{"id":"https://openalex.org/W4408520386","doi":"https://doi.org/10.1007/s43926-025-00117-5","title":"Energy optimization using adaptive control algorithm to enhance the performance of SDN_IOT environment","display_name":"Energy optimization using adaptive control algorithm to enhance the performance of SDN_IOT environment","publication_year":2025,"publication_date":"2025-03-17","ids":{"openalex":"https://openalex.org/W4408520386","doi":"https://doi.org/10.1007/s43926-025-00117-5"},"language":"en","primary_location":{"id":"doi:10.1007/s43926-025-00117-5","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s43926-025-00117-5","pdf_url":"https://link.springer.com/content/pdf/10.1007/s43926-025-00117-5.pdf","source":{"id":"https://openalex.org/S4210230675","display_name":"Discover Internet of Things","issn_l":"2730-7239","issn":["2730-7239"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Discover Internet of Things","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://link.springer.com/content/pdf/10.1007/s43926-025-00117-5.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5011970867","display_name":"I. Varalakshmi","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"I. Varalakshmi","raw_affiliation_strings":["Department of CSE, Puducherry Technological University, Puducherry, India"],"affiliations":[{"raw_affiliation_string":"Department of CSE, Puducherry Technological University, Puducherry, India","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101694353","display_name":"M. Thenmozhi","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"M. Thenmozhi","raw_affiliation_strings":["Department of CSE, Puducherry Technological University, Puducherry, India"],"affiliations":[{"raw_affiliation_string":"Department of CSE, Puducherry Technological University, Puducherry, India","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5011970867"],"corresponding_institution_ids":[],"apc_list":{"value":990,"currency":"EUR","value_usd":1067},"apc_paid":{"value":990,"currency":"EUR","value_usd":1067},"fwci":9.5045,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.97627389,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":99},"biblio":{"volume":"5","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.996399998664856,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.6629266738891602},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6490728855133057},{"id":"https://openalex.org/keywords/energy","display_name":"Energy (signal processing)","score":0.516402542591095},{"id":"https://openalex.org/keywords/optimization-algorithm","display_name":"Optimization algorithm","score":0.5041106939315796},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.46908631920814514},{"id":"https://openalex.org/keywords/energy-minimization","display_name":"Energy minimization","score":0.45794031023979187},{"id":"https://openalex.org/keywords/adaptive-control","display_name":"Adaptive control","score":0.4186760187149048},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.372018039226532},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.35029137134552},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.2888697385787964},{"id":"https://openalex.org/keywords/mathematical-optimization","display_name":"Mathematical optimization","score":0.20239466428756714},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.18478360772132874},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.08522602915763855}],"concepts":[{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.6629266738891602},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6490728855133057},{"id":"https://openalex.org/C186370098","wikidata":"https://www.wikidata.org/wiki/Q442787","display_name":"Energy (signal processing)","level":2,"score":0.516402542591095},{"id":"https://openalex.org/C2987595161","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Optimization algorithm","level":2,"score":0.5041106939315796},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.46908631920814514},{"id":"https://openalex.org/C14961307","wikidata":"https://www.wikidata.org/wiki/Q5377176","display_name":"Energy minimization","level":2,"score":0.45794031023979187},{"id":"https://openalex.org/C107464732","wikidata":"https://www.wikidata.org/wiki/Q235781","display_name":"Adaptive control","level":3,"score":0.4186760187149048},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.372018039226532},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.35029137134552},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.2888697385787964},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.20239466428756714},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.18478360772132874},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.08522602915763855},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C147597530","wikidata":"https://www.wikidata.org/wiki/Q369472","display_name":"Computational chemistry","level":1,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/s43926-025-00117-5","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s43926-025-00117-5","pdf_url":"https://link.springer.com/content/pdf/10.1007/s43926-025-00117-5.pdf","source":{"id":"https://openalex.org/S4210230675","display_name":"Discover Internet of Things","issn_l":"2730-7239","issn":["2730-7239"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Discover Internet of