{"id":"https://openalex.org/W4413925751","doi":"https://doi.org/10.1109/tmc.2025.3605390","title":"Secure Charging Scheduling in Wireless Rechargeable Sensor Networks","display_name":"Secure Charging Scheduling in Wireless Rechargeable Sensor Networks","publication_year":2025,"publication_date":"2025-09-02","ids":{"openalex":"https://openalex.org/W4413925751","doi":"https://doi.org/10.1109/tmc.2025.3605390"},"language":"en","primary_location":{"id":"doi:10.1109/tmc.2025.3605390","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tmc.2025.3605390","pdf_url":null,"source":{"id":"https://openalex.org/S69141925","display_name":"IEEE Transactions on Mobile Computing","issn_l":"1536-1233","issn":["1536-1233","1558-0660","2161-9875"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Mobile Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100362546","display_name":"Wei Yang","orcid":"https://orcid.org/0000-0002-7515-0519"},"institutions":[{"id":"https://openalex.org/I27357992","display_name":"Dalian University of Technology","ror":"https://ror.org/023hj5876","country_code":"CN","type":"education","lineage":["https://openalex.org/I27357992"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Wei Yang","raw_affiliation_strings":["DUT School of Software Technology &#x0026; DUT-RU International School of Information Science and Engineering, Dalian University of Technology, Dalian, China","DUT School of Software Technology &amp; DUT-RU International School of Information Science and Engineering, Dalian University of Technology; Key Laboratory for Ubiquitous Network and Service Software of Liaoning Province, Dalian, China"],"affiliations":[{"raw_affiliation_string":"DUT School of Software Technology &#x0026; DUT-RU International School of Information Science and Engineering, Dalian University of Technology, Dalian, China","institution_ids":["https://openalex.org/I27357992"]},{"raw_affiliation_string":"DUT School of Software Technology &amp; DUT-RU International School of Information Science and Engineering, Dalian University of Technology; Key Laboratory for Ubiquitous Network and Service Software of Liaoning Province, Dalian, China","institution_ids":["https://openalex.org/I27357992"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5014651715","display_name":"Chi Lin","orcid":"https://orcid.org/0000-0002-0302-5102"},"institutions":[{"id":"https://openalex.org/I27357992","display_name":"Dalian University of Technology","ror":"https://ror.org/023hj5876","country_code":"CN","type":"education","lineage":["https://openalex.org/I27357992"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chi Lin","raw_affiliation_strings":["DUT School of Software Technology &#x0026; DUT-RU International School of Information Science and Engineering, Dalian University of Technology, Dalian, China","DUT School of Software Technology &amp; DUT-RU International School of Information Science and Engineering, Dalian University of Technology; Key Laboratory for Ubiquitous Network and Service Software of Liaoning Province, Dalian, China"],"affiliations":[{"raw_affiliation_string":"DUT School of Software Technology &#x0026; DUT-RU International School of Information Science and Engineering, Dalian University of Technology, Dalian, China","institution_ids":["https://openalex.org/I27357992"]},{"raw_affiliation_string":"DUT School of Software Technology &amp; DUT-RU International School of Information Science and Engineering, Dalian University of Technology; Key Laboratory for Ubiquitous Network and Service Software of Liaoning Province, Dalian, China","institution_ids":["https://openalex.org/I27357992"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5048277494","display_name":"Jing Deng","orcid":"https://orcid.org/0000-0002-2508-1420"},"institutions":[{"id":"https://openalex.org/I169335092","display_name":"University of North Carolina at Greensboro","ror":"https://ror.org/04fnxsj42","country_code":"US","type":"education","lineage":["https://openalex.org/I169335092"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jing Deng","raw_affiliation_strings":["Department of Computer Science, University of North Carolina at Greensboro, Greensboro, NC, USA","Department of Computer Science, University of North Carolina, Greensboro, NC, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of North Carolina at Greensboro, Greensboro, NC, USA","institution_ids":["https://openalex.org/I169335092"]},{"raw_affiliation_string":"Department of Computer Science, University of North Carolina, Greensboro, NC, USA","institution_ids":["https://openalex.org/I169335092"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5003181030","display_name":"Haipeng Dai","orcid":"https://orcid.org/0000-0003-0545-8187"},"institutions":[{"id":"https://openalex.org/I881766915","display_name":"Nanjing