{"id":"https://openalex.org/W4414970631","doi":"https://doi.org/10.1002/itl2.70160","title":"Secure Data Routing and Authentication Framework With Privacy Preservation for Multimedia Sensor Environments","display_name":"Secure Data Routing and Authentication Framework With Privacy Preservation for Multimedia Sensor Environments","publication_year":2025,"publication_date":"2025-10-08","ids":{"openalex":"https://openalex.org/W4414970631","doi":"https://doi.org/10.1002/itl2.70160"},"language":"en","primary_location":{"id":"doi:10.1002/itl2.70160","is_oa":false,"landing_page_url":"https://doi.org/10.1002/itl2.70160","pdf_url":null,"source":{"id":"https://openalex.org/S4210238311","display_name":"Internet Technology Letters","issn_l":"2476-1508","issn":["2476-1508"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Internet Technology Letters","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5012789710","display_name":"Rami Baazeem","orcid":"https://orcid.org/0009-0000-7845-705X"},"institutions":[{"id":"https://openalex.org/I4210099699","display_name":"University of Jeddah","ror":"https://ror.org/015ya8798","country_code":"SA","type":"education","lineage":["https://openalex.org/I4210099699"]},{"id":"https://openalex.org/I4210165529","display_name":"University of Business and Technology","ror":"https://ror.org/05tcr1n44","country_code":"SA","type":"education","lineage":["https://openalex.org/I4210165529"]}],"countries":["SA"],"is_corresponding":true,"raw_author_name":"Rami Baazeem","raw_affiliation_strings":["Department of Management Information Systems (MIS) College of Business, University of Jeddah  Jeddah Makkah Kingdom of Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Department of Management Information Systems (MIS) College of Business, University of Jeddah  Jeddah Makkah Kingdom of Saudi Arabia","institution_ids":["https://openalex.org/I4210099699","https://openalex.org/I4210165529"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5012789710"],"corresponding_institution_ids":["https://openalex.org/I4210099699","https://openalex.org/I4210165529"],"apc_list":{"value":2630,"currency":"USD","value_usd":2630},"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.33010459,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"8","issue":"6","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9952999949455261,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6705999970436096},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.5457000136375427},{"id":"https://openalex.org/keywords/throughput","display_name":"Throughput","score":0.5310999751091003},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.5257999897003174},{"id":"https://openalex.org/keywords/routing","display_name":"Routing (electronic design automation)","score":0.5214999914169312},{"id":"https://openalex.org/keywords/certificate","display_name":"Certificate","score":0.4871000051498413},{"id":"https://openalex.org/keywords/secure-transmission","display_name":"Secure transmission","score":0.48420000076293945},{"id":"https://openalex.org/keywords/certification","display_name":"Certification","score":0.46480000019073486},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4442000091075897},{"id":"https://openalex.org/keywords/certificate-authority","display_name":"Certificate authority","score":0.421099990606308}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7132999897003174},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6992999911308289},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6705999970436096},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.5457000136375427},{"id":"https://openalex.org/C157764524","wikidata":"https://www.wikidata.org/wiki/Q1383412","display_name":"Throughput","level":3,"score":0.5310999751091003},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.5257999897003174},{"id":"https://openalex.org/C74172769","wikidata":"https://www.wikidata.org/wiki/Q1446839","display_name":"Routing (electronic design automation)","level":2,"score":0.5214999914169312},{"id":"https://openalex.org/C96865113","wikidata":"https://www.wikidata.org/wiki/Q2946816","display_name":"Certificate","level":2,"score":0.4871000051498413},{"id":"https://openalex.org/C2779814227","wikidata":"https://www.wikidata.org/wiki/Q7444882","display_name":"Secure transmission","level":3,"score":0.48420000076293945},{"id":"https://openalex.org/C46304622","wikidata":"https://www.wikidata.org/wiki/Q374814","display_name":"Certification","level":2,"score":0.46480000019073486},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4442000091075897},{"id":"https://openalex.org/C93636275","wikidata":"https://www.wikidata.org/wiki/Q196776","display_name":"Certificate authority","level":4,"score":0.421099990606308},{"id":"https://openalex.org/C167529545","wikidata":"https://www.wikidata.org/wiki/Q274758","display_name":"Public key certificate","level":4,"score":0.4097000062465668},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.40860000252723694},{"id":"https://openalex.org/C2780165032","wikidata":"https://www.wikidata.org/wiki/Q16869822","display_name":"Energy consumption","level":2,"score":0.38280001282691956},{"id":"https://openalex.org/C557945733","wikidata":"https://www.wikidata.org/wiki/Q389772","display_name":"Data