{"id":"https://openalex.org/W7117716896","doi":"https://doi.org/10.1109/wincom65874.2025.11313455","title":"S-Cup: A Security Protocol for Self-Reconfiguration by Clustering on Programmable Matter Based Modular Robots","display_name":"S-Cup: A Security Protocol for Self-Reconfiguration by Clustering on Programmable Matter Based Modular Robots","publication_year":2025,"publication_date":"2025-11-25","ids":{"openalex":"https://openalex.org/W7117716896","doi":"https://doi.org/10.1109/wincom65874.2025.11313455"},"language":null,"primary_location":{"id":"doi:10.1109/wincom65874.2025.11313455","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wincom65874.2025.11313455","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 12th International Conference on Wireless Networks and Mobile Communications (WINCOM)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5059943868","display_name":"Youssou Faye","orcid":"https://orcid.org/0000-0003-0124-3533"},"institutions":[{"id":"https://openalex.org/I3133343326","display_name":"Ziguinchor University","ror":"https://ror.org/01xprs690","country_code":"SN","type":"education","lineage":["https://openalex.org/I3133343326"]}],"countries":["SN"],"is_corresponding":true,"raw_author_name":"Youssou Faye","raw_affiliation_strings":["University Assane Seck of Ziguinchor,LI3,Department of Computer Sciences,Ziguinchor,Senegal"],"affiliations":[{"raw_affiliation_string":"University Assane Seck of Ziguinchor,LI3,Department of Computer Sciences,Ziguinchor,Senegal","institution_ids":["https://openalex.org/I3133343326"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5070973485","display_name":"Abdallah Makhoul","orcid":"https://orcid.org/0000-0003-0485-097X"},"institutions":[{"id":"https://openalex.org/I37553959","display_name":"Universit\u00e9 de technologie de belfort-montb\u00e9liard","ror":"https://ror.org/05bn3m307","country_code":"FR","type":"education","lineage":["https://openalex.org/I37553959"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Abdallah Makhoul","raw_affiliation_strings":["University Marie et Louis Pasteur,Femto-st,Department- DISC,Montbeliard,France"],"affiliations":[{"raw_affiliation_string":"University Marie et Louis Pasteur,Femto-st,Department- DISC,Montbeliard,France","institution_ids":["https://openalex.org/I37553959"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5116806845","display_name":"Serigne Mback\u00e9 DIENE","orcid":null},"institutions":[{"id":"https://openalex.org/I3133343326","display_name":"Ziguinchor University","ror":"https://ror.org/01xprs690","country_code":"SN","type":"education","lineage":["https://openalex.org/I3133343326"]}],"countries":["SN"],"is_corresponding":false,"raw_author_name":"Serigne Mbacke Diene","raw_affiliation_strings":["University Assane Seck of Ziguinchor,LI3,Department of Computer Science,Ziguinchor,Senegal"],"affiliations":[{"raw_affiliation_string":"University Assane Seck of Ziguinchor,LI3,Department of Computer Science,Ziguinchor,Senegal","institution_ids":["https://openalex.org/I3133343326"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5046549726","display_name":"Mohammed OUZZIF","orcid":null},"institutions":[{"id":"https://openalex.org/I99297268","display_name":"University of Hassan II Casablanca","ror":"https://ror.org/001q4kn48","country_code":"MA","type":"education","lineage":["https://openalex.org/I99297268"]}],"countries":["MA"],"is_corresponding":false,"raw_author_name":"Mohammed Ouzzif","raw_affiliation_strings":["Hassane II University of Casablanca,C3S, ESTC,Casablanca,Marocco"],"affiliations":[{"raw_affiliation_string":"Hassane II University of Casablanca,C3S, ESTC,Casablanca,Marocco","institution_ids":["https://openalex.org/I99297268"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5121662558","display_name":"Cheikhou Oumar Sow","orcid":null},"institutions":[{"id":"https://openalex.org/I3133343326","display_name":"Ziguinchor University","ror":"https://ror.org/01xprs690","country_code":"SN","type":"education","lineage":["https://openalex.org/I3133343326"]}],"countries":["SN"],"is_corresponding":false,"raw_author_name":"Cheikhou Oumar Sow","raw_affiliation_strings":["University Assane Seck of Ziguinchor,LI3,Department of Computer Science,Ziguinchor,Senegal"],"affiliations":[{"raw_affiliation_string":"University Assane Seck of Ziguinchor,LI3,Department of Computer