An IoT-Enabled Intelligent and Secure Manufacturing Model Using Blockchain in Hybrid Cloud Communication System Article Swipe
YOU?
·
· 2023
· Open Access
·
· DOI: https://doi.org/10.1155/2023/7556728
The smart manufacturing system can become a linked network with the help of the Internet of Things (IoT). Devices connected to the IoT are susceptible to various attacks and assaults. An effective protection plan is needed to ensure that the billions of IoT nodes are protected from these hazards. The security mechanisms on IoT devices are ineffective due to resource limitations. As a result, the academic community has recently paid attention to the cloud-, fog-, and edge-based IoT systems. A robust cloud provider is in the cloud or fog to perform computationally demanding activities, including safety, data analysis, decision-making process, and monitoring. Hash identities and upgraded Rivest–Shamir–Adleman (RSA) have been used to secure the IoT device’s data. A four-prime integer of 512 bits makes up the proposed security algorithm. A hash signature is used to provide device authentication. An effective clustering method for sensing devices based on the node level, separation from the clusters, remaining energy, and fitness has been presented for long network life. The suggested swarm-based method determines the sensor nodes’ fitness. A deep neural network- (DNN-) based resource scheduling algorithm (DNN-RSM) is meant to reduce the delay and communications overhead for IoT components in the hybrid cloud system. For optimum resource allocation, all queries originating from the cluster head are categorised using DNN based on their storage, processing, and bandwidth needs. The suggested structure delivers better outcomes, particularly regarding energy use, delay, and safety level. The results of the simulation provide credence to the concept that the proposed strategy is superior to the current system. The suggested scheme includes stringent security, decreased energy usage, decreased latency, and efficient resource utilization.
Related Topics
- Type
- article
- Language
- en
- Landing Page
- https://doi.org/10.1155/2023/7556728
- https://downloads.hindawi.com/journals/scn/2023/7556728.pdf
- OA Status
- hybrid
- Cited By
- 6
- References
- 30
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W4379057736
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W4379057736Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.1155/2023/7556728Digital Object Identifier
- Title
-
An IoT-Enabled Intelligent and Secure Manufacturing Model Using Blockchain in Hybrid Cloud Communication SystemWork title
- Type
-
articleOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2023Year of publication
- Publication date
-
2023-06-01Full publication date if available
- Authors
-
Sudipto Bhattacharyya, Senthil Athithan, Souvik Pal, Bikramjit Sarkar, D. Akila, S. Chowdhury, Karthik Chandran, Gurusamy SaravanakumarList of authors in order
- Landing page
-
https://doi.org/10.1155/2023/7556728Publisher landing page
- PDF URL
-
https://downloads.hindawi.com/journals/scn/2023/7556728.pdfDirect link to full text PDF
- Open access
-
YesWhether a free full text is available
- OA status
-
hybridOpen access status per OpenAlex
- OA URL
-
https://downloads.hindawi.com/journals/scn/2023/7556728.pdfDirect OA link when available
- Concepts
-
Computer science, Cloud computing, Distributed computing, Computer network, Overhead (engineering), Hash function, Computer security, Operating systemTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
6Total citation count in OpenAlex
- Citations by year (recent)
-
2025: 1, 2024: 4, 2023: 1Per-year citation counts (last 5 years)
- References (count)
-
30Number of works referenced by this work
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W4379057736 |
|---|---|
