{"id":"https://openalex.org/W4399884925","doi":"https://doi.org/10.3233/idt-230650","title":"Improved ECC cryptosystem-based lightweight authentication for SDN-based edge computing in IoT-enabled healthcare systems","display_name":"Improved ECC cryptosystem-based lightweight authentication for SDN-based edge computing in IoT-enabled healthcare systems","publication_year":2024,"publication_date":"2024-06-21","ids":{"openalex":"https://openalex.org/W4399884925","doi":"https://doi.org/10.3233/idt-230650"},"language":"en","primary_location":{"id":"doi:10.3233/idt-230650","is_oa":false,"landing_page_url":"https://doi.org/10.3233/idt-230650","pdf_url":null,"source":{"id":"https://openalex.org/S119727669","display_name":"Intelligent Decision Technologies","issn_l":"1872-4981","issn":["1872-4981","1875-8843"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Intelligent Decision Technologies","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5110786008","display_name":"Amer Raja","orcid":null},"institutions":[{"id":"https://openalex.org/I65674248","display_name":"Visvesvaraya Technological University","ror":"https://ror.org/00ha14p11","country_code":"IN","type":"education","lineage":["https://openalex.org/I65674248"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Raja A","raw_affiliation_strings":["Department of Computer Science and Engineering, University Visvesvaraya College of Engineering, KR Circle, Bengaluru, Karnataka, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, University Visvesvaraya College of Engineering, KR Circle, Bengaluru, Karnataka, India","institution_ids":["https://openalex.org/I65674248"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008790456","display_name":"P M Prathibhavani","orcid":null},"institutions":[{"id":"https://openalex.org/I65674248","display_name":"Visvesvaraya Technological University","ror":"https://ror.org/00ha14p11","country_code":"IN","type":"education","lineage":["https://openalex.org/I65674248"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Prathibhavani P M","raw_affiliation_strings":["Department of Computer Science and Engineering, University Visvesvaraya College of Engineering, KR Circle, Bengaluru, Karnataka, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, University Visvesvaraya College of Engineering, KR Circle, Bengaluru, Karnataka, India","institution_ids":["https://openalex.org/I65674248"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5112344706","display_name":"K R Venugopal","orcid":"https://orcid.org/0000-0002-4660-047X"},"institutions":[{"id":"https://openalex.org/I65674248","display_name":"Visvesvaraya Technological University","ror":"https://ror.org/00ha14p11","country_code":"IN","type":"education","lineage":["https://openalex.org/I65674248"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Venugopal K R","raw_affiliation_strings":["Department of Computer Science and Engineering, University Visvesvaraya College of Engineering, KR Circle, Bengaluru, Karnataka, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, University Visvesvaraya College of Engineering, KR Circle, Bengaluru, Karnataka, India","institution_ids":["https://openalex.org/I65674248"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5110786008"],"corresponding_institution_ids":["https://openalex.org/I65674248"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.08634474,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"18","issue":"3","first_page":"2471","last_page":"2493"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9925000071525574,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13038","display_name":"Internet of Things and AI","score":0.9793000221252441,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7873722910881042},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.7500125765800476},{"id":"https://openalex.org/keywords/edge-computing","display_name":"Edge computing","score":0.6985259056091309},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.6464357972145081},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5552002191543579},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5362128019332886},{"id":"https://openalex.org/keywords/edge-device","display_name":"Edge device","score":0.5133447051048279},{"id":"https://openalex.org/keywords/elliptic-curve-cryptography","display_name":"Elliptic curve cryptography","score":0.46070992946624756},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3439188599586487},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.25847017765045166},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.2527354657649994},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.1979636251926422},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1874592900276184},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.16994008421897888},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.07579502463340759}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7873722910881042},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.7500125765800476},{"id":"https://openalex.org/C2778456923","wikidata":"https://www.wikidata.org/wiki/Q5337692","display_name":"Edge computing","level":3,"score":0.6985259056091309},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.6464357972145081},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5552002191543579},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5362128019332886},{"id":"https://openalex.org/C138236772","wikidata":"https://www.wikidata.org/wiki/Q25098575","display_name":"Edge device","level":3,"score":0.5133447051048279},{"id":"https://openalex.org/C167615521","wikidata":"https://www.wikidata.org/wiki/Q1048911","display_name":"Elliptic curve cryptography","level":4,"score":0.46070992946624756},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3439188599586487},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.25847017765045166},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.2527354657649994},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.1979636251926422},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1874592900276184},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.16994008421897888},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.07579502463340759}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.3233/idt-230650","is_oa":false,"landing_page_url":"https://doi.org/10.3233/idt-230650","pdf_url":null,"source":{"id":"https://openalex.org/S119727669","display_name":"Intelligent Decision Technologies","issn_l":"1872-4981","issn":["1872-4981","1875-8843"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Intelligent Decision Technologies","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.5}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":33,"referenced_works":["https://openalex.org/W2906199404","https://openalex.org/W3044050394","https://openalex.org/W3107860589","https://openalex.org/W3137711985","https://openalex.org/W3184412044","https://openalex.org/W3199380764","https://openalex.org/W3204239685","https://openalex.org/W4212871185","https://openalex.org/W4225290906","https://openalex.org/W4281654355","https://openalex.org/W4283073460","https://openalex.org/W4298396192","https://openalex.org/W4306145995","https://openalex.org/W4306408287","https://openalex.org/W4306631501","https://openalex.org/W4306735084","https://openalex.org/W4307722364","https://openalex.org/W4309047182","https://openalex.org/W4309479072","https://openalex.org/W4317629012","https://openalex.org/W4323263359","https://openalex.org/W4323275581","https://openalex.org/W4360980226","https://openalex.org/W4362571141","https://openalex.org/W4386049405","https://openalex.org/W4386173722","https://openalex.org/W4392369738","https://openalex.org/W6798633924","https://openalex.org/W6810291110","https://openalex.org/W6846198929","https://openalex.org/W6846294416","https://openalex.org/W6847383152","https://openalex.org/W6850173682"],"related_works":["https://openalex.org/W3154796165","https://openalex.org/W4322761281","https://openalex.org/W4238233472","https://openalex.org/W4313526662","https://openalex.org/W3111395152","https://openalex.org/W4312996489","https://openalex.org/W3106131444","https://openalex.org/W3216099748","https://openalex.org/W4205963435","https://openalex.org/W4313463379"],"abstract_inverted_index":{"The":[0,80],"Internet":[1],"of":[2,6,24,69,167,185,194,220],"Things":[3],"(IoT)":[4],"consists":[5],"smart":[7],"devices":[8,26,35,103,113],"with":[9,204],"limited":[10],"resources":[11],"that":[12],"can":[13,42],"identify":[14],"and":[15,27,77,91,104,170],"analyze":[16],"data.":[17],"In":[18],"IoT-enabled":[19,65],"healthcare":[20,38,66],"systems,":[21],"the":[22,28,37,102,108,117,123,127,137,155,160,165,171,183,186,192,195,211,214,230,234],"security":[23,55,236],"IoT":[25,112],"data":[29,110,156,172],"they":[30],"contain":[31],"is":[32,133,157,189,199],"complex.":[33],"These":[34],"in":[36,64,111,126,153],"industry,":[39],"edge":[40,62,75,105,119,129,161,168,187],"computing":[41,63,76,130],"provide":[43],"low-latency":[44],"information":[45],"services":[46],"at":[47],"a":[48,54,218],"reasonable":[49],"cost.":[50],"This":[51,132],"work":[52],"proposes":[53],"infrastructure":[56],"for":[57],"Software":[58],"Defined":[59],"Network":[60],"(SDN)-based":[61],"systems":[67],"consisting":[68],"three":[70],"steps:":[71],"Lightweight":[72,87],"authentication,":[73],"collaborative":[74,128],"job":[78,149],"migration.":[79],"lightweight":[81],"authentication":[82,100],"step":[83],"involves":[84],"both":[85],"Improved":[86,92],"Key":[88],"Management":[89],"(ILKM)":[90],"Elliptic":[93],"Curve":[94],"Cryptography":[95],"(IECC)":[96],"schemes":[97],"to":[98,116,159,175,206,244],"ensure":[99],"among":[101],"servers.":[106],"Moreover,":[107],"patient\u2019s":[109],"are":[114],"scheduled":[115],"appropriate":[118],"server":[120,162,188],"by":[121,163,178],"examining":[122],"load":[124],"balancing":[125],"phase.":[131],"done":[134],"optimally":[135],"using":[136],"adopted":[138],"hybrid":[139],"optimization":[140],"model,":[141],"Osprey":[142],"Assisted":[143],"Coati":[144],"Optimization":[145],"Algorithm":[146],"(OACOA).":[147],"Further,":[148],"migration":[150,180],"takes":[151],"place,":[152],"which":[154],"allocated":[158],"comparing":[164],"capacity":[166,184],"servers":[169,177],"gets":[173],"migrated":[174],"other":[176],"considering":[179,210],"cost":[181],"when":[182,242],"overloaded.":[190],"Finally,":[191],"efficiency":[193],"suggested":[196],"OACOA":[197,215,231],"scheme":[198,216],"evaluated":[200],"over":[201],"traditional":[202],"models":[203],"regard":[205],"several":[207],"metrics.":[208],"When":[209],"edge-server":[212,240],"30,":[213],"achieves":[217],"makespan":[219,227],"385,":[221],"while":[222],"conventional":[223],"methods":[224],"acquired":[225],"fewer":[226],"ratings.":[228],"Also,":[229],"approach":[232],"obtained":[233],"highest":[235],"ratings":[237],"(0.7143)":[238],"on":[239],"20":[241],"compared":[243],"existing":[245],"schemes.":[246]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
