{"id":"https://openalex.org/W4416234936","doi":"https://doi.org/10.1007/978-3-032-10466-3_13","title":"QoSmart-IoT: Secure QoS-Based Reconfiguration and\u00a0Protocol Adaptation for\u00a0Hybrid Clustered IoT Systems in\u00a0Constrained Environments","display_name":"QoSmart-IoT: Secure QoS-Based Reconfiguration and\u00a0Protocol Adaptation for\u00a0Hybrid Clustered IoT Systems in\u00a0Constrained Environments","publication_year":2025,"publication_date":"2025-11-15","ids":{"openalex":"https://openalex.org/W4416234936","doi":"https://doi.org/10.1007/978-3-032-10466-3_13"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-032-10466-3_13","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-032-10466-3_13","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5118744227","display_name":"Osama Dighriri","orcid":"https://orcid.org/0000-0002-1917-0275"},"institutions":[{"id":"https://openalex.org/I114017466","display_name":"University of Technology Sydney","ror":"https://ror.org/03f0f6041","country_code":"AU","type":"education","lineage":["https://openalex.org/I114017466"]},{"id":"https://openalex.org/I91450128","display_name":"Jazan University","ror":"https://ror.org/02bjnq803","country_code":"SA","type":"education","lineage":["https://openalex.org/I91450128"]}],"countries":["AU","SA"],"is_corresponding":true,"raw_author_name":"Osama Dighriri","raw_affiliation_strings":["Department of Computer Science, College of Engineering and Computer Science, Jazan University, Jazan, Saudi Arabia","School of Electrical and Data Engineering, Faculty of Engineering and IT, University of Technology Sydney, Ultimo, Australia"],"raw_orcid":"https://orcid.org/0000-0002-1917-0275","affiliations":[{"raw_affiliation_string":"Department of Computer Science, College of Engineering and Computer Science, Jazan University, Jazan, Saudi Arabia","institution_ids":["https://openalex.org/I91450128"]},{"raw_affiliation_string":"School of Electrical and Data Engineering, Faculty of Engineering and IT, University of Technology Sydney, Ultimo, Australia","institution_ids":["https://openalex.org/I114017466"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5045431254","display_name":"Priyadarsi Nanda","orcid":"https://orcid.org/0000-0002-5748-155X"},"institutions":[{"id":"https://openalex.org/I114017466","display_name":"University of Technology Sydney","ror":"https://ror.org/03f0f6041","country_code":"AU","type":"education","lineage":["https://openalex.org/I114017466"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Priyadarsi Nanda","raw_affiliation_strings":["School of Electrical and Data Engineering, Faculty of Engineering and IT, University of Technology Sydney, Ultimo, Australia"],"raw_orcid":"https://orcid.org/0000-0002-5748-155X","affiliations":[{"raw_affiliation_string":"School of Electrical and Data Engineering, Faculty of Engineering and IT, University of Technology Sydney, Ultimo, Australia","institution_ids":["https://openalex.org/I114017466"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5019420922","display_name":"Manoranjan Mohanty","orcid":"https://orcid.org/0000-0002-0258-4586"},"institutions":[{"id":"https://openalex.org/I4210089979","display_name":"Carnegie Mellon University Qatar","ror":"https://ror.org/00az5dt38","country_code":"QA","type":"education","lineage":["https://openalex.org/I4210089979","https://openalex.org/I74973139"]}],"countries":["QA"],"is_corresponding":false,"raw_author_name":"Manoranjan Mohanty","raw_affiliation_strings":["School of Information Systems, Carnegie Mellon University, Doha, Qatar"],"raw_orcid":"https://orcid.org/0000-0002-0258-4586","affiliations":[{"raw_affiliation_string":"School of Information Systems, Carnegie Mellon University, Doha, Qatar","institution_ids":["https://openalex.org/I4210089979"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5086258433","display_name":"Bashair Alrashed","orcid":"https://orcid.org/0000-0002-7393-5355"},"institutions":[{"id":"https://openalex.org/I114017466","display_name":"University of Technology Sydney","ror":"https://ror.org/03f0f6041","country_code":"AU","type":"education","lineage":["https://openalex.org/I114017466"]},{"id":"https://openalex.org/I4210099699","display_name":"University of