| doi | https://doi.org/10.1155/2023/7556728 |
| ids.doi | https://doi.org/10.1155/2023/7556728 |
| ids.openalex | https://openalex.org/W4379057736 |
| fwci | 2.63731375 |
| type | article |
| title | An IoT-Enabled Intelligent and Secure Manufacturing Model Using Blockchain in Hybrid Cloud Communication System |
| biblio.issue | |
| biblio.volume | 2023 |
| biblio.last_page | 12 |
| biblio.first_page | 1 |
| topics[0].id | https://openalex.org/T10273 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 0.9934999942779541 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1705 |
| topics[0].subfield.display_name | Computer Networks and Communications |
| topics[0].display_name | IoT and Edge/Fog Computing |
| topics[1].id | https://openalex.org/T10270 |
| topics[1].field.id | https://openalex.org/fields/17 |
| topics[1].field.display_name | Computer Science |
| topics[1].score | 0.9908000230789185 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1710 |
| topics[1].subfield.display_name | Information Systems |
| topics[1].display_name | Blockchain Technology Applications and Security |
| topics[2].id | https://openalex.org/T13038 |
| topics[2].field.id | https://openalex.org/fields/17 |
| topics[2].field.display_name | Computer Science |
| topics[2].score | 0.9905999898910522 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/1710 |
| topics[2].subfield.display_name | Information Systems |
| topics[2].display_name | Internet of Things and AI |
| is_xpac | False |
| apc_list.value | 2100 |
| apc_list.currency | USD |
| apc_list.value_usd | 2100 |
| apc_paid.value | 2100 |
| apc_paid.currency | USD |
| apc_paid.value_usd | 2100 |
| concepts[0].id | https://openalex.org/C41008148 |
| concepts[0].level | 0 |
| concepts[0].score | 0.8903372287750244 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[0].display_name | Computer science |
| concepts[1].id | https://openalex.org/C79974875 |
| concepts[1].level | 2 |
| concepts[1].score | 0.6587496399879456 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q483639 |
| concepts[1].display_name | Cloud computing |
| concepts[2].id | https://openalex.org/C120314980 |
| concepts[2].level | 1 |
| concepts[2].score | 0.4751860201358795 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q180634 |
| concepts[2].display_name | Distributed computing |
| concepts[3].id | https://openalex.org/C31258907 |
| concepts[3].level | 1 |
| concepts[3].score | 0.47094476222991943 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q1301371 |
| concepts[3].display_name | Computer network |
| concepts[4].id | https://openalex.org/C2779960059 |
| concepts[4].level | 2 |
| concepts[4].score | 0.46955516934394836 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q7113681 |
| concepts[4].display_name | Overhead (engineering) |
| concepts[5].id | https://openalex.org/C99138194 |
| concepts[5].level | 2 |
| concepts[5].score | 0.4595796465873718 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q183427 |
| concepts[5].display_name | Hash function |
| concepts[6].id | https://openalex.org/C38652104 |
| concepts[6].level | 1 |
| concepts[6].score | 0.28022825717926025 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[6].display_name | Computer security |
| concepts[7].id | https://openalex.org/C111919701 |
| concepts[7].level | 1 |
| concepts[7].score | 0.0 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q9135 |
| concepts[7].display_name | Operating system |
| keywords[0].id | https://openalex.org/keywords/computer-science |
| keywords[0].score | 0.8903372287750244 |
| keywords[0].display_name | Computer science |
| keywords[1].id | https://openalex.org/keywords/cloud-computing |
| keywords[1].score | 0.6587496399879456 |
| keywords[1].display_name | Cloud computing |
| keywords[2].id | https://openalex.org/keywords/distributed-computing |