transmission","level":2,"score":0.364300012588501},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.35740000009536743},{"id":"https://openalex.org/C2742236","wikidata":"https://www.wikidata.org/wiki/Q924713","display_name":"Efficient energy use","level":2,"score":0.3431999981403351},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.3303999900817871},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.3260999917984009},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.3061999976634979},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.3027999997138977},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.2996000051498413},{"id":"https://openalex.org/C10558101","wikidata":"https://www.wikidata.org/wiki/Q689855","display_name":"Smart grid","level":2,"score":0.2985000014305115},{"id":"https://openalex.org/C104954878","wikidata":"https://www.wikidata.org/wiki/Q1648707","display_name":"Routing protocol","level":3,"score":0.29760000109672546},{"id":"https://openalex.org/C205383636","wikidata":"https://www.wikidata.org/wiki/Q14746","display_name":"Merkle tree","level":4,"score":0.2874000072479248},{"id":"https://openalex.org/C72648740","wikidata":"https://www.wikidata.org/wiki/Q658476","display_name":"Public key infrastructure","level":4,"score":0.2840999960899353},{"id":"https://openalex.org/C510870077","wikidata":"https://www.wikidata.org/wiki/Q7444868","display_name":"Secure communication","level":3,"score":0.2736000120639801},{"id":"https://openalex.org/C141492731","wikidata":"https://www.wikidata.org/wiki/Q1052621","display_name":"Message authentication code","level":3,"score":0.26899999380111694},{"id":"https://openalex.org/C41971633","wikidata":"https://www.wikidata.org/wiki/Q6398155","display_name":"Key distribution in wireless sensor networks","level":4,"score":0.267300009727478},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.26260000467300415},{"id":"https://openalex.org/C111185680","wikidata":"https://www.wikidata.org/wiki/Q3866206","display_name":"Sensor node","level":5,"score":0.25360000133514404},{"id":"https://openalex.org/C32455479","wikidata":"https://www.wikidata.org/wiki/Q506053","display_name":"Kerberos","level":3,"score":0.250900000333786}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1002/itl2.70160","is_oa":false,"landing_page_url":"https://doi.org/10.1002/itl2.70160","pdf_url":null,"source":{"id":"https://openalex.org/S4210238311","display_name":"Internet Technology Letters","issn_l":"2476-1508","issn":["2476-1508"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Internet Technology Letters","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W1997409447","https://openalex.org/W2102448152","https://openalex.org/W2122360134","https://openalex.org/W2135988418","https://openalex.org/W2163154960","https://openalex.org/W2768878000","https://openalex.org/W2783889983","https://openalex.org/W4248297870","https://openalex.org/W4300775190","https://openalex.org/W4311988202","https://openalex.org/W4312204604","https://openalex.org/W4381082023","https://openalex.org/W4390264306","https://openalex.org/W4399849582","https://openalex.org/W4401692208"],"related_works":[],"abstract_inverted_index":{"ABSTRACT":[0],"Multimedia":[1],"Wireless":[2],"Sensor":[3],"Networks":[4],"(MWSNs)":[5],"form":[6],"a":[7,32,47,59],"crucial":[8],"backbone":[9],"of":[10],"smart":[11,154],"cities,":[12],"enabling":[13],"real\u2010time":[14],"data":[15,29],"collection":[16],"and":[17,27,39,50,67,78,89,95,104,110,123,142],"communication":[18],"across":[19],"diverse":[20],"applications.":[21],"However,":[22],"ensuring":[23,107],"secure":[24,153],"routing,":[25],"authentication,":[26,106],"efficient":[28],"transmission":[30],"remains":[31],"major":[33],"challenge":[34],"due":[35],"to":[36,41,92,146],"limited":[37],"resources":[38],"susceptibility":[40],"malicious":[42,125],"attacks.":[43,114],"This":[44],"study":[45],"proposes":[46],"trust\u2010based":[48],"routing":[49],"authentication":[51],"framework":[52,131],"that":[53,128],"integrates":[54],"lightweight":[55],"cryptographic":[56],"mechanisms":[57],"with":[58,119],"three\u2010phase":[60],"certification":[61,137],"process":[62],"involving":[63],"key":[64],"generation,":[65],"encryption,":[66],"decryption.":[68],"A":[69],"Trust":[70],"Authority":[71],"(TA)":[72],"manages":[73],"node":[74],"registration,":[75],"certificate":[76],"issuance,":[77],"revocation,":[79],"while":[80],"cluster":[81],"head":[82],"(CH)":[83],"selection":[84],"is":[85],"optimized":[86],"using":[87],"energy":[88,97,140],"distance\u2010based":[90],"formulations":[91],"balance":[93],"load":[94],"reduce":[96],"consumption.":[98],"The":[99],"model":[100],"employs":[101],"both":[102],"identification\u2010based":[103],"control\u2010packet":[105],"confidentiality,":[108],"non\u2010repudiation,":[109],"protection":[111],"against":[112],"internal":[113],"Experimental":[115],"evaluation":[116],"on":[117],"MATLAB":[118],"100\u2013500":[120],"sensor":[121],"nodes":[122],"varying":[124],"ratios":[126],"demonstrates":[127],"the":[129],"proposed":[130],"achieves":[132],"higher":[133],"detection":[134],"accuracy,":[135],"lower":[136],"delay,":[138],"reduced":[139],"consumption,":[141],"improved":[143],"throughput":[144],"compared":[145],"existing":[147],"approaches,":[148],"making":[149],"it":[150],"suitable":[151],"for":[152],"city":[155],"deployments.":[156]},"counts_by_year":[],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