Jeddah","ror":"https://ror.org/015ya8798","country_code":"SA","type":"education","lineage":["https://openalex.org/I4210099699"]}],"countries":["AU","SA"],"is_corresponding":false,"raw_author_name":"Bashair Alrashed","raw_affiliation_strings":["College of Computer Science and Engineering, University of Jeddah, Jeddah, Saudi Arabia","School of Electrical and Data Engineering, Faculty of Engineering and IT, University of Technology Sydney, Ultimo, Australia"],"raw_orcid":"https://orcid.org/0000-0002-7393-5355","affiliations":[{"raw_affiliation_string":"College of Computer Science and Engineering, University of Jeddah, Jeddah, Saudi Arabia","institution_ids":["https://openalex.org/I4210099699"]},{"raw_affiliation_string":"School of Electrical and Data Engineering, Faculty of Engineering and IT, University of Technology Sydney, Ultimo, Australia","institution_ids":["https://openalex.org/I114017466"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5098485733","display_name":"Ibrahim Haddadi","orcid":"https://orcid.org/0000-0002-7557-4258"},"institutions":[{"id":"https://openalex.org/I23075662","display_name":"Taibah University","ror":"https://ror.org/01xv1nn60","country_code":"SA","type":"education","lineage":["https://openalex.org/I23075662"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Ibrahim Haddadi","raw_affiliation_strings":["Department of Computer Engineering, College of Computer Science and Engineering, Taibah University, Medinah, Saudi Arabia"],"raw_orcid":"https://orcid.org/0000-0002-7557-4258","affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, College of Computer Science and Engineering, Taibah University, Medinah, Saudi Arabia","institution_ids":["https://openalex.org/I23075662"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5118744227"],"corresponding_institution_ids":["https://openalex.org/I114017466","https://openalex.org/I91450128"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.72251917,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"153","last_page":"165"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.7592999935150146,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.7592999935150146,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.07360000163316727,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12079","display_name":"IoT Networks and Protocols","score":0.0210999995470047,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cluster-analysis","display_name":"Cluster analysis","score":0.6438000202178955},{"id":"https://openalex.org/keywords/quality-of-service","display_name":"Quality of service","score":0.5746999979019165},{"id":"https://openalex.org/keywords/adaptability","display_name":"Adaptability","score":0.5099999904632568},{"id":"https://openalex.org/keywords/control-reconfiguration","display_name":"Control reconfiguration","score":0.47589999437332153},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.421099990606308},{"id":"https://openalex.org/keywords/reliability","display_name":"Reliability (semiconductor)","score":0.40950000286102295},{"id":"https://openalex.org/keywords/interoperability","display_name":"Interoperability","score":0.38940000534057617},{"id":"https://openalex.org/keywords/adaptation","display_name":"Adaptation (eye)","score":0.38659998774528503},{"id":"https://openalex.org/keywords/latency","display_name":"Latency (audio)","score":0.3677999973297119},{"id":"https://openalex.org/keywords/resource-allocation","display_name":"Resource allocation","score":0.3571000099182129}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.9211999773979187},{"id":"https://openalex.org/C73555534","wikidata":"https://www.wikidata.org/wiki/Q622825","display_name":"Cluster analysis","level":2,"score":0.6438000202178955},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.6155999898910522},{"id":"https://openalex.org/C5119721","wikidata":"https://www.wikidata.org/wiki/Q220501","display_name":"Quality of service","level":2,"score":0.5746999979019165},{"id":"https://openalex.org/C177606310","wikidata":"https://www.wikidata.org/wiki/Q5674297","display_name":"Adaptability","level":2,"score":0.5099999904632568},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4948999881744385},{"id":"https://openalex.org/C119701452","wikidata":"https://www.wikidata.org/wiki/Q5165881","display_name":"Control