| keywords[2].score | 0.4751860201358795 |
| keywords[2].display_name | Distributed computing |
| keywords[3].id | https://openalex.org/keywords/computer-network |
| keywords[3].score | 0.47094476222991943 |
| keywords[3].display_name | Computer network |
| keywords[4].id | https://openalex.org/keywords/overhead |
| keywords[4].score | 0.46955516934394836 |
| keywords[4].display_name | Overhead (engineering) |
| keywords[5].id | https://openalex.org/keywords/hash-function |
| keywords[5].score | 0.4595796465873718 |
| keywords[5].display_name | Hash function |
| keywords[6].id | https://openalex.org/keywords/computer-security |
| keywords[6].score | 0.28022825717926025 |
| keywords[6].display_name | Computer security |
| language | en |
| locations[0].id | doi:10.1155/2023/7556728 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S120683614 |
| locations[0].source.issn | 1939-0114, 1939-0122 |
| locations[0].source.type | journal |
| locations[0].source.is_oa | False |
| locations[0].source.issn_l | 1939-0114 |
| locations[0].source.is_core | True |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | Security and Communication Networks |
| locations[0].source.host_organization | https://openalex.org/P4310319869 |
| locations[0].source.host_organization_name | Hindawi Publishing Corporation |
| locations[0].source.host_organization_lineage | https://openalex.org/P4310319869 |
| locations[0].source.host_organization_lineage_names | Hindawi Publishing Corporation |
| locations[0].license | cc-by |
| locations[0].pdf_url | https://downloads.hindawi.com/journals/scn/2023/7556728.pdf |
| locations[0].version | publishedVersion |
| locations[0].raw_type | journal-article |
| locations[0].license_id | https://openalex.org/licenses/cc-by |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | Security and Communication Networks |
| locations[0].landing_page_url | https://doi.org/10.1155/2023/7556728 |
| indexed_in | crossref |
| authorships[0].author.id | https://openalex.org/A5071152566 |
| authorships[0].author.orcid | https://orcid.org/0000-0003-1640-0669 |
| authorships[0].author.display_name | Sudipto Bhattacharyya |
| authorships[0].affiliations[0].raw_affiliation_string | Department of Computer Science and Engineering, Global Institute of Management and Technology, Krishnagar, India |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Sudipto Bhattacharyya |
| authorships[0].is_corresponding | False |
| authorships[0].raw_affiliation_strings | Department of Computer Science and Engineering, Global Institute of Management and Technology, Krishnagar, India |
| authorships[1].author.id | https://openalex.org/A5001194632 |
| authorships[1].author.orcid | https://orcid.org/0000-0002-8344-7611 |
| authorships[1].author.display_name | Senthil Athithan |
| authorships[1].countries | IN |
| authorships[1].affiliations[0].institution_ids | https://openalex.org/I875944469 |
| authorships[1].affiliations[0].raw_affiliation_string | Department of Computer Science and Engineering, Koneru Lakshmaiah Education Foundation, Vaddeswaram, Andhra Pradesh, India |
| authorships[1].institutions[0].id | https://openalex.org/I875944469 |
| authorships[1].institutions[0].ror | https://ror.org/02k949197 |
| authorships[1].institutions[0].type | education |
| authorships[1].institutions[0].lineage | https://openalex.org/I875944469 |
| authorships[1].institutions[0].country_code | IN |
| authorships[1].institutions[0].display_name | Koneru Lakshmaiah Education Foundation |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | Senthil Athithan |
| authorships[1].is_corresponding | False |
| authorships[1].raw_affiliation_strings | Department of Computer Science and Engineering, Koneru Lakshmaiah Education Foundation, Vaddeswaram, Andhra Pradesh, India |
| authorships[2].author.id | https://openalex.org/A5021446916 |
