1. Y. Salami and V. Khajehvand, “SMAK-IOV: Secure Mutual Authentication Scheme and Key Exchange Protocol in Fog Based IoV,” J. Comput. Robot., vol. 13, no. 1, pp. 11–20, 2020.
2. A. Ghaffari, “Designing a wireless sensor network for ocean status notification system,” Indian J. Sci. Technol., vol. 7, no. 6, p. 809, 2014.
3. A. Ghaffari, “Congestion control mechanisms in wireless sensor networks: A survey,” J. Netw. Comput. Appl., vol. 52, pp. 101–115, 2015.
4. S. K. Mousavi, A. Ghaffari, S. Besharat, and H. Afshari, “Security of internet of things based on cryptographic algorithms: a survey,” Wirel. Networks, vol. 27, pp. 1515–1555, 2021.
5. Y. Salami, V. Khajevand, and E. Zeinali, “Cryptographic Algorithms: A Review of the Literature, Weaknesses and Open Challenges,” J. Comput. Robot., vol. 16, no. 2, pp. 46–56, 2023.
6. Y. Salami, F. Taherkhani, Y. Ebazadeh, M. Nemati, V. Khajehvand, and E. Zeinali, “Blockchain-Based Internet of Vehicles in Green Smart City: Applications and Challenges and Solutions,” Anthropog. Pollut., vol. 7, no. 1, 2023.
7. H. Han, R. K. Shiwakoti, R. Jarvis, C. Mordi, and D. Botchie, “Accounting and auditing with blockchain technology and artificial Intelligence: A literature review,” Int. J. Account. Inf. Syst., vol. 48, p. 100598, 2023.
8. T. Huynh-The et al., “Blockchain for the metaverse: A Review,” Futur. Gener. Comput. Syst., 2023.
9. A. Pasdar, Y. C. Lee, and Z. Dong, “Connect API with blockchain: A survey on blockchain oracle implementation,” ACM Comput. Surv., vol. 55, no. 10, pp. 1–39, 2023.
10. T. M. Tan and S. Saraniemi, “Trust in blockchain-enabled exchanges: Future directions in blockchain marketing,” J. Acad. Mark. Sci., vol. 51, no. 4, pp. 914–939, 2023.
11. A. Ouaddah, A. Abou Elkalam, and A. Ait Ouahman, “FairAccess: a new Blockchain-based access control framework for the Internet of Things,” Secur. Commun. Networks, vol. 9, no. 18, pp. 5943–5964, 2016, doi: 10.1002/sec.1748.
12. S. H. Hashemi, F. Faghri, P. Rausch, and R. H. Campbell, “World of empowered IoT users,” Proc. - 2016 IEEE 1st Int. Conf. Internet-of-Things Des. Implementation, IoTDI 2016, pp. 13–24, 2016, doi: 10.1109/IoTDI.2015.39.
13. K. Christidis and M. Devetsikiotis, “Blockchains and Smart Contracts for the Internet of Things,” IEEE Access, vol. 4, pp. 2292–2303, 2016, doi: 10.1109/ACCESS.2016.2566339.
14. A. Dorri, S. S. Kanhere, R. Jurdak, and P. Gauravaram, “LSB: A Lightweight Scalable Blockchain for IoT security and anonymity,” J. Parallel Distrib. Comput., vol. 134, pp. 180–197, 2019, doi: 10.1016/j.jpdc.2019.08.005.
15. K. R. Özyilmaz and A. Yurdakul, “Work-in-progress: Integrating low-power IoT devices to a Blockchain-Based Infrastructure,” Proc. 13th ACM Int. Conf. Embed. Softw. 2017 Companion, EMSOFT 2017, 2017, doi: 10.1145/3125503.3125628.
16. M. K. Kebede and S. K. Pani, “Reshaping IOT Through Blockchain,” Proc. 3rd Int. Conf. I-SMAC IoT Soc. Mobile, Anal. Cloud, I-SMAC 2019, pp. 1–5, 2019, doi: 10.1109/I-SMAC47947.2019.9032442.
17. O. Novo, “Blockchain meets IoT: An architecture for scalable access management in IoT,” IEEE internet things J., vol. 5, no. 2, pp. 1184–1195, 2018.
18. M. T. Hammi, B. Hammi, P. Bellot, and A. Serhrouchni, “Bubbles of Trust: A decentralized blockchain-based authentication system for IoT,” Comput. Secur., vol. 78, pp. 126–142, 2018, doi: 10.1016/j.cose.2018.06.004.
19. S. C. Cha, J. F. Chen, C. Su, and K. H. Yeh, “A Blockchain Connected Gateway for BLE-Based Devices in the Internet of Things,” IEEE Access, vol. 6, no. c, pp. 24639–24649, 2018, doi: 10.1109/ACCESS.2018.2799942.
20. S. Rostampour, M. Safkhani, Y. Bendavid, and N. Bagheri, “ECCbAP: A secure ECC-based authentication protocol for IoT edge devices,” Pervasive Mob. Comput., vol. 67, p. 101194, 2020, doi: 10.1016/j.pmcj.2020.101194.
21. M. Yavari, M. Safkhani, S. Kumari, S. Kumar, and C. M. Chen, “An Improved Blockchain-Based Authentication Protocol for IoT Network Management,” Secur. Commun. Networks, vol. 2020, 2020, doi: 10.1155/2020/8836214.
22. Y. Salami, Y. Ebazadeh, and V. Khajehvand, “CE-SKE: cost-effective secure key exchange scheme in Fog Federation,” Iran J. Comput. Sci., vol. 4, no. 3, pp. 1–13, 2021.
23. Y. Salami and V. Khajehvand, “LSKE: Lightweight Secure Key Exchange Scheme in Fog Federation,” Complexity, vol. 2021, p. 4667586, 2021.
24. Y. Salami, V. Khajehvand, and E. Zeinali, “SAIFC: A Secure Authentication Scheme for IOV Based on Fog-Cloud Federation,” Secur. Commun. Networks, vol. 1, 2023.
25. Y. Salami, V. Khajehvand, and E. Zeinali, “SOS-FCI: a secure offloading scheme in fog–cloud-based IoT,” J. Supercomput., pp. 1–31, 2023. “Avispa.” http://www.avispa-project.org/
26. Y. Salami, V. Khajehvand, and E. Zeinali, “E3C: A Tool for Evaluating Communication and Computation Costs in Authentication and Key Exchange Protocol,” 2022, doi: 10.48550/ARXIV.2212.03308.
27. D. Von Oheimb, “The high-level protocol specification language HLPSL developed in the EU project AVISPA,” in Proceedings of APPSEM 2005 workshop, 2005, pp. 1–17.
28. R. Küsters and T. Wilke, “Automata-Based Analysis of Recursive Cryptographic Protocols,” in STACS 2004, 2004, pp. 382–393.