{"id":"https://openalex.org/W4410086716","doi":"https://doi.org/10.1109/jiot.2025.3566962","title":"Design of Key Agreement Authentication Scheme With IDS Using OS-RVFL Neural Network for Secure Fog Computing","display_name":"Design of Key Agreement Authentication Scheme With IDS Using OS-RVFL Neural Network for Secure Fog Computing","publication_year":2025,"publication_date":"2025-05-05","ids":{"openalex":"https://openalex.org/W4410086716","doi":"https://doi.org/10.1109/jiot.2025.3566962"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2025.3566962","is_oa":true,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3566962","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://doi.org/10.1109/jiot.2025.3566962","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5042562507","display_name":"Shreeya Swagatika Sahoo","orcid":"https://orcid.org/0000-0003-0087-101X"},"institutions":[{"id":"https://openalex.org/I193073490","display_name":"Siksha O Anusandhan University","ror":"https://ror.org/056ep7w45","country_code":"IN","type":"education","lineage":["https://openalex.org/I193073490"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Shreeya Swagatika Sahoo","raw_affiliation_strings":["Department of Computer Science and Engineering, Siksha &#x2018;O&#x2019; Anusandhan University, Bhubaneswar, India","dept. of CSE, Siksha &#x2019;O&#x2018; Anusandhan University, Odisha, India"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Siksha &#x2018;O&#x2019; Anusandhan University, Bhubaneswar, India","institution_ids":["https://openalex.org/I193073490"]},{"raw_affiliation_string":"dept. of CSE, Siksha &#x2019;O&#x2018; Anusandhan University, Odisha, India","institution_ids":["https://openalex.org/I193073490"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5007222088","display_name":"Dibyasundar Das","orcid":"https://orcid.org/0000-0002-0285-2560"},"institutions":[{"id":"https://openalex.org/I193073490","display_name":"Siksha O Anusandhan University","ror":"https://ror.org/056ep7w45","country_code":"IN","type":"education","lineage":["https://openalex.org/I193073490"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Dibyasundar Das","raw_affiliation_strings":["Department of Computer Science and Engineering, Siksha &#x2018;O&#x2019; Anusandhan University, Bhubaneswar, India","dept. of CSE, Siksha &#x2019;O&#x2018; Anusandhan University, Odisha, India"],"raw_orcid":"https://orcid.org/0000-0002-0285-2560","affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Siksha &#x2018;O&#x2019; Anusandhan University, Bhubaneswar, India","institution_ids":["https://openalex.org/I193073490"]},{"raw_affiliation_string":"dept. of CSE, Siksha &#x2019;O&#x2018; Anusandhan University, Odisha, India","institution_ids":["https://openalex.org/I193073490"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5042562507"],"corresponding_institution_ids":["https://openalex.org/I193073490"],"apc_list":null,"apc_paid":null,"fwci":2.6057,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.90315526,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":98},"biblio":{"volume":"12","issue":"14","first_page":"28521","last_page":"28530"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T13243","display_name":"Innovation in Digital Healthcare Systems","score":0.6450999975204468,"subfield":{"id":"https://openalex.org/subfields/3605","display_name":"Health Information Management"},"field":{"id":"https://openalex.org/fields/36","display_name":"Health Professions"},"domain":{"id":"https://openalex.org/domains/4","display_name":"Health Sciences"}},"topics":[{"id":"https://openalex.org/T13243","display_name":"Innovation in Digital Healthcare Systems","score":0.6450999975204468,"subfield":{"id":"https://openalex.org/subfields/3605","display_name":"Health Information Management"},"field":{"id":"https://openalex.org/fields/36","display_name":"Health Professions"},"domain":{"id":"https://openalex.org/domains/4","display_name":"Health Sciences"}},{"id":"https://openalex.org/T14484","display_name":"Technology and Data Analysis","score":0.6154000163078308,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13924","display_name":"Internet of Things and Social Network Interactions","score":0.5400000214576721,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.841781735420227},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.5738803744316101},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5664872527122498},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.552730917930603},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4903552532196045},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4714827537536621},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3619638681411743},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.273870587348938},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2191416323184967}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.841781735420227},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.5738803744316101},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5664872527122498},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.552730917930603},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4903552532196045},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4714827537536621},