reconfiguration","level":2,"score":0.47589999437332153},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.421099990606308},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.40950000286102295},{"id":"https://openalex.org/C20136886","wikidata":"https://www.wikidata.org/wiki/Q749647","display_name":"Interoperability","level":2,"score":0.38940000534057617},{"id":"https://openalex.org/C139807058","wikidata":"https://www.wikidata.org/wiki/Q352374","display_name":"Adaptation (eye)","level":2,"score":0.38659998774528503},{"id":"https://openalex.org/C82876162","wikidata":"https://www.wikidata.org/wiki/Q17096504","display_name":"Latency (audio)","level":2,"score":0.3677999973297119},{"id":"https://openalex.org/C29202148","wikidata":"https://www.wikidata.org/wiki/Q287260","display_name":"Resource allocation","level":2,"score":0.3571000099182129},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.329800009727478},{"id":"https://openalex.org/C206729178","wikidata":"https://www.wikidata.org/wiki/Q2271896","display_name":"Scheduling (production processes)","level":2,"score":0.32749998569488525},{"id":"https://openalex.org/C138959212","wikidata":"https://www.wikidata.org/wiki/Q1806783","display_name":"Load balancing (electrical power)","level":3,"score":0.3244999945163727},{"id":"https://openalex.org/C104954878","wikidata":"https://www.wikidata.org/wiki/Q1648707","display_name":"Routing protocol","level":3,"score":0.3231000006198883},{"id":"https://openalex.org/C52970973","wikidata":"https://www.wikidata.org/wiki/Q2497134","display_name":"Adaptive system","level":2,"score":0.3174000084400177},{"id":"https://openalex.org/C12269588","wikidata":"https://www.wikidata.org/wiki/Q132364","display_name":"Communications protocol","level":2,"score":0.3102000057697296},{"id":"https://openalex.org/C22684755","wikidata":"https://www.wikidata.org/wiki/Q847526","display_name":"Queueing theory","level":2,"score":0.29660001397132874},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.28940001130104065},{"id":"https://openalex.org/C206345919","wikidata":"https://www.wikidata.org/wiki/Q20380951","display_name":"Resource (disambiguation)","level":2,"score":0.287200003862381},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.28529998660087585},{"id":"https://openalex.org/C77019957","wikidata":"https://www.wikidata.org/wiki/Q2689057","display_name":"Dependability","level":2,"score":0.28110000491142273},{"id":"https://openalex.org/C63540848","wikidata":"https://www.wikidata.org/wiki/Q3140932","display_name":"Fault tolerance","level":2,"score":0.27730000019073486},{"id":"https://openalex.org/C2776003309","wikidata":"https://www.wikidata.org/wiki/Q1988072","display_name":"Adaptive algorithm","level":2,"score":0.27090001106262207},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.27000001072883606},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.2694999873638153},{"id":"https://openalex.org/C2742236","wikidata":"https://www.wikidata.org/wiki/Q924713","display_name":"Efficient energy use","level":2,"score":0.2651999890804291},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.2644999921321869},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.26420000195503235},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.25040000677108765}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-032-10466-3_13","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-032-10466-3_13","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W2972023276","https://openalex.org/W3162521785","https://openalex.org/W3167694951","https://openalex.org/W3177607546","https://openalex.org/W3197532253","https://openalex.org/W3206980850","https://openalex.org/W3217698999","https://openalex.org/W4225147756","https://openalex.org/W4388274224","https://openalex.org/W4392189163","https://openalex.org/W4396591575","https://openalex.org/W4400134285","https://openalex.org/W4406112858","https://openalex.org/W4408294905","https://openalex.org/W4409559960","https://openalex.org/W4411236875","https://openalex.org/W6910595859"],"related_works":[],"abstract_inverted_index":null,"counts_by_year":[],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-11-15T00:00:00"}