| authorships[2].author.orcid | https://orcid.org/0000-0001-9884-0160 |
| authorships[2].author.display_name | Souvik Pal |
| authorships[2].countries | IN |
| authorships[2].affiliations[0].institution_ids | https://openalex.org/I112754052 |
| authorships[2].affiliations[0].raw_affiliation_string | Sambalpur University, Sambalpur, India |
| authorships[2].affiliations[1].raw_affiliation_string | Department of Computer Science and Engineering, Sister Nivedita University, Kolkata, India |
| authorships[2].institutions[0].id | https://openalex.org/I112754052 |
| authorships[2].institutions[0].ror | https://ror.org/04s222234 |
| authorships[2].institutions[0].type | education |
| authorships[2].institutions[0].lineage | https://openalex.org/I112754052 |
| authorships[2].institutions[0].country_code | IN |
| authorships[2].institutions[0].display_name | Sambalpur University |
| authorships[2].author_position | middle |
| authorships[2].raw_author_name | Souvik Pal |
| authorships[2].is_corresponding | False |
| authorships[2].raw_affiliation_strings | Department of Computer Science and Engineering, Sister Nivedita University, Kolkata, India, Sambalpur University, Sambalpur, India |
| authorships[3].author.id | https://openalex.org/A5028879938 |
| authorships[3].author.orcid | https://orcid.org/0000-0002-6036-942X |
| authorships[3].author.display_name | Bikramjit Sarkar |
| authorships[3].countries | IN |
| authorships[3].affiliations[0].institution_ids | https://openalex.org/I77501641 |
| authorships[3].affiliations[0].raw_affiliation_string | Department of Computer Science and Engineering, JIS College of Engineering, Kalyani, India |
| authorships[3].institutions[0].id | https://openalex.org/I77501641 |
| authorships[3].institutions[0].ror | https://ror.org/03v783k16 |
| authorships[3].institutions[0].type | education |
| authorships[3].institutions[0].lineage | https://openalex.org/I77501641 |
| authorships[3].institutions[0].country_code | IN |
| authorships[3].institutions[0].display_name | University of Kalyani |
| authorships[3].author_position | middle |
| authorships[3].raw_author_name | Bikramjit Sarkar |
| authorships[3].is_corresponding | False |
| authorships[3].raw_affiliation_strings | Department of Computer Science and Engineering, JIS College of Engineering, Kalyani, India |
| authorships[4].author.id | https://openalex.org/A5066647758 |
| authorships[4].author.orcid | |
| authorships[4].author.display_name | D. Akila |
| authorships[4].countries | IN |
| authorships[4].affiliations[0].institution_ids | https://openalex.org/I85461943 |
| authorships[4].affiliations[0].raw_affiliation_string | Department of Computer Applications, Saveetha College of Liberal Arts and Sciences, SIMATS Deemed University, Chennai, India |
| authorships[4].institutions[0].id | https://openalex.org/I85461943 |
| authorships[4].institutions[0].ror | https://ror.org/0034me914 |
| authorships[4].institutions[0].type | education |
| authorships[4].institutions[0].lineage | https://openalex.org/I85461943 |
| authorships[4].institutions[0].country_code | IN |
| authorships[4].institutions[0].display_name | Saveetha University |
| authorships[4].author_position | middle |
| authorships[4].raw_author_name | D. Akila |
| authorships[4].is_corresponding | False |
| authorships[4].raw_affiliation_strings | Department of Computer Applications, Saveetha College of Liberal Arts and Sciences, SIMATS Deemed University, Chennai, India |
| authorships[5].author.id | https://openalex.org/A5103195010 |
| authorships[5].author.orcid | https://orcid.org/0000-0001-5679-3140 |
| authorships[5].author.display_name | S. Chowdhury |
| authorships[5].affiliations[0].raw_affiliation_string | Department of Computer Science and Engineering, Sreenivasa Institute of Technology and Management Studies, Chittoor, Andra Pradesh, India |