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3619638681411743},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.273870587348938},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2191416323184967},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2025.3566962","is_oa":true,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3566962","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1109/jiot.2025.3566962","is_oa":true,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3566962","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W1977366836","https://openalex.org/W2029693536","https://openalex.org/W2049559208","https://openalex.org/W2066832805","https://openalex.org/W2105114022","https://openalex.org/W2111072639","https://openalex.org/W2117064875","https://openalex.org/W2131789459","https://openalex.org/W2154909745","https://openalex.org/W2169768310","https://openalex.org/W2548349436","https://openalex.org/W2586923239","https://openalex.org/W2805161995","https://openalex.org/W2809963016","https://openalex.org/W2904056191","https://openalex.org/W2948343595","https://openalex.org/W2952103830","https://openalex.org/W2981174158","https://openalex.org/W3167876643","https://openalex.org/W4321609027","https://openalex.org/W4372203465","https://openalex.org/W4382491240","https://openalex.org/W4387490462","https://openalex.org/W4390694307","https://openalex.org/W4400111991"],"related_works":["https://openalex.org/W1975289146","https://openalex.org/W2140798747","https://openalex.org/W2105887828","https://openalex.org/W2948169060","https://openalex.org/W2122599759","https://openalex.org/W4236520801","https://openalex.org/W2730112582","https://openalex.org/W2110696645","https://openalex.org/W2242172122","https://openalex.org/W1522862521"],"abstract_inverted_index":{"Cloud":[0],"computing":[1,73,195],"technology":[2],"was":[3,222],"first":[4],"introduced":[5],"by":[6,53],"Amazon":[7],"in":[8,80,145,174,205],"2006":[9],"and":[10,26,38,97,151,203,239,293,300],"has":[11,29,250,268],"provided":[12],"customers":[13],"with":[14,77,91,289],"high-quality":[15],"services":[16],"through":[17],"the":[18,21,58,71,85,92,105,114,124,163,170,175,193,210,218,225,247,255,266,272,284],"Internet.":[19],"However,":[20],"growing":[22],"number":[23],"of":[24,94,217,231,234,237,242,246,262],"IoT":[25],"mobile":[27],"devices":[28],"led":[30],"to":[31,57,117,142,168,183,280],"challenges":[32],"such":[33],"as":[34],"latency,":[35],"power":[36],"consumption,":[37],"network":[39,59],"strain.":[40],"To":[41,120],"address":[42,121],"these":[43,122],"issues,":[44,123],"Cisco":[45],"developed":[46],"fog":[47,72,81,176,194],"computing,":[48],"which":[49,258],"enhances":[50],"cloud":[51],"capabilities":[52],"processing":[54],"data":[55,213],"closer":[56],"edge.":[60],"Despite":[61],"its":[62,263,290],"advantages,":[63],"security":[64,89,106,143,172,245],"concerns":[65],"remain":[66],"a":[67,180,188],"critical":[68],"challenge":[69],"within":[70],"paradigm.":[74],"The":[75,197,215,244],"issue":[76],"secure":[78],"authentication":[79,137,149,166],"often":[82],"involves":[83],"balancing":[84],"need":[86],"for":[87],"robust":[88],"measures":[90],"constraints":[93],"limited":[95],"resources":[96],"varying":[98],"trust":[99],"levels":[100],"among":[101],"distributed":[102],"devices.":[103],"Moreover,":[104],"protocols":[107],"are":[108],"weak":[109],"against":[110],"unknown":[111],"threats,":[112],"leaving":[113],"system":[115,199],"vulnerable":[116],"potential":[118],"attacks.":[119],"study":[125],"proposes":[126],"an":[127,229,240],"Online":[128],"Sequential":[129],"Random":[130],"Vector":[131],"Functional":[132],"Link":[133],"(OS-RVFL)":[134],"neural":[135],"network-based":[136],"approach.":[138],"This":[139,156,178],"method":[140],"adapts":[141],"threats":[144,185],"real":[146],"time,":[147],"improves":[148],"resilience,":[150],"efficiently":[152],"uses":[153],"available":[154],"resources.":[155],"intrusion":[157],"detection":[158,220],"model":[159,221],"is":[160],"integrated":[161],"into":[162],"proposed":[164,198,219,248,285],"lightweight":[165],"protocol":[167],"enhance":[169],"overall":[171],"framework":[173],"environment.":[177,196],"ensures":[179],"dynamic":[181],"response":[182],"emerging":[184],"while":[186],"maintaining":[187],"low":[189],"resource":[190],"footprint":[191],"across":[192],"can":[200],"also":[201],"learn":[202],"update":[204],"real-time":[206],"without":[207],"depending":[208],"on":[209],"previous":[211],"training":[212],"batch.":[214],"effectiveness":[216],"evaluated":[223],"using":[224,254,271],"NSL-KDD":[226],"dataset,":[227],"achieving":[228],"accuracy":[230],"0.8943,":[232],"precision":[233],"0.9142,":[235],"recall":[236],"0.8986,":[238],"F1-score":[241],"0.9064.":[243],"scheme":[249,267,286],"been":[251,269],"rigorously":[252],"analyzed":[253],"Real-or-Random":[256],"model,":[257],"provides":[259],"formal":[260],"proof":[261],"robustness.":[264],"Furthermore,":[265],"verified":[270],"widely":[273],"accepted":[274],"AVISPA":[275],"tool.":[276],"In":[277],"addition,":[278],"compared":[279],"other":[281],"related":[282],"works,":[283],"stands":[287],"out":[288],"lower":[291],"communication":[292],"storage":[294],"costs,":[295],"making":[296],"it":[297],"more":[298],"efficient":[299],"reliable.":[301]},"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
