NFTs for the Unassailable Authentication of IoT Devices in Cyber-Physical Systems: An Implementation Study Article Swipe
YOU?
·
· 2025
· Open Access
·
· DOI: https://doi.org/10.1007/978-981-97-8588-9_9
In the rapidly evolving landscape of IoT-enabled smart devices, significant challenges persist in integration to web3, security, and data reliability. This research presents the design and integration of IoT assets, particularly devices, through the Novel Decentralized Smart City of Things (DSCoT) framework. ESP32 microcontrollers serve as Ethereum clients, generating Externally Owned Accounts (EOA) for device identification and authentication. Despite resource constraints, including limited computational capabilities, essential libraries that manage tasks such as Wi-Fi module control, interaction with Ethereum-based blockchains, TCP connection management, and EEPROM operations for persistent data storage. The code is structured with functions for Wi-Fi setup, TCP API requests, and secure communication challenges. Integration involves compiling and flashing the code onto ESP32 devices, verifying EOA generation, and mapping devices, fog nodes, and users through smart contract interactions. The deployment process culminates in the generation of Non-Fungible Tokens (NFTs) for user authentication, with transaction verification on the Goerli testnet confirming successful DSCoT edge system implementation. This research underscores the importance of secure and decentralized integration of IoT-enabled smart devices to the blockchain, enhancing performance while ensuring security and transparency.
Related Topics
- Type
- book-chapter
- Language
- en
- Landing Page
- https://doi.org/10.1007/978-981-97-8588-9_9
- OA Status
- hybrid
- Cited By
- 2
- References
- 9
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W4408971387
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W4408971387Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.1007/978-981-97-8588-9_9Digital Object Identifier
- Title
-
NFTs for the Unassailable Authentication of IoT Devices in Cyber-Physical Systems: An Implementation StudyWork title
- Type
-
book-chapterOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2025Year of publication
- Publication date
-
2025-01-01Full publication date if available
- Authors
-
Usman Khalil, Mueen Uddin, Hashem Alaidaros, Adnan AkhunzadaList of authors in order
- Landing page
-
https://doi.org/10.1007/978-981-97-8588-9_9Publisher landing page
- Open access
-
YesWhether a free full text is available
- OA status
-
hybridOpen access status per OpenAlex
- OA URL
-
https://doi.org/10.1007/978-981-97-8588-9_9Direct OA link when available
- Concepts
-
Internet of Things, Authentication (law), Computer science, Cyber-physical system, Computer security, Operating systemTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
2Total citation count in OpenAlex
- Citations by year (recent)
-
2025: 2Per-year citation counts (last 5 years)
- References (count)
-
9Number of works referenced by this work
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W4408971387 |
|---|---|
| doi | https://doi.org/10.1007/978-981-97-8588-9_9 |
| ids.doi | https://doi.org/10.1007/978-981-97-8588-9_9 |
| ids.openalex | https://openalex.org/W4408971387 |
| fwci | 27.04166607 |
| type | book-chapter |
| title | NFTs for the Unassailable Authentication of IoT Devices in Cyber-Physical Systems: An Implementation Study |
| biblio.issue | |
| biblio.volume | |
| biblio.last_page | 95 |
| biblio.first_page | 87 |
| topics[0].id | https://openalex.org/T12122 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 0.989799976348877 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1708 |
| topics[0].subfield.display_name | Hardware and Architecture |
| topics[0].display_name | Physical Unclonable Functions (PUFs) and Hardware Security |
| topics[1].id | https://openalex.org/T10763 |
| topics[1].field.id | https://openalex.org/fields/22 |
| topics[1].field.display_name | Engineering |
| topics[1].score | 0.9728999733924866 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/2209 |
| topics[1].subfield.display_name | Industrial and Manufacturing Engineering |
| topics[1].display_name | Digital Transformation in Industry |
| topics[2].id | https://openalex.org/T10917 |
| topics[2].field.id | https://openalex.org/fields/22 |
| topics[2].field.display_name | Engineering |
| topics[2].score | 0.9692000150680542 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/2207 |
| topics[2].subfield.display_name | Control and Systems Engineering |
| topics[2].display_name | Smart Grid Security and Resilience |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C81860439 |