| authorships[5].author_position | middle |
| authorships[5].raw_author_name | Subrata Chowdhury |
| authorships[5].is_corresponding | True |
| authorships[5].raw_affiliation_strings | Department of Computer Science and Engineering, Sreenivasa Institute of Technology and Management Studies, Chittoor, Andra Pradesh, India |
| authorships[6].author.id | https://openalex.org/A5101820113 |
| authorships[6].author.orcid | https://orcid.org/0000-0002-4676-2540 |
| authorships[6].author.display_name | Karthik Chandran |
| authorships[6].countries | IN |
| authorships[6].affiliations[0].institution_ids | https://openalex.org/I133769559 |
| authorships[6].affiliations[0].raw_affiliation_string | Department of Robotics and Automation, Jyothi Engineering College, Thrissur, Kerala, India |
| authorships[6].institutions[0].id | https://openalex.org/I133769559 |
| authorships[6].institutions[0].ror | https://ror.org/016je1253 |
| authorships[6].institutions[0].type | education |
| authorships[6].institutions[0].lineage | https://openalex.org/I133769559 |
| authorships[6].institutions[0].country_code | IN |
| authorships[6].institutions[0].display_name | Government Medical College |
| authorships[6].author_position | middle |
| authorships[6].raw_author_name | Karthik Chandran |
| authorships[6].is_corresponding | False |
| authorships[6].raw_affiliation_strings | Department of Robotics and Automation, Jyothi Engineering College, Thrissur, Kerala, India |
| authorships[7].author.id | https://openalex.org/A5055484623 |
| authorships[7].author.orcid | |
| authorships[7].author.display_name | Gurusamy Saravanakumar |
| authorships[7].affiliations[0].raw_affiliation_string | Department of Electrical and Electronics Technology, Federal TVET Institute, Addis Ababa, Ethiopia |
| authorships[7].author_position | last |
| authorships[7].raw_author_name | Saravanakumar Gurusamy |
| authorships[7].is_corresponding | True |
| authorships[7].raw_affiliation_strings | Department of Electrical and Electronics Technology, Federal TVET Institute, Addis Ababa, Ethiopia |
| has_content.pdf | True |
| has_content.grobid_xml | True |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://downloads.hindawi.com/journals/scn/2023/7556728.pdf |
| open_access.oa_status | hybrid |
| open_access.any_repository_has_fulltext | False |
| created_date | 2023-06-02T00:00:00 |
| display_name | An IoT-Enabled Intelligent and Secure Manufacturing Model Using Blockchain in Hybrid Cloud Communication System |
| has_fulltext | True |
| is_retracted | True |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T10273 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 0.9934999942779541 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1705 |
| primary_topic.subfield.display_name | Computer Networks and Communications |
| primary_topic.display_name | IoT and Edge/Fog Computing |
| related_works | https://openalex.org/W4244478748, https://openalex.org/W4223488648, https://openalex.org/W2134969820, https://openalex.org/W2251605416, https://openalex.org/W4389340727, https://openalex.org/W4205786897, https://openalex.org/W3150465815, https://openalex.org/W2802581102, https://openalex.org/W1997222214, https://openalex.org/W2070395303 |
| cited_by_count | 6 |
| counts_by_year[0].year | 2025 |
| counts_by_year[0].cited_by_count | 1 |
| counts_by_year[1].year | 2024 |
| counts_by_year[1].cited_by_count | 4 |
| counts_by_year[2].year | 2023 |
| counts_by_year[2].cited_by_count | 1 |
| locations_count | 1 |
| best_oa_location.id | doi:10.1155/2023/7556728 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S120683614 |
| best_oa_location.source.issn | 1939-0114, 1939-0122 |
| best_oa_location.source.type | journal |
| best_oa_location.source.is_oa | False |
| best_oa_location.source.issn_l | 1939-0114 |
