{"id":"https://openalex.org/W3100122486","doi":"https://doi.org/10.1155/2020/8897098","title":"Protect Mobile Travelers Information in Sensitive Region Based on Fuzzy Logic in IoT Technology","display_name":"Protect Mobile Travelers Information in Sensitive Region Based on Fuzzy Logic in IoT Technology","publication_year":2020,"publication_date":"2020-11-18","ids":{"openalex":"https://openalex.org/W3100122486","doi":"https://doi.org/10.1155/2020/8897098","mag":"3100122486"},"language":"en","primary_location":{"id":"doi:10.1155/2020/8897098","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2020/8897098","pdf_url":"https://downloads.hindawi.com/journals/scn/2020/8897098.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://downloads.hindawi.com/journals/scn/2020/8897098.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5079610324","display_name":"Imran Memon","orcid":"https://orcid.org/0000-0002-9325-4805"},"institutions":[{"id":"https://openalex.org/I45164037","display_name":"Shah Abdul Latif University","ror":"https://ror.org/02s232b27","country_code":"PK","type":"education","lineage":["https://openalex.org/I45164037"]},{"id":"https://openalex.org/I59225215","display_name":"Bahria University","ror":"https://ror.org/02v8d7770","country_code":"PK","type":"education","lineage":["https://openalex.org/I59225215"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Imran Memon","raw_affiliation_strings":["Department of Computer Science, Bahria University, Karachi Campus, Sindh, Pakistan","Department of Computer Science, Shah Abdul Latif University, Khairpur, Sindh, Pakistan"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Bahria University, Karachi Campus, Sindh, Pakistan","institution_ids":["https://openalex.org/I59225215"]},{"raw_affiliation_string":"Department of Computer Science, Shah Abdul Latif University, Khairpur, Sindh, Pakistan","institution_ids":["https://openalex.org/I45164037"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5015773218","display_name":"Riaz Ahmed Shaikh","orcid":"https://orcid.org/0000-0001-6666-0253"},"institutions":[{"id":"https://openalex.org/I45164037","display_name":"Shah Abdul Latif University","ror":"https://ror.org/02s232b27","country_code":"PK","type":"education","lineage":["https://openalex.org/I45164037"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Riaz Ahmed Shaikh","raw_affiliation_strings":["Department of Computer Science, Shah Abdul Latif University, Khairpur, Sindh, Pakistan"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Shah Abdul Latif University, Khairpur, Sindh, Pakistan","institution_ids":["https://openalex.org/I45164037"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5084720361","display_name":"Mohammad Kamrul Hasan","orcid":"https://orcid.org/0000-0001-5511-0205"},"institutions":[{"id":"https://openalex.org/I885383172","display_name":"National University of Malaysia","ror":"https://ror.org/00bw8d226","country_code":"MY","type":"education","lineage":["https://openalex.org/I885383172"]}],"countries":["MY"],"is_corresponding":true,"raw_author_name":"Mohammad Kamrul Hasan","raw_affiliation_strings":["Network and Communication Technology Lab, Center for Cyber Security, The National University of Malaysia (UKM), UKM, Selangor 43600, Malaysia"],"affiliations":[{"raw_affiliation_string":"Network and Communication Technology Lab, Center for Cyber Security, The National University of Malaysia (UKM), UKM, Selangor 43600, Malaysia","institution_ids":["https://openalex.org/I885383172"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069265026","display_name":"Rosilah Hassan","orcid":"https://orcid.org/0000-0003-1348-5804"},"institutions":[{"id":"https://openalex.org/I885383172","display_name":"National University of Malaysia","ror":"https://ror.org/00bw8d226","country_code":"MY","type":"education","lineage":["https://openalex.org/I885383172"]}],"countries":["MY"],"is_corresponding":true,"raw_author_name":"Rosilah Hassan","raw_affiliation_strings":["Network and Communication Technology Lab, Center for Cyber Security, The National University of Malaysia (UKM), UKM, Selangor 43600, Malaysia"],"affiliations":[{"raw_affiliation_string":"Network and Communication Technology Lab, Center for Cyber Security, The National University of Malaysia (UKM), UKM, Selangor 43600, Malaysia","institution_ids":["https://openalex.org/I885383172"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058835260","display_name":"Amin Ul Haq","orcid":"https://orcid.org/0000-0002-7774-5604"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Amin Ul Haq","raw_affiliation_strings":["University of