| concepts[0].level | 2 |
| concepts[0].score | 0.7307209372520447 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q251212 |
| concepts[0].display_name | Internet of Things |
| concepts[1].id | https://openalex.org/C148417208 |
| concepts[1].level | 2 |
| concepts[1].score | 0.5675749778747559 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q4825882 |
| concepts[1].display_name | Authentication (law) |
| concepts[2].id | https://openalex.org/C41008148 |
| concepts[2].level | 0 |
| concepts[2].score | 0.5027191638946533 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[2].display_name | Computer science |
| concepts[3].id | https://openalex.org/C179768478 |
| concepts[3].level | 2 |
| concepts[3].score | 0.4467165172100067 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q1120057 |
| concepts[3].display_name | Cyber-physical system |
| concepts[4].id | https://openalex.org/C38652104 |
| concepts[4].level | 1 |
| concepts[4].score | 0.44485539197921753 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[4].display_name | Computer security |
| concepts[5].id | https://openalex.org/C111919701 |
| concepts[5].level | 1 |
| concepts[5].score | 0.0 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q9135 |
| concepts[5].display_name | Operating system |
| keywords[0].id | https://openalex.org/keywords/internet-of-things |
| keywords[0].score | 0.7307209372520447 |
| keywords[0].display_name | Internet of Things |
| keywords[1].id | https://openalex.org/keywords/authentication |
| keywords[1].score | 0.5675749778747559 |
| keywords[1].display_name | Authentication (law) |
| keywords[2].id | https://openalex.org/keywords/computer-science |
| keywords[2].score | 0.5027191638946533 |
| keywords[2].display_name | Computer science |
| keywords[3].id | https://openalex.org/keywords/cyber-physical-system |
| keywords[3].score | 0.4467165172100067 |
| keywords[3].display_name | Cyber-physical system |
| keywords[4].id | https://openalex.org/keywords/computer-security |
| keywords[4].score | 0.44485539197921753 |
| keywords[4].display_name | Computer security |
| language | en |
| locations[0].id | doi:10.1007/978-981-97-8588-9_9 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S4393920001 |
| locations[0].source.issn | 2948-2321, 2948-233X |
| locations[0].source.type | journal |
| locations[0].source.is_oa | False |
| locations[0].source.issn_l | 2948-2321 |
| locations[0].source.is_core | False |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | Proceedings in Technology Transfer |
| locations[0].source.host_organization | |
| locations[0].source.host_organization_name | |
| locations[0].license | cc-by |
| locations[0].pdf_url | |
| locations[0].version | publishedVersion |
| locations[0].raw_type | book-chapter |
| locations[0].license_id | https://openalex.org/licenses/cc-by |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | Proceedings in Technology Transfer |
| locations[0].landing_page_url | https://doi.org/10.1007/978-981-97-8588-9_9 |
| indexed_in | crossref |
| authorships[0].author.id | https://openalex.org/A5041284282 |
| authorships[0].author.orcid | https://orcid.org/0000-0001-8550-1557 |
| authorships[0].author.display_name | Usman Khalil |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Usman Khalil |
| authorships[0].is_corresponding | False |
| authorships[1].author.id | https://openalex.org/A5009473482 |
| authorships[1].author.orcid | https://orcid.org/0000-0003-1919-3407 |
| authorships[1].author.display_name | Mueen Uddin |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | Mueen Uddin |
| authorships[1].is_corresponding | False |
| authorships[2].author.id | https://openalex.org/A5076792537 |
| authorships[2].author.orcid | https://orcid.org/0009-0008-8585-2232 |
| authorships[2].author.display_name | Hashem Alaidaros |
| authorships[2].author_position | middle |
| authorships[2].raw_author_name | Hashem Alaidaros |
| authorships[2].is_corresponding | False |
| authorships[3].author.id | https://openalex.org/A5035884247 |
| authorships[3].author.orcid | https://orcid.org/0000-0001-8370-9290 |
| authorships[3].author.display_name | Adnan Akhunzada |
| authorships[3].author_position | last |
| authorships[3].raw_author_name | Adnan Akhunzada |
| authorships[3].is_corresponding | False |
| has_content.pdf | False |
| has_content.grobid_xml | False |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://doi.org/10.1007/978-981-97-8588-9_9 |
| open_access.oa_status | hybrid |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | NFTs for the Unassailable Authentication of IoT Devices in Cyber-Physical Systems: An Implementation Study |
| has_fulltext | False |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T12122 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 0.989799976348877 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1708 |
| primary_topic.subfield.display_name | Hardware and Architecture |
| primary_topic.display_name | Physical Unclonable Functions (PUFs) and Hardware Security |
| related_works | https://openalex.org/W4391375266, https://openalex.org/W2899084033, https://openalex.org/W2748952813, https://openalex.org/W4245926026, https://openalex.org/W3004173571, https://openalex.org/W4311097251, https://openalex.org/W2586548817, https://openalex.org/W2390279801, https://openalex.org/W2625093826, https://openalex.org/W2912135041 |
| cited_by_count | 2 |
| counts_by_year[0].year | 2025 |
| counts_by_year[0].cited_by_count | 2 |
| locations_count | 1 |
| best_oa_location.id | doi:10.1007/978-981-97-8588-9_9 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S4393920001 |
| best_oa_location.source.issn | 2948-2321, 2948-233X |
| best_oa_location.source.type | journal |
| best_oa_location.source.is_oa | False |
| best_oa_location.source.issn_l | 2948-2321 |
| best_oa_location.source.is_core | False |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | Proceedings in Technology Transfer |
| best_oa_location.source.host_organization | |
| best_oa_location.source.host_organization_name | |
| best_oa_location.license | cc-by |
| best_oa_location.pdf_url | |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | book-chapter |
| best_oa_location.license_id | https://openalex.org/licenses/cc-by |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | Proceedings in Technology Transfer |
| best_oa_location.landing_page_url | https://doi.org/10.1007/978-981-97-8588-9_9 |
| primary_location.id | doi:10.1007/978-981-97-8588-9_9 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S4393920001 |
| primary_location.source.issn | 2948-2321, 2948-233X |
| primary_location.source.type | journal |
| primary_location.source.is_oa | False |
| primary_location.source.issn_l | 2948-2321 |
| primary_location.source.is_core | False |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | Proceedings in Technology Transfer |
| primary_location.source.host_organization | |
| primary_location.source.host_organization_name | |
| primary_location.license | cc-by |
| primary_location.pdf_url | |
| primary_location.version | publishedVersion |
| primary_location.raw_type | book-chapter |
| primary_location.license_id | https://openalex.org/licenses/cc-by |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | Proceedings in Technology Transfer |
| primary_location.landing_page_url | https://doi.org/10.1007/978-981-97-8588-9_9 |
| publication_date | 2025-01-01 |
| publication_year | 2025 |
| referenced_works | https://openalex.org/W4312910482, https://openalex.org/W4388627210, https://openalex.org/W3157442617, https://openalex.org/W4307261645, https://openalex.org/W4285820598, https://openalex.org/W4312539212, https://openalex.org/W4223928424, https://openalex.org/W4381683668, https://openalex.org/W4392932846 |
| referenced_works_count | 9 |
| abstract_inverted_index.In | 1 |
| abstract_inverted_index.as | 46, 72 |
| abstract_inverted_index.in | 13, 134 |
| abstract_inverted_index.is | 92 |
| abstract_inverted_index.of | 6, 28, 39, 137, 162, 167 |
| abstract_inverted_index.on | 147 |
| abstract_inverted_index.to | 15, 171 |
| abstract_inverted_index.API | 100 |
| abstract_inverted_index.EOA | 117 |
| abstract_inverted_index.IoT | 29 |
| abstract_inverted_index.TCP | 80, 99 |
| abstract_inverted_index.The | 90, 130 |
| abstract_inverted_index.and | 18, 26, 57, 83, 102, 109, 119, 124, 164, 179 |
| abstract_inverted_index.fog | 122 |
| abstract_inverted_index.for | 54, 86, 96, 141 |
| abstract_inverted_index.the | 2, 24, 34, 111, 135, 148, 160, 172 |
| abstract_inverted_index.City | 38 |
| abstract_inverted_index.This | 21, 157 |
| abstract_inverted_index.code | 91, 112 |
| abstract_inverted_index.data | 19, 88 |
| abstract_inverted_index.edge | 154 |
| abstract_inverted_index.onto | 113 |
| abstract_inverted_index.such | 71 |
| abstract_inverted_index.that | 68 |
| abstract_inverted_index.user | 142 |
| abstract_inverted_index.with | 77, 94, 144 |
| abstract_inverted_index.(EOA) | 53 |
| abstract_inverted_index.DSCoT | 153 |
| abstract_inverted_index.ESP32 | 43, 114 |
| abstract_inverted_index.Novel | 35 |
| abstract_inverted_index.Owned | 51 |
| abstract_inverted_index.Smart | 37 |
| abstract_inverted_index.Wi-Fi | 73, 97 |
| abstract_inverted_index.serve | 45 |
| abstract_inverted_index.smart | 8, 127, 169 |
| abstract_inverted_index.tasks | 70 |
| abstract_inverted_index.users | 125 |
| abstract_inverted_index.web3, | 16 |
| abstract_inverted_index.while | 176 |
| abstract_inverted_index.(NFTs) | 140 |
| abstract_inverted_index.EEPROM | 84 |
| abstract_inverted_index.Goerli | 149 |
| abstract_inverted_index.Things | 40 |
| abstract_inverted_index.Tokens | 139 |
| abstract_inverted_index.design | 25 |
| abstract_inverted_index.device | 55 |
| abstract_inverted_index.manage | 69 |
| abstract_inverted_index.module | 74 |
| abstract_inverted_index.nodes, | 123 |
| abstract_inverted_index.secure | 103, 163 |
| abstract_inverted_index.setup, | 98 |
| abstract_inverted_index.system | 155 |
| abstract_inverted_index.(DSCoT) | 41 |
| abstract_inverted_index.Despite | 59 |
| abstract_inverted_index.assets, | 30 |
| abstract_inverted_index.devices | 170 |
| abstract_inverted_index.limited | 63 |
| abstract_inverted_index.mapping | 120 |
| abstract_inverted_index.persist | 12 |
| abstract_inverted_index.process | 132 |
| abstract_inverted_index.rapidly | 3 |
| abstract_inverted_index.testnet | 150 |
| abstract_inverted_index.through | 33, 126 |
| abstract_inverted_index.Abstract | 0 |
| abstract_inverted_index.Accounts | 52 |
| abstract_inverted_index.Ethereum | 47 |
| abstract_inverted_index.clients, | 48 |
| abstract_inverted_index.contract | 128 |
| abstract_inverted_index.control, | 75 |
| abstract_inverted_index.devices, | 9, 32, 115, 121 |
| abstract_inverted_index.ensuring | 177 |
| abstract_inverted_index.evolving | 4 |
| abstract_inverted_index.flashing | 110 |
| abstract_inverted_index.involves | 107 |
| abstract_inverted_index.presents | 23 |
| abstract_inverted_index.research | 22, 158 |
| abstract_inverted_index.resource | 60 |
| abstract_inverted_index.security | 178 |
| abstract_inverted_index.storage. | 89 |
| abstract_inverted_index.compiling | 108 |
| abstract_inverted_index.enhancing | 174 |
| abstract_inverted_index.essential | 66 |
| abstract_inverted_index.functions | 95 |
| abstract_inverted_index.including | 62 |
| abstract_inverted_index.landscape | 5 |
| abstract_inverted_index.libraries | 67 |
| abstract_inverted_index.requests, | 101 |
| abstract_inverted_index.security, | 17 |
| abstract_inverted_index.verifying | 116 |
| abstract_inverted_index.Externally | 50 |
| abstract_inverted_index.challenges | 11 |
| abstract_inverted_index.confirming | 151 |
| abstract_inverted_index.connection | 81 |
| abstract_inverted_index.culminates | 133 |
| abstract_inverted_index.deployment | 131 |
| abstract_inverted_index.framework. | 42 |
| abstract_inverted_index.generating | 49 |
| abstract_inverted_index.generation | 136 |
| abstract_inverted_index.importance | 161 |
| abstract_inverted_index.operations | 85 |
| abstract_inverted_index.persistent | 87 |
| abstract_inverted_index.structured | 93 |
| abstract_inverted_index.successful | 152 |
| abstract_inverted_index.Integration | 106 |
| abstract_inverted_index.IoT-enabled | 7, 168 |
| abstract_inverted_index.blockchain, | 173 |
| abstract_inverted_index.challenges. | 105 |
| abstract_inverted_index.generation, | 118 |
| abstract_inverted_index.integration | 14, 27, 166 |
| abstract_inverted_index.interaction | 76 |
| abstract_inverted_index.management, | 82 |
| abstract_inverted_index.performance | 175 |
| abstract_inverted_index.significant | 10 |
| abstract_inverted_index.transaction | 145 |
| abstract_inverted_index.underscores | 159 |
| abstract_inverted_index.Non-Fungible | 138 |
| abstract_inverted_index.blockchains, | 79 |
| abstract_inverted_index.constraints, | 61 |
| abstract_inverted_index.particularly | 31 |
| abstract_inverted_index.reliability. | 20 |
| abstract_inverted_index.verification | 146 |
| abstract_inverted_index.Decentralized | 36 |
| abstract_inverted_index.capabilities, | 65 |
| abstract_inverted_index.communication | 104 |
| abstract_inverted_index.computational | 64 |
| abstract_inverted_index.decentralized | 165 |
| abstract_inverted_index.interactions. | 129 |
| abstract_inverted_index.transparency. | 180 |
| abstract_inverted_index.Ethereum-based | 78 |
| abstract_inverted_index.identification | 56 |
| abstract_inverted_index.authentication, | 143 |
| abstract_inverted_index.authentication. | 58 |
| abstract_inverted_index.implementation. | 156 |
| abstract_inverted_index.microcontrollers | 44 |
| cited_by_percentile_year.max | 97 |
| cited_by_percentile_year.min | 95 |
| countries_distinct_count | 0 |
| institutions_distinct_count | 4 |
| citation_normalized_percentile.value | 0.98256538 |
| citation_normalized_percentile.is_in_top_1_percent | True |
| citation_normalized_percentile.is_in_top_10_percent | True |