Science,Ziguinchor,Senegal","institution_ids":["https://openalex.org/I3133343326"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5059943868"],"corresponding_institution_ids":["https://openalex.org/I3133343326"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.58284543,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12784","display_name":"Modular Robots and Swarm Intelligence","score":0.941100001335144,"subfield":{"id":"https://openalex.org/subfields/2210","display_name":"Mechanical Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12784","display_name":"Modular Robots and Swarm Intelligence","score":0.941100001335144,"subfield":{"id":"https://openalex.org/subfields/2210","display_name":"Mechanical Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12162","display_name":"Cellular Automata and Applications","score":0.008200000040233135,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12029","display_name":"DNA and Biological Computing","score":0.005100000184029341,"subfield":{"id":"https://openalex.org/subfields/1312","display_name":"Molecular Biology"},"field":{"id":"https://openalex.org/fields/13","display_name":"Biochemistry, Genetics and Molecular Biology"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/modular-design","display_name":"Modular design","score":0.5914000272750854},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.5710999965667725},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5544000267982483},{"id":"https://openalex.org/keywords/control-reconfiguration","display_name":"Control reconfiguration","score":0.5529000163078308},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.5174999833106995},{"id":"https://openalex.org/keywords/focus","display_name":"Focus (optics)","score":0.5099999904632568},{"id":"https://openalex.org/keywords/synchronization","display_name":"Synchronization (alternating current)","score":0.5051000118255615},{"id":"https://openalex.org/keywords/cluster-analysis","display_name":"Cluster analysis","score":0.4997999966144562},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.48829999566078186}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.762499988079071},{"id":"https://openalex.org/C101468663","wikidata":"https://www.wikidata.org/wiki/Q1620158","display_name":"Modular design","level":2,"score":0.5914000272750854},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.5710999965667725},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5544000267982483},{"id":"https://openalex.org/C119701452","wikidata":"https://www.wikidata.org/wiki/Q5165881","display_name":"Control reconfiguration","level":2,"score":0.5529000163078308},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5174999833106995},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.5099999904632568},{"id":"https://openalex.org/C2778562939","wikidata":"https://www.wikidata.org/wiki/Q1298791","display_name":"Synchronization (alternating current)","level":3,"score":0.5051000118255615},{"id":"https://openalex.org/C73555534","wikidata":"https://www.wikidata.org/wiki/Q622825","display_name":"Cluster analysis","level":2,"score":0.4997999966144562},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.48829999566078186},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.4765999913215637},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.46790000796318054},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.43560001254081726},{"id":"https://openalex.org/C99674996","wikidata":"https://www.wikidata.org/wiki/Q1414155","display_name":"Key exchange","level":4,"score":0.3912999927997589},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.38519999384880066},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3752000033855438},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.34599998593330383},{"id":"https://openalex.org/C113843644","wikidata":"https://www.wikidata.org/wiki/Q901882","display_name":"Interface (matter)","level":4,"score":0.34459999203681946},{"id":"https://openalex.org/C17886624","wikidata":"https://www.wikidata.org/wiki/Q1320561","display_name":"Key management","level":3,"score":0.33980000019073486},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.33480000495910645},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.3278000056743622},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3264000117778778},{"id":"https://openalex.org/C2778062554","wikidata":"https://www.wikidata.org/wiki/Q3404031","display_name":"Security