of smart contracts: Short paper,” in Proceedings of the 2016 ACM Workshop on Programming Languages and Analysis for Security, pp. 91-96, ACM, 2016. International Journal of Computer Science & Information Technology (IJCSIT) Vol 9, No 5, October 2017 164

[17]   G. Bigi, A. Bracciali, G. Meacci, and E. Tuosto, “Validation of decentralised smart contracts through game theory and formal methods,” in Programming Languages with Applications to Biology and Security, pp. 142-161, Springer, 2015.

[18]   C. K. Frantz and M. Nowostawski, “From institutions to code: Towards automated generation of smart contracts,” in 2016 IEEE 1st International Workshops on Foundations and Applications of Self* Systems (FAS*W), pp. 210-215, IEEE, 2016.

[19]   B. Marino and A. Juels, “Setting standards for altering and undoing smart contracts,” in International Symposium on Rules and Rule Markup Languages for the Semantic Web, pp. 151-166, Springer, 2016.

[20]   T. Chen, X. Li, X. Luo, and X. Zhang, “Under-optimized smart contracts devour your money,” in 2017 IEEE 24th International Conference on Software Analysis, Evolution and Reengineering (SANER), pp. 442-446, IEEE, 2017.

[21] F. Idelberger, G. Governatori, R. Riveret, and G. Sartor, “Evaluation of logic-based smart contracts for blockchain systems,” in International Symposium on Rules and Rule Markup Languages for the Semantic Web,167-183, Springer, 2016.

[22]   C. Natoli and V. Gramoli, “The blockchain anomaly,” in 15th International Symposium on Network Computing and Applications (NCA), 310-317, IEEE, 2016.

[23]   L. Luu, D.-H. Chu, H. Olickel, P. Saxena, and A. Hobor, “Making smart contracts smarter,” in Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, CCS ’16, pp. 254-269, ACM, 2016.

[24]   A. Juels, A. Kosba, and E. Shi, “The ring of gyges: Investigating the future of criminal smart contracts,” in Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, CCS ’16, pp. 283-295, ACM, 2016.

[25]   F. Zhang, E. Cecchetti, K. Croman, A. Juels, and E. Shi, “Town crier: An authenticated data feed for smart contracts,” in Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, CCS ’16, pp. 270-282, ACM, 2016.

[26]   A. Kosba, A. Miller, E. Shi, Z. Wen, and C. Papamanthou, “Hawk: The blockchain model of cryptography and privacy-preserving smart contracts,” in 2016 IEEE Symposium on Security and Privacy (SP),839-858, IEEE, 2016.

[27]   H. Watanabe, S. Fujimura, A. Nakadaira, Y. Miyazaki, A. Akutsu, and J. J. Kishigami, “Blockchain contract: A complete consensus using blockchain,” in 2015 IEEE 4th Global Conference on Consumer Electronics (GCCE), pp. 577-578, IEEE, 2015.

[28]   M. Vukolić, “Rethinking permissioned blockchains,” in Proceedings of the ACM Workshop on Blockchain, Cryptocurrencies and Contracts, BCC ’17, pp. 3-7, ACM, 2017.

[29]   N. Atzei, M. Bartoletti, and T. Cimoli, “A survey of attacks on ethereum smart contracts (sok),” in International Conference on Principles of Security and Trust, pp. 164-186, Springer, 2017.

[30]   A. Bogner, M. Chanson, and A. Meeuw, “A decentralised sharing app running a smart contract on the ethereum blockchain,” in Proceedings of the 6th International Conference on the Internet of Things, pp. 177-178, ACM, 2016.

[31]   M. Al-Bassam, “Scpki: A smart contract-based pki and identity system,” in Proceedings of the ACM Workshop on Blockchain, Cryptocurrencies and Contracts, BCC ’17, pp. 35-40, ACM, 2017.

[32]   S. Huh, S. Cho, and S. Kim, “Managing IoT devices using blockchain platform,” in 2017 19th International Conference on Advanced Communication Technology (ICACT), pp. 464-467, IEEE, 2017.

[33]   P. N. Carrillo, C. I. Peña, and J. L. d. L. Rosa, “Eurakos next: a cryptocurrency based on smart contracts,” in Ebook: Artificial Intelligence Research and Development, vol. 288 of Frontiers in Artificial Intelligence and Applications, pp. 221-226, 2016.

[34]   H. Watanabe, S. Fujimura, A. Nakadaira, Y. Miyazaki, A. Akutsu, and J. Kishigami, “Blockchain contract: Securing a blockchain applied to smart contracts,” in 2016 IEEE International Conference on Consumer Electronics (ICCE), pp. 467-468, IEEE, 2016.

[35]   A. Third and J. Domingue, “Linked data indexing of distributed ledgers,” in Proceedings of the 26th International Conference on World Wide Web Companion, WWW ’17 Companion, pp. 1431-1436, 2017.

%d bloggers like this: