{"id":"https://openalex.org/W4410058002","doi":"https://doi.org/10.32604/cmc.2025.064102","title":"Distributed Computing-Based Optimal Route Finding Algorithm for Trusted Devices in the Internet of Things","display_name":"Distributed Computing-Based Optimal Route Finding Algorithm for Trusted Devices in the Internet of Things","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4410058002","doi":"https://doi.org/10.32604/cmc.2025.064102"},"language":"en","primary_location":{"id":"doi:10.32604/cmc.2025.064102","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.064102","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://doi.org/10.32604/cmc.2025.064102","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5078354205","display_name":"Amal Al\u2010Rasheed","orcid":"https://orcid.org/0000-0002-4775-1798"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Amal Al-Rasheed","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5061761840","display_name":"Rahim Khan","orcid":"https://orcid.org/0000-0003-1631-6483"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Rahim Khan","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5088232762","display_name":"Fahad Alturise","orcid":"https://orcid.org/0000-0001-9176-7984"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Fahad Alturise","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5084306484","display_name":"Salem Alkhalaf","orcid":"https://orcid.org/0000-0002-5900-6752"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Salem Alkhalaf","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5078354205"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.14322461,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"84","issue":"1","first_page":"957","last_page":"973"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T14042","display_name":"Technology and Security Systems","score":0.557699978351593,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T14042","display_name":"Technology and Security Systems","score":0.557699978351593,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13731","display_name":"Advanced Computing and Algorithms","score":0.5234000086784363,"subfield":{"id":"https://openalex.org/subfields/3322","display_name":"Urban Studies"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T13535","display_name":"Wireless Sensor Networks and IoT","score":0.5120000243186951,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6714696884155273},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.6273679733276367},{"id":"https://openalex.org/keywords/trusted-computing","display_name":"Trusted Computing","score":0.4948272109031677},{"id":"https://openalex.org/keywords/direct-anonymous-attestation","display_name":"Direct Anonymous Attestation","score":0.48361435532569885},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.47589242458343506},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.47329822182655334},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4094209372997284},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.33550965785980225},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.2101430892944336}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6714696884155273},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.6273679733276367},{"id":"https://openalex.org/C2776831232","wikidata":"https://www.wikidata.org/wiki/Q966812","display_name":"Trusted Computing","level":2,"score":0.4948272109031677},{"id":"https://openalex.org/C169796023","wikidata":"https://www.wikidata.org/wiki/Q3708936","display_name":"Direct Anonymous Attestation","level":3,"score":0.48361435532569885},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.47589242458343506},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.47329822182655334},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4094209372997284},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.33550965785980225},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.2101430892944336}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.32604/cmc.2025.064102","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.064102","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.32604/cmc.2025.064102","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.064102","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W2316444051","https://openalex.org/W2804169147","https://openalex.org/W3006700075","https://openalex.org/W3121115029","https://openalex.org/W3200654197","https://openalex.org/W4312767306","https://openalex.org/W4313534844","https://openalex.org/W4324116470","https://openalex.org/W4378227637","https://openalex.org/W4383068127","https://openalex.org/W4391827202","https://openalex.org/W4392078769","https://openalex.org/W4399341996","https://openalex.org/W4400230265","https://openalex.org/W4404391034","https://openalex.org/W4406038548"],"related_works":["https://openalex.org/W2372678089","https://openalex.org/W2695299078","https://openalex.org/W2355956995","https://openalex.org/W2390768934","https://openalex.org/W2350048275","https://openalex.org/W2086874776","https://openalex.org/W2377235694","https://openalex.org/W2028268185","https://openalex.org/W2168345601","https://openalex.org/W2001281341"],"abstract_inverted_index":{"The":[0],"Internet":[1],"of":[2,84,225,240],"Things":[3],"(IoT)":[4],"is":[5,26,48,78,168,172,177,192,256],"a":[6,45,55,69,76,186],"smart":[7],"infrastructure":[8],"where":[9,194],"devices":[10,144,159],"share":[11],"captured":[12],"data":[13,101,226],"with":[14,50,179],"the":[15,28,81,85,92,103,133,136,139,148,152,203,211,217,221,230,235,253],"respective":[16,104],"server":[17,161,198],"or":[18],"edge":[19],"modules.":[20],"However,":[21],"secure":[22,56],"and":[23,119,150,160,197,223,250],"reliable":[24],"communication":[25,58,214,241],"among":[27],"challenging":[29],"tasks":[30],"in":[31,202,238,258],"these":[32,158],"networks,":[33],"as":[34,108],"shared":[35],"channels":[36],"are":[37,125],"used":[38,126],"to":[39,53,67,127,135,145,219],"transmit":[40],"packets.":[41],"In":[42,72],"this":[43,73,96,184],"paper,":[44],"decision":[46,187],"tree":[47],"integrated":[49],"other":[51],"metrics":[52],"form":[54,68],"distributed":[57,70,213],"strategy":[59],"for":[60],"IoT.":[61],"Initially,":[62],"every":[63,98,166,195],"device":[64,77,99,196],"works":[65],"collaboratively":[66],"network.":[71],"model,":[74],"if":[75,175],"deployed":[79],"outside":[80],"coverage":[82],"area":[83],"nearest":[86],"server,":[87],"it":[88,176],"communicates":[89],"indirectly":[90],"through":[91],"neighboring":[93,105],"devices.":[94],"For":[95,183],"purpose,":[97,185],"collects":[100],"from":[102,132,147],"devices,":[106],"such":[107],"hop":[109],"count,":[110],"average":[111],"packet":[112,167,247],"transmission":[113],"delay,":[114,246],"criticality":[115],"factor,":[116],"link":[117],"reliability,":[118],"RSSI":[120],"value,":[121],"etc.":[122],"These":[123],"parameters":[124],"find":[128],"an":[129,180],"optimal":[130,153],"route":[131],"source":[134],"destination.":[137],"Secondly,":[138],"proposed":[140,212,231,254],"approach":[141,215,232,255],"has":[142,216,233],"enabled":[143],"learn":[146],"environment":[149],"adjust":[151],"route-finding":[154],"formula":[155],"accordingly.":[156],"Moreover,":[157,229],"modules":[162],"must":[163,199],"ensure":[164,220],"that":[165,210],"transmitted":[169],"securely,":[170],"which":[171],"possible":[173],"only":[174],"encrypted":[178],"encryption":[181],"algorithm.":[182],"tree-enabled":[188],"device-to-server":[189],"authentication":[190],"algorithm":[191],"presented":[193],"take":[200],"part":[201],"offline":[204],"phase.":[205],"Simulation":[206],"results":[207],"have":[208],"verified":[209],"potential":[218],"integrity":[222],"confidentiality":[224],"during":[227],"transmission.":[228],"outperformed":[234],"existing":[236],"approaches":[237],"terms":[239],"cost,":[242],"processing":[243],"overhead,":[244],"end-to-end":[245],"loss":[248],"ratio,":[249],"throughput.":[251],"Finally,":[252],"adoptable":[257],"different":[259],"networking":[260],"infrastructures.":[261]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