University","ror":"https://ror.org/01rxvg760","country_code":"CN","type":"education","lineage":["https://openalex.org/I881766915"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Haipeng Dai","raw_affiliation_strings":["State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, Jiangsu, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, Jiangsu, China","institution_ids":["https://openalex.org/I881766915"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100443536","display_name":"Liming Chen","orcid":"https://orcid.org/0000-0003-0200-7989"},"institutions":[{"id":"https://openalex.org/I27357992","display_name":"Dalian University of Technology","ror":"https://ror.org/023hj5876","country_code":"CN","type":"education","lineage":["https://openalex.org/I27357992"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Liming Chen","raw_affiliation_strings":["School of Computer Science and Technology, Dalian University of Technology, Dalian, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Dalian University of Technology, Dalian, China","institution_ids":["https://openalex.org/I27357992"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5046658556","display_name":"Xinxin Fan","orcid":"https://orcid.org/0000-0002-6659-7431"},"institutions":[{"id":"https://openalex.org/I4210090176","display_name":"Institute of Computing Technology","ror":"https://ror.org/0090r4d87","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210090176"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xinxin Fan","raw_affiliation_strings":["Institute of Computing Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Computing Technology, Beijing, China","institution_ids":["https://openalex.org/I4210090176"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100418950","display_name":"Li Zhang","orcid":"https://orcid.org/0000-0001-6674-692X"},"institutions":[{"id":"https://openalex.org/I16365422","display_name":"Hefei University of Technology","ror":"https://ror.org/02czkny70","country_code":"CN","type":"education","lineage":["https://openalex.org/I16365422"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Li Zhang","raw_affiliation_strings":["School of Mathematics, Hefei University of Technology, Hefei, Anhui, China"],"affiliations":[{"raw_affiliation_string":"School of Mathematics, Hefei University of Technology, Hefei, Anhui, China","institution_ids":["https://openalex.org/I16365422"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5100362546"],"corresponding_institution_ids":["https://openalex.org/I27357992"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.28055207,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"25","issue":"2","first_page":"1870","last_page":"1884"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11392","display_name":"Energy Harvesting in Wireless Networks","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11392","display_name":"Energy Harvesting in Wireless Networks","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10080","display_name":"Energy Efficient Wireless Sensor Networks","score":0.9948999881744385,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9902999997138977,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7887299060821533},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.6911031007766724},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.619817852973938},{"id":"https://openalex.org/keywords/scheduling","display_name":"Scheduling (production processes)","score":0.5460891127586365},{"id":"https://openalex.org/keywords/key-distribution-in-wireless-sensor-networks","display_name":"Key distribution in wireless sensor networks","score":0.5387042760848999},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.48718899488449097},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.3703218996524811},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3416755795478821},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.251886785030365},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.09048342704772949}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7887299060821533},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.6911031007766724},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.619817852973938},{"id":"https://openalex.org/C206729178","wikidata":"https://www.wikidata.org/wiki/Q2271896","display_name":"Scheduling (production processes)","level":2,"score":0.5460891127586365},{"id":"https://openalex.org/C41971633","wikidata":"https://www.wikidata.org/wiki/Q6398155","display_name":"Key distribution in wireless sensor