| best_oa_location.source.is_core | True |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | Security and Communication Networks |
| best_oa_location.source.host_organization | https://openalex.org/P4310319869 |
| best_oa_location.source.host_organization_name | Hindawi Publishing Corporation |
| best_oa_location.source.host_organization_lineage | https://openalex.org/P4310319869 |
| best_oa_location.source.host_organization_lineage_names | Hindawi Publishing Corporation |
| best_oa_location.license | cc-by |
| best_oa_location.pdf_url | https://downloads.hindawi.com/journals/scn/2023/7556728.pdf |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | journal-article |
| best_oa_location.license_id | https://openalex.org/licenses/cc-by |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | Security and Communication Networks |
| best_oa_location.landing_page_url | https://doi.org/10.1155/2023/7556728 |
| primary_location.id | doi:10.1155/2023/7556728 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S120683614 |
| primary_location.source.issn | 1939-0114, 1939-0122 |
| primary_location.source.type | journal |
| primary_location.source.is_oa | False |
| primary_location.source.issn_l | 1939-0114 |
| primary_location.source.is_core | True |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | Security and Communication Networks |
| primary_location.source.host_organization | https://openalex.org/P4310319869 |
| primary_location.source.host_organization_name | Hindawi Publishing Corporation |
| primary_location.source.host_organization_lineage | https://openalex.org/P4310319869 |
| primary_location.source.host_organization_lineage_names | Hindawi Publishing Corporation |
| primary_location.license | cc-by |
| primary_location.pdf_url | https://downloads.hindawi.com/journals/scn/2023/7556728.pdf |
| primary_location.version | publishedVersion |
| primary_location.raw_type | journal-article |
| primary_location.license_id | https://openalex.org/licenses/cc-by |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | Security and Communication Networks |
| primary_location.landing_page_url | https://doi.org/10.1155/2023/7556728 |
| publication_date | 2023-06-01 |
| publication_year | 2023 |
| referenced_works | https://openalex.org/W2945357379, https://openalex.org/W2916963250, https://openalex.org/W3036425307, https://openalex.org/W2788276261, https://openalex.org/W2953287140, https://openalex.org/W3113491849, https://openalex.org/W2946471309, https://openalex.org/W3004197293, https://openalex.org/W2940867210, https://openalex.org/W2944083578, https://openalex.org/W3033176519, https://openalex.org/W2890982116, https://openalex.org/W2999044580, https://openalex.org/W2976509638, https://openalex.org/W2990913508, https://openalex.org/W2962969396, https://openalex.org/W3189400418, https://openalex.org/W2894453619, https://openalex.org/W2613484160, https://openalex.org/W2980182496, https://openalex.org/W3085854806, https://openalex.org/W3126575951, https://openalex.org/W3129986604, https://openalex.org/W4290471671, https://openalex.org/W2980126319, https://openalex.org/W4224322353, https://openalex.org/W4284895726, https://openalex.org/W4220986870, https://openalex.org/W4205858455, https://openalex.org/W4206364378 |
| referenced_works_count | 30 |
| abstract_inverted_index.A | 79, 117, 129, 174 |
| abstract_inverted_index.a | 6, 62 |
| abstract_inverted_index.An | 30, 138 |
| abstract_inverted_index.As | 61 |
| abstract_inverted_index.in | 84, 196 |
| abstract_inverted_index.is | 34, 83, 132, 184, 252 |
| abstract_inverted_index.of | 12, 15, 41, 120, 240 |
| abstract_inverted_index.on | 52, 146, 217 |
| abstract_inverted_index.or | 87 |
| abstract_inverted_index.to | 20, 25, 36, 58, 71, 89, 111, 134, 186, 245, 254 |
| abstract_inverted_index.up | 124 |
| abstract_inverted_index.512 | 121 |
| abstract_inverted_index.DNN | 215 |