Electronic Science and Technology, Chengdu, Sichuan, China"],"affiliations":[{"raw_affiliation_string":"University of Electronic Science and Technology, Chengdu, Sichuan, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5034364966","display_name":"Khairul Akram Zainol Ariffin","orcid":"https://orcid.org/0000-0003-3627-556X"},"institutions":[{"id":"https://openalex.org/I885383172","display_name":"National University of Malaysia","ror":"https://ror.org/00bw8d226","country_code":"MY","type":"education","lineage":["https://openalex.org/I885383172"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Khairul Akram Zainol","raw_affiliation_strings":["Digital Forensics Lab, Center for Cyber Security, The National University of Malaysia (UKM), UKM, Selangor 43600, Malaysia"],"affiliations":[{"raw_affiliation_string":"Digital Forensics Lab, Center for Cyber Security, The National University of Malaysia (UKM), UKM, Selangor 43600, Malaysia","institution_ids":["https://openalex.org/I885383172"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5069265026","https://openalex.org/A5084720361"],"corresponding_institution_ids":["https://openalex.org/I885383172"],"apc_list":{"value":2100,"currency":"USD","value_usd":2100},"apc_paid":{"value":2100,"currency":"USD","value_usd":2100},"fwci":6.9589,"has_fulltext":true,"cited_by_count":48,"citation_normalized_percentile":{"value":0.97163166,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":100},"biblio":{"volume":"2020","issue":null,"first_page":"1","last_page":"12"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9950000047683716,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9930999875068665,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8843390941619873},{"id":"https://openalex.org/keywords/fuzzy-logic","display_name":"Fuzzy logic","score":0.6885109543800354},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6406290531158447},{"id":"https://openalex.org/keywords/spoofing-attack","display_name":"Spoofing attack","score":0.5795519351959229},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.5564506649971008},{"id":"https://openalex.org/keywords/energy-consumption","display_name":"Energy consumption","score":0.4732570946216583},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.46723562479019165},{"id":"https://openalex.org/keywords/scope","display_name":"Scope (computer science)","score":0.44594821333885193},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.4422944188117981},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.4305300712585449},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.20644667744636536},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.10981318354606628}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8843390941619873},{"id":"https://openalex.org/C58166","wikidata":"https://www.wikidata.org/wiki/Q224821","display_name":"Fuzzy logic","level":2,"score":0.6885109543800354},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6406290531158447},{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.5795519351959229},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.5564506649971008},{"id":"https://openalex.org/C2780165032","wikidata":"https://www.wikidata.org/wiki/Q16869822","display_name":"Energy consumption","level":2,"score":0.4732570946216583},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.46723562479019165},{"id":"https://openalex.org/C2778012447","wikidata":"https://www.wikidata.org/wiki/Q1034415","display_name":"Scope (computer science)","level":2,"score":0.44594821333885193},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.4422944188117981},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.4305300712585449},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.20644667744636536},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.10981318354606628},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C18903297","wikidata":"https://www.wikidata.org/wiki/Q7150","display_name":"Ecology","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1155/2020/8897098","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2020/8897098","pdf_url":"https://downloads.hindawi.com/journals/scn/2020/8897098.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:c7dc20715da148529e0b3a8d343936f0","is_oa":true,"landing_page_url":"https://doaj.org/article/c7dc20715da148529e0b3a8d343936f0","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Security and Communication Networks, Vol 2020 (2020)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1155/2020/8897098","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2020/8897098","pdf_url":"https://downloads.hindawi.com/journals/scn/2020/8897098.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.8999999761581421,"id":"https://metadata.un.org/sdg/7","display_name":"Affordable and clean energy"}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3100122486.pdf","grobid_xml":"https://content.openalex.org/works/W3100122486.grobid-xml"},"referenced_works_count":34,"referenced_works":["https://openalex.org/W91206318","https://openalex.org/W1486413656","https://openalex.org/W1921093919","https://openalex.org/W1992522710","https://openalex.org/W1994787131","https://openalex.org/W2004641176","https://openalex.org/W2022838001","https://openalex.org/W2050574537","https://openalex.org/W2068691410","https://openalex.org/W2111619626","https://openalex.org/W2131509700","https://openalex.org/W2135126436","https://openalex.org/W2155285218","https://openalex.org/W2206647656","https://openalex.org/W2286681216","https://openalex.org/W2318808783","https://openalex.org/W2483237840","https://openalex.org/W2555010610","https://openalex.org/W2595803390","https://openalex.org/W2625691825","https://openalex.org/W2626308730","https://openalex.org/W2702434543","https://openalex.org/W2749294837","https://openalex.org/W2761952776","https://openalex.org/W2771014575","https://openalex.org/W2783313081","https://openalex.org/W2790895699","https://openalex.org/W2791810553","https://openalex.org/W2803186631","https://openalex.org/W2975189723","https://openalex.org/W3019422176","https://openalex.org/W3020958420","https://openalex.org/W3021046105","https://openalex.org/W3048095951"],"related_works":["https://openalex.org/W4387497383","https://openalex.org/W3183948672","https://openalex.org/W3173606202","https://openalex.org/W3110381201","https://openalex.org/W2948807893","https://openalex.org/W2935909890","https://openalex.org/W2778153218","https://openalex.org/W2758277628","https://openalex.org/W1531601525","https://openalex.org/W2998478967"],"abstract_inverted_index":{"The":[0],"Internet":[1],"of":[2,71,92,100,140,158],"Things":[3],"(IoT)":[4],"is":[5,143,171],"susceptible":[6],"to":[7,22,131,173],"several":[8],"identities,":[9],"primarily":[10],"based":[11],"on":[12,88,115,199],"attacks.":[13],"However,":[14],"these":[15],"attacks":[16],"are":[17],"controlling":[18],"for":[19,47,52,75,79,110,154,168,183,194],"IoT":[20,48],"due":[21],"extraordinary":[23],"growth":[24],"in":[25,95],"consumers\u2019":[26],"density":[27],"and":[28,98,127],"slight":[29],"analysis":[30],"with":[31,45],"low":[32],"power":[33,73],"access":[34],"nodes.":[35],"In":[36],"this":[37],"work,":[38],"we":[39,84,117],"explore":[40],"the":[41,68,76,86,89,96,138,155,165,180,185],"possible":[42],"flaws":[43],"associated":[44],"security":[46,151],"environment":[49],"insensitively":[50],"meant":[51],"transfer":[53],"conditions.":[54],"We":[55,145,187],"proposed":[56,166],"a":[57,63,147],"novel":[58],"design":[59],"aimed":[60],"at":[61],"detecting":[62],"spoofing":[64],"attack":[65,142],"that":[66,164],"inspects":[67],"probability":[69],"distributions":[70],"received":[72],"founded":[74],"regions":[77],"designed":[78],"mobile":[80],"(moving)":[81],"users.":[82],"Additionally,":[83],"examine":[85],"influence":[87],"Confidentiality":[90],"Scope":[91],"targeted":[93],"consumers":[94],"absence":[97],"presence":[99],"observer.":[101],"Our":[102],"approaches":[103],"were":[104],"done":[105],"through":[106],"simulation":[107,192],"results":[108,162,193],"used":[109],"three":[111],"diverse":[112],"regions.":[113],"Grounded":[114],"outcomes,":[116],"suggest":[118],"an":[119,141],"algorithm":[120,167],"called":[121],"MTFLA,":[122],"which":[123],"will":[124],"guarantee":[125],"detection":[126],"protection":[128,169],"techniques":[129,190],"intended":[130],"protect":[132],"vastly":[133],"sensitive":[134,195],"areas,":[135],"i.e.,":[136],"wherever":[137],"chance":[139],"maximized.":[144],"provide":[146],"comparison":[148],"among":[149],"various":[150],"algorithms":[152],"prepared":[153],"energy":[156,181],"consumption":[157],"different":[159],"patterns.":[160],"Simulation":[161],"revealed":[163],"(MTFL)":[170],"verified":[172],"be":[174],"energy-proficient":[175],"(secure":[176],"garnering).":[177],"It":[178],"decreases":[179],"prerequisite":[182],"encrypting":[184],"data.":[186],"evaluated":[188],"our":[189],"over":[191],"region":[196],"information":[197],"built":[198],"fuzzy":[200],"logic.":[201]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":7},{"year":2022,"cited_by_count":13},{"year":2021,"cited_by_count":23}],"updated_date":"2026-04-17T18:11:37.981687","created_date":"2025-10-10T00:00:00"}