community","level":2,"score":0.3027999997138977},{"id":"https://openalex.org/C2781221063","wikidata":"https://www.wikidata.org/wiki/Q6944186","display_name":"Mutual authentication","level":3,"score":0.28040000796318054},{"id":"https://openalex.org/C1668388","wikidata":"https://www.wikidata.org/wiki/Q1149776","display_name":"Data management","level":2,"score":0.27489998936653137},{"id":"https://openalex.org/C169485995","wikidata":"https://www.wikidata.org/wiki/Q42283","display_name":"File Transfer Protocol","level":3,"score":0.27459999918937683},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.2720000147819519},{"id":"https://openalex.org/C15845906","wikidata":"https://www.wikidata.org/wiki/Q1172338","display_name":"Data exchange","level":2,"score":0.2667999863624573},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.2558000087738037}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/wincom65874.2025.11313455","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wincom65874.2025.11313455","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 12th International Conference on Wireless Networks and Mobile Communications (WINCOM)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4184468388557434,"display_name":"Climate action","id":"https://metadata.un.org/sdg/13"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W118355721","https://openalex.org/W1561559709","https://openalex.org/W2025888225","https://openalex.org/W2061430707","https://openalex.org/W2473788884","https://openalex.org/W2586195656","https://openalex.org/W2799377743","https://openalex.org/W2962125190","https://openalex.org/W2982853176","https://openalex.org/W2987975740","https://openalex.org/W2990127528","https://openalex.org/W3045901359","https://openalex.org/W3119167309","https://openalex.org/W3130954471","https://openalex.org/W3132428167","https://openalex.org/W3158732870","https://openalex.org/W4317390707","https://openalex.org/W4317536049","https://openalex.org/W4407301902","https://openalex.org/W4409403141"],"related_works":[],"abstract_inverted_index":{"Programmable":[0],"matter":[1],"in":[2,39],"the":[3,54,60,64,71,103,108,121,163],"context":[4],"of":[5,13,49,66,105,162],"microrobots":[6],"is":[7,68],"like":[8],"mobile":[9],"microcomputers":[10],"with":[11,157],"size":[12],"a":[14,129,145,151,158],"millimeter,":[15],"which":[16,57],"can":[17,86],"move":[18],"around":[19],"each":[20],"other,":[21],"communicate":[22],"to":[23,95,143],"form":[24],"different":[25],"shapes.":[26],"Current":[27],"challenges":[28,38],"are":[29,114],"as":[30,33],"much":[31],"theoretical":[32],"technological.":[34],"The":[35],"main":[36],"research":[37],"computer":[40],"science":[41],"focus":[42],"on":[43,139],"clustering,":[44],"synchronization":[45],"time,":[46],"decision-making,":[47],"analysis":[48],"detected":[50],"data,":[51],"security":[52,122,130],"and":[53,107],"autoconfiguration":[55,112],"process,":[56],"today":[58],"remains":[59],"most":[61],"fundamental.":[62],"When":[63],"number":[65,104],"modules":[67,94],"very":[69],"high,":[70],"self-reconfiguration":[72,134],"challenge":[73],"becomes":[74],"more":[75],"crucial":[76],"for":[77,132],"applications":[78],"requiring":[79],"rapid":[80],"transition":[81],"between":[82],"two":[83],"forms.":[84],"Clustering":[85],"enable":[87],"parallel":[88],"transitions":[89,106],"by":[90],"allowing":[91],"geographically":[92],"close":[93],"make":[96],"intra-cluster":[97],"transitions,":[98],"thus":[99],"reducing":[100],"reconfiguration":[101],"complexity,":[102],"time":[109],"required.":[110],"Clustering-based":[111],"solutions":[113],"available,":[115],"but":[116],"they":[117],"do":[118],"not":[119],"include":[120],"aspect.":[123],"In":[124],"this":[125],"paper,":[126],"we":[127],"propose":[128],"protocol":[131],"clustering-based":[133],"solutions.":[135],"This":[136],"solution":[137,148],"relies":[138],"resource-efficient":[140],"cryptographic":[141],"mechanisms":[142],"implement":[144],"robust":[146],"authentication":[147],"that":[149],"underpins":[150],"flexible":[152],"key":[153],"management":[154],"mechanism":[155],"coupled":[156],"confidential":[159],"data":[160],"exchange":[161],"resulting":[164],"structure":[165]},"counts_by_year":[],"updated_date":"2026-02-20T08:17:22.645390","created_date":"2025-12-31T00:00:00"}