| abstract_inverted_index.For | 201 |
| abstract_inverted_index.IoT | 22, 42, 53, 77, 114, 194 |
| abstract_inverted_index.The | 0, 49, 165, 224, 238, 258 |
| abstract_inverted_index.all | 205 |
| abstract_inverted_index.and | 28, 75, 100, 104, 156, 190, 221, 235, 269 |
| abstract_inverted_index.are | 23, 44, 55, 212 |
| abstract_inverted_index.can | 4 |
| abstract_inverted_index.due | 57 |
| abstract_inverted_index.fog | 88 |
| abstract_inverted_index.for | 142, 161, 193 |
| abstract_inverted_index.has | 67, 158 |
| abstract_inverted_index.the | 10, 13, 21, 39, 64, 72, 85, 113, 125, 147, 152, 170, 188, 197, 209, 241, 246, 249, 255 |
| abstract_inverted_index.Hash | 102 |
| abstract_inverted_index.been | 109, 159 |
| abstract_inverted_index.bits | 122 |
| abstract_inverted_index.data | 96 |
| abstract_inverted_index.deep | 175 |
| abstract_inverted_index.from | 46, 151, 208 |
| abstract_inverted_index.hash | 130 |
| abstract_inverted_index.have | 108 |
| abstract_inverted_index.head | 211 |
| abstract_inverted_index.help | 11 |
| abstract_inverted_index.long | 162 |
| abstract_inverted_index.node | 148 |
| abstract_inverted_index.paid | 69 |
| abstract_inverted_index.plan | 33 |
| abstract_inverted_index.that | 38, 248 |
| abstract_inverted_index.use, | 233 |
| abstract_inverted_index.used | 110, 133 |
| abstract_inverted_index.with | 9 |
| abstract_inverted_index.(RSA) | 107 |
| abstract_inverted_index.based | 145, 179, 216 |
| abstract_inverted_index.cloud | 81, 86, 199 |
| abstract_inverted_index.data. | 116 |
| abstract_inverted_index.delay | 189 |
| abstract_inverted_index.fog-, | 74 |
| abstract_inverted_index.life. | 164 |
| abstract_inverted_index.makes | 123 |
| abstract_inverted_index.meant | 185 |
| abstract_inverted_index.nodes | 43 |
| abstract_inverted_index.smart | 1 |
| abstract_inverted_index.their | 218 |
| abstract_inverted_index.these | 47 |
| abstract_inverted_index.using | 214 |
| abstract_inverted_index.(DNN-) | 178 |
| abstract_inverted_index.(IoT). | 17 |
| abstract_inverted_index.Things | 16 |
| abstract_inverted_index.become | 5 |
| abstract_inverted_index.better | 228 |
| abstract_inverted_index.delay, | 234 |
| abstract_inverted_index.device | 136 |
| abstract_inverted_index.energy | 232, 265 |
| abstract_inverted_index.ensure | 37 |
| abstract_inverted_index.hybrid | 198 |
| abstract_inverted_index.level, | 149 |
| abstract_inverted_index.level. | 237 |
| abstract_inverted_index.linked | 7 |
| abstract_inverted_index.method | 141, 168 |
| abstract_inverted_index.needed | 35 |
| abstract_inverted_index.needs. | 223 |
| abstract_inverted_index.neural | 176 |
| abstract_inverted_index.reduce | 187 |
| abstract_inverted_index.robust | 80 |
| abstract_inverted_index.safety | 236 |
| abstract_inverted_index.scheme | 260 |
| abstract_inverted_index.secure | 112 |
| abstract_inverted_index.sensor | 171 |
| abstract_inverted_index.system | 3 |
| abstract_inverted_index.usage, | 266 |
| abstract_inverted_index.Devices | 18 |
| abstract_inverted_index.attacks | 27 |
| abstract_inverted_index.cloud-, | 73 |
| abstract_inverted_index.cluster | 210 |
| abstract_inverted_index.concept | 247 |
| abstract_inverted_index.current | 256 |
| abstract_inverted_index.devices | 54, 144 |
| abstract_inverted_index.energy, | 155 |
| abstract_inverted_index.fitness | 157 |
| abstract_inverted_index.integer | 119 |
| abstract_inverted_index.network | 8, 163 |
| abstract_inverted_index.optimum | 202 |
| abstract_inverted_index.perform | 90 |
| abstract_inverted_index.provide | 135, 243 |
| abstract_inverted_index.queries | 206 |
| abstract_inverted_index.result, | 63 |
| abstract_inverted_index.results | 239 |
| abstract_inverted_index.safety, | 95 |
| abstract_inverted_index.sensing | 143 |
| abstract_inverted_index.system. | 200, 257 |
| abstract_inverted_index.various | 26 |
