{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T15:11:28Z","timestamp":1772118688945,"version":"3.50.1"},"reference-count":16,"publisher":"Wiley","issue":"6","license":[{"start":{"date-parts":[[2025,10,8]],"date-time":"2025-10-08T00:00:00Z","timestamp":1759881600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Internet Technology Letters"],"published-print":{"date-parts":[[2025,11]]},"abstract":"<jats:title>ABSTRACT<\/jats:title>\n                  <jats:p>Multimedia Wireless Sensor Networks (MWSNs) form a crucial backbone of smart cities, enabling real\u2010time data collection and communication across diverse applications. However, ensuring secure routing, authentication, and efficient data transmission remains a major challenge due to limited resources and susceptibility to malicious attacks. This study proposes a trust\u2010based routing and authentication framework that integrates lightweight cryptographic mechanisms with a three\u2010phase certification process involving key generation, encryption, and decryption. A Trust Authority (TA) manages node registration, certificate issuance, and revocation, while cluster head (CH) selection is optimized using energy and distance\u2010based formulations to balance load and reduce energy consumption. The model employs both identification\u2010based and control\u2010packet authentication, ensuring confidentiality, non\u2010repudiation, and protection against internal attacks. Experimental evaluation on MATLAB with 100\u2013500 sensor nodes and varying malicious ratios demonstrates that the proposed framework achieves higher detection accuracy, lower certification delay, reduced energy consumption, and improved throughput compared to existing approaches, making it suitable for secure smart city deployments.<\/jats:p>","DOI":"10.1002\/itl2.70160","type":"journal-article","created":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T03:54:36Z","timestamp":1759982076000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Secure Data Routing and Authentication Framework With Privacy Preservation for Multimedia Sensor Environments"],"prefix":"10.1002","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-7845-705X","authenticated-orcid":false,"given":"Rami","family":"Baazeem","sequence":"first","affiliation":[{"name":"Department of Management Information Systems (MIS) College of Business, University of Jeddah  Jeddah Makkah Kingdom of Saudi Arabia"}]}],"member":"311","published-online":{"date-parts":[[2025,10,8]]},"reference":[{"key":"e_1_2_8_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2024.3445728"},{"key":"e_1_2_8_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.119448"},{"key":"e_1_2_8_4_1","volume-title":"Multimedia Sensor Networks","author":"Kundur D.","year":"2006"},{"key":"e_1_2_8_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1027527.1027537"},{"key":"e_1_2_8_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2003.1251165"},{"key":"e_1_2_8_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/RTEICT.2017.8256859"},{"key":"e_1_2_8_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2005.6"},{"key":"e_1_2_8_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042\u2010017\u20105376\u20104"},{"key":"e_1_2_8_10_1","unstructured":"G.Kogut M.Blackburn andH. R.Everett \u201cUsing Video Sensor Networks to Command and Control Unmanned Ground Vehicles \u201dAUVSI Unmanned Systems in International Security (USIS) 2003 http:\/\/users.isr.ist.utl.pt\/\u223cjseq\/ResearchAtelier\/papers\/kogut\u2010usis03diva.pdf."},{"key":"e_1_2_8_11_1","doi-asserted-by":"publisher","DOI":"10.26599\/TST.2023.9010119"},{"key":"e_1_2_8_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICME.2004.1394688"},{"key":"e_1_2_8_13_1","doi-asserted-by":"crossref","unstructured":"Y.Wang G.Attebury andB.Ramamurthy \u201cA Survey of Security Issues in Wireless Sensor Networks \u201d2006 https:\/\/digitalcommons.unl.edu\/csearticles\/84\/.","DOI":"10.1109\/COMST.2006.315852"},{"key":"e_1_2_8_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/APCC.2004.1391793"},{"key":"e_1_2_8_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10586\u2010023\u201004211\u20107"},{"key":"e_1_2_8_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2022.108543"},{"key":"e_1_2_8_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-023-15956-z"}],"container-title":["Internet Technology Letters"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/itl2.70160","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,10]],"date-time":"2025-11-10T12:20:41Z","timestamp":1762777241000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/itl2.70160"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,8]]},"references-count":16,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2025,11]]}},"alternative-id":["10.1002\/itl2.70160"],"URL":"https:\/\/doi.org\/10.1002\/itl2.70160","archive":["Portico"],"relation":{"has-review":[{"id-type":"doi","id":"10.1002\/ITL2.70160\/v1\/decision1","asserted-by":"object"},{"id-type":"doi","id":"10.1002\/ITL2.70160\/v2\/response1","asserted-by":"object"},{"id-type":"doi","id":"10.1002\/ITL2.70160\/v2\/decision1","asserted-by":"object"},{"id-type":"doi","id":"10.1002\/ITL2.70160\/v2\/review1","asserted-by":"object"},{"id-type":"doi","id":"10.1002\/ITL2.70160\/v2\/review2","asserted-by":"object"},{"id-type":"doi","id":"10.1002\/ITL2.70160\/v1\/review1","asserted-by":"object"},{"id-type":"doi","id":"10.1002\/ITL2.70160\/v1\/review2","asserted-by":"object"}]},"ISSN":["2476-1508","2476-1508"],"issn-type":[{"value":"2476-1508","type":"print"},{"value":"2476-1508","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,8]]},"assertion":[{"value":"2025-06-26","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-09-22","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-10-08","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"e70160"}}