networks","level":4,"score":0.5387042760848999},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.48718899488449097},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.3703218996524811},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3416755795478821},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.251886785030365},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.09048342704772949},{"id":"https://openalex.org/C21547014","wikidata":"https://www.wikidata.org/wiki/Q1423657","display_name":"Operations management","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tmc.2025.3605390","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tmc.2025.3605390","pdf_url":null,"source":{"id":"https://openalex.org/S69141925","display_name":"IEEE Transactions on Mobile Computing","issn_l":"1536-1233","issn":["1536-1233","1558-0660","2161-9875"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Mobile Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":32,"referenced_works":["https://openalex.org/W2106335692","https://openalex.org/W2136982937","https://openalex.org/W2760845069","https://openalex.org/W2767764368","https://openalex.org/W2796053842","https://openalex.org/W2797083309","https://openalex.org/W2890614301","https://openalex.org/W2918728492","https://openalex.org/W2920192851","https://openalex.org/W2971833977","https://openalex.org/W3005850858","https://openalex.org/W3047418787","https://openalex.org/W3081788285","https://openalex.org/W3084200166","https://openalex.org/W3092217301","https://openalex.org/W3108141335","https://openalex.org/W3167350281","https://openalex.org/W3184839234","https://openalex.org/W3216594308","https://openalex.org/W4213456346","https://openalex.org/W4283209744","https://openalex.org/W4292232877","https://openalex.org/W4306705805","https://openalex.org/W4313000937","https://openalex.org/W4317795032","https://openalex.org/W4366504064","https://openalex.org/W4385287226","https://openalex.org/W4385656592","https://openalex.org/W4386025745","https://openalex.org/W4387623685","https://openalex.org/W4390659130","https://openalex.org/W4393405213"],"related_works":["https://openalex.org/W1975451135","https://openalex.org/W917005982","https://openalex.org/W2148549110","https://openalex.org/W2295628284","https://openalex.org/W2890570089","https://openalex.org/W3095958166","https://openalex.org/W2129477171","https://openalex.org/W3148968234","https://openalex.org/W2593729912","https://openalex.org/W2012250365"],"abstract_inverted_index":{"Wireless":[0],"Rechargeable":[1],"Sensor":[2],"Networks":[3],"(WRSNs)":[4],"promise":[5],"to":[6,25],"address":[7],"the":[8,43,55,127],"limited":[9],"energy":[10,116,120,133],"resource":[11],"issue":[12],"for":[13,88],"sensor":[14,90],"nodes":[15,91],"through":[16],"wireless":[17],"power":[18],"transfer":[19],"technology.":[20],"However,":[21],"WRSNs":[22],"are":[23],"vulnerable":[24],"various":[26],"security":[27],"threats,":[28],"such":[29],"as":[30,138,140],"compromised":[31],"node":[32,105],"attack":[33],"and":[34,46,92,118,124,137,147],"malicious":[35],"mobile":[36],"charger":[37],"(MC)":[38],"attack,":[39],"which":[40],"can":[41],"disrupt":[42],"charging":[44,48,98,113],"process":[45],"degrade":[47],"efficiency.":[49,121],"In":[50],"this":[51],"work,":[52],"we":[53,101],"investigate":[54],"ene<underline":[56],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[57,61,66,69,72],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">R</u>gy":[58],"conversion":[59],"<underline":[60],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">E</u>fficiency":[62],"maximization":[63],"problem":[64],"un<underline":[65],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">D</u>er":[67],"charg<underline":[68],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">I</u>ng":[70],"attack<underline":[71],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">S</u>":[73],"(REDIS).":[74],"We":[75],"propose":[76],"a":[77,82,103],"blockchain-based":[78],"framework":[79],"that":[80,96,108],"employs":[81],"lightweight":[83],"multi-layer":[84],"storage":[85],"approach":[86],"tailored":[87],"resource-constrained":[89],"features":[93],"consensus":[94,110],"algorithms":[95],"validate":[97,126],"transactions.":[99],"Furthermore,":[100],"introduce":[102],"validation":[104],"selection":[106],"strategy":[107],"integrates":[109],"execution":[111],"with":[112],"scheduling,":[114],"reducing":[115],"consumption,":[117],"improving":[119,132],"Extensive":[122],"simulations":[123],"experiments":[125],"effectiveness":[128],"of":[129],"our":[130],"framework,":[131],"efficiency":[134],"by":[135],"30%":[136],"much":[139],"5":[141],"times":[142],"in":[143],"networks":[144],"without":[145],"attacks":[146],"those":[148],"under":[149],"full":[150],"attacks,":[151],"respectively.":[152]},"counts_by_year":[],"updated_date":"2026-01-11T23:08:45.486102","created_date":"2025-10-10T00:00:00"}