| abstract_inverted_index.Internet | 14 |
| abstract_inverted_index.academic | 65 |
| abstract_inverted_index.billions | 40 |
| abstract_inverted_index.credence | 244 |
| abstract_inverted_index.delivers | 227 |
| abstract_inverted_index.fitness. | 173 |
| abstract_inverted_index.hazards. | 48 |
| abstract_inverted_index.includes | 261 |
| abstract_inverted_index.latency, | 268 |
| abstract_inverted_index.network- | 177 |
| abstract_inverted_index.nodes’ | 172 |
| abstract_inverted_index.overhead | 192 |
| abstract_inverted_index.process, | 99 |
| abstract_inverted_index.proposed | 126, 250 |
| abstract_inverted_index.provider | 82 |
| abstract_inverted_index.recently | 68 |
| abstract_inverted_index.resource | 59, 180, 203, 271 |
| abstract_inverted_index.security | 50, 127 |
| abstract_inverted_index.storage, | 219 |
| abstract_inverted_index.strategy | 251 |
| abstract_inverted_index.superior | 253 |
| abstract_inverted_index.systems. | 78 |
| abstract_inverted_index.upgraded | 105 |
| abstract_inverted_index.(DNN-RSM) | 183 |
| abstract_inverted_index.algorithm | 182 |
| abstract_inverted_index.analysis, | 97 |
| abstract_inverted_index.assaults. | 29 |
| abstract_inverted_index.attention | 70 |
| abstract_inverted_index.bandwidth | 222 |
| abstract_inverted_index.clusters, | 153 |
| abstract_inverted_index.community | 66 |
| abstract_inverted_index.connected | 19 |
| abstract_inverted_index.decreased | 264, 267 |
| abstract_inverted_index.demanding | 92 |
| abstract_inverted_index.effective | 31, 139 |
| abstract_inverted_index.efficient | 270 |
| abstract_inverted_index.including | 94 |
| abstract_inverted_index.outcomes, | 229 |
| abstract_inverted_index.presented | 160 |
| abstract_inverted_index.protected | 45 |
| abstract_inverted_index.regarding | 231 |
| abstract_inverted_index.remaining | 154 |
| abstract_inverted_index.security, | 263 |
| abstract_inverted_index.signature | 131 |
| abstract_inverted_index.stringent | 262 |
| abstract_inverted_index.structure | 226 |
| abstract_inverted_index.suggested | 166, 225, 259 |
| abstract_inverted_index.algorithm. | 128 |
| abstract_inverted_index.clustering | 140 |
| abstract_inverted_index.components | 195 |
| abstract_inverted_index.determines | 169 |
| abstract_inverted_index.device’s | 115 |
| abstract_inverted_index.edge-based | 76 |
| abstract_inverted_index.four-prime | 118 |
| abstract_inverted_index.identities | 103 |
| abstract_inverted_index.mechanisms | 51 |
| abstract_inverted_index.protection | 32 |
| abstract_inverted_index.scheduling | 181 |
| abstract_inverted_index.separation | 150 |
| abstract_inverted_index.simulation | 242 |
| abstract_inverted_index.activities, | 93 |
| abstract_inverted_index.allocation, | 204 |
| abstract_inverted_index.categorised | 213 |
| abstract_inverted_index.ineffective | 56 |
| abstract_inverted_index.monitoring. | 101 |
| abstract_inverted_index.originating | 207 |
| abstract_inverted_index.processing, | 220 |
| abstract_inverted_index.susceptible | 24 |
| abstract_inverted_index.swarm-based | 167 |
| abstract_inverted_index.limitations. | 60 |
| abstract_inverted_index.particularly | 230 |
| abstract_inverted_index.utilization. | 272 |
| abstract_inverted_index.manufacturing | 2 |
| abstract_inverted_index.communications | 191 |
| abstract_inverted_index.authentication. | 137 |
| abstract_inverted_index.computationally | 91 |
| abstract_inverted_index.decision-making | 98 |
| abstract_inverted_index.Rivest–Shamir–Adleman | 106 |
| cited_by_percentile_year.max | 98 |
| cited_by_percentile_year.min | 89 |
| corresponding_author_ids | https://openalex.org/A5103195010, https://openalex.org/A5055484623 |
| countries_distinct_count | 1 |
| institutions_distinct_count | 8 |
| citation_normalized_percentile.value | 0.81941454 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | True |