Things","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:30d4ef9886154c0fa1410361458a60d1","is_oa":true,"landing_page_url":"https://doaj.org/article/30d4ef9886154c0fa1410361458a60d1","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Discover Internet of Things, Vol 5, Iss 1, Pp 1-27 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1007/s43926-025-00117-5","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s43926-025-00117-5","pdf_url":"https://link.springer.com/content/pdf/10.1007/s43926-025-00117-5.pdf","source":{"id":"https://openalex.org/S4210230675","display_name":"Discover Internet of Things","issn_l":"2730-7239","issn":["2730-7239"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Discover Internet of Things","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/7","display_name":"Affordable and clean energy","score":0.8100000023841858}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4408520386.pdf"},"referenced_works_count":40,"referenced_works":["https://openalex.org/W2755021152","https://openalex.org/W2859928566","https://openalex.org/W2892142441","https://openalex.org/W2905728252","https://openalex.org/W2966509902","https://openalex.org/W2971560180","https://openalex.org/W2982803081","https://openalex.org/W3022315855","https://openalex.org/W3036012999","https://openalex.org/W3036317259","https://openalex.org/W3047284900","https://openalex.org/W3113003998","https://openalex.org/W3121284007","https://openalex.org/W3171802458","https://openalex.org/W3172174732","https://openalex.org/W3176742893","https://openalex.org/W3198861897","https://openalex.org/W3209426098","https://openalex.org/W3212789951","https://openalex.org/W3215859200","https://openalex.org/W4200461438","https://openalex.org/W4210583940","https://openalex.org/W4220656594","https://openalex.org/W4220885173","https://openalex.org/W4224939697","https://openalex.org/W4229332384","https://openalex.org/W4234078321","https://openalex.org/W4283762958","https://openalex.org/W4289530011","https://openalex.org/W4290047857","https://openalex.org/W4293182269","https://openalex.org/W4312518317","https://openalex.org/W4313415198","https://openalex.org/W4313891707","https://openalex.org/W4317813238","https://openalex.org/W4319790131","https://openalex.org/W4322770678","https://openalex.org/W4323338365","https://openalex.org/W4365509004","https://openalex.org/W4381053814"],"related_works":["https://openalex.org/W4245926026","https://openalex.org/W4311097251","https://openalex.org/W2586548817","https://openalex.org/W2625093826","https://openalex.org/W4200598720","https://openalex.org/W2921026492","https://openalex.org/W4247463117","https://openalex.org/W4361251261","https://openalex.org/W3031181660","https://openalex.org/W4401111000"],"abstract_inverted_index":{"Cybersecurity":[0],"attacks":[1,62,74,85],"are":[2,37],"evolving":[3],"against":[4],"the":[5,10,16,24,27,46,50,65,68,73,87,91,95,99,108,115,122,129,165],"normal":[6],"flow":[7],"oftraffic/data":[8],"in":[9],"network.":[11],"The":[12,30,79,126,147,175,204],"information":[13],"stolen":[14],"by":[15,94,134,152,157,181,186,192,216],"intruders/attackers":[17],"can":[18],"interrupt":[19],"network":[20,66,100,112,145,209],"services":[21],"and":[22,71,81,114,142,163,188,211],"compromise":[23],"integrity":[25],"of":[26,40,83,111,117,124,128,195,201],"IoT":[28],"devices.":[29],"most":[31],"prevalent":[32],"extortions":[33],"to":[34,98,120,161,169,172,198,207],"SDN-IoT":[35,144,227],"networks":[36],"Distributed":[38],"Denial":[39],"Service":[41],"(DDoS)":[42],"attacks,":[43],"which":[44,196],"flood":[45],"attack":[47,140],"request":[48],"until":[49],"server/device":[51],"crashes/shuts":[52],"down.":[53],"This":[54,105],"paper":[55],"presents":[56],"an":[57],"algorithm":[58],"for":[59,225],"detecting":[60],"DDoS":[61,84,202],"earlier":[63,75],"from":[64,86],"using":[67,76,101],"entropy":[69],"method":[70],"mitigating":[72],"stochastic":[77],"techniques.":[78,104],"detection":[80,155,184],"mitigation":[82,200],"SDN_IoT":[88],"environment":[89],"calculates":[90],"energy":[92,150],"utilized":[93],"devices":[96],"connected":[97],"Adaptive":[102],"optimization":[103],"technique":[106],"concludes":[107],"optimum":[109],"dissemination":[110],"resources":[113],"deployment":[116],"defense":[118],"mechanisms":[119],"mitigate":[121],"control":[123],"attacks.":[125,203],"efficacy":[127],"suggested":[130,176],"approach":[131,177],"is":[132,214],"proven":[133],"comprehensive":[135],"simulations":[136],"that":[137],"use":[138,191],"realistic":[139],"scenarios":[141],"representative":[143],"topologies.":[146],"system":[148],"reduces":[149,189],"consumption":[151,213],"18%,":[153],"improves":[154,179],"accuracy":[156],"2%":[158],"(from":[159],"97.5%":[160],"99.4%),":[162],"lowers":[164],"false":[166],"positive":[167],"rate":[168],"0.01%":[170],"compared":[171],"existing":[173],"algorithms.":[174],"also":[178],"throughput":[180],"2.6%,":[182],"decreases":[183],"time":[185],"70%,":[187],"CPU":[190],"15%,":[193],"all":[194],"contribute":[197],"quicker":[199],"method\u2019s":[205],"capacity":[206],"optimize":[208],"security":[210],"resource":[212],"shown":[215],"these":[217],"results,":[218],"establishing":[219],"it":[220],"as":[221],"a":[222],"strong":[223],"option":[224],"safeguarding":[226],"systems.":[228]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":4}],"updated_date":"2026-03-17T17:19:04.345684","created_date":"2025-10-10T00:00:00"}
