{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,28]],"date-time":"2025-05-28T04:18:24Z","timestamp":1748405904930,"version":"3.41.0"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,5,27]],"date-time":"2025-05-27T00:00:00Z","timestamp":1748304000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,5,27]],"date-time":"2025-05-27T00:00:00Z","timestamp":1748304000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Discov Computing"],"DOI":"10.1007\/s10791-025-09613-2","type":"journal-article","created":{"date-parts":[[2025,5,27]],"date-time":"2025-05-27T18:31:20Z","timestamp":1748370680000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A partially trusted relay-based method for siting key service nodes in a quantum key distribution network group"],"prefix":"10.1007","volume":"28","author":[{"given":"Yunjie","family":"Xiao","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Xiumin","family":"Zhao","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Weiyue","family":"Tong","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2025,5,27]]},"reference":[{"issue":"2","key":"9613_CR1","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1007\/s11107-023-01010-3","volume":"47","author":"P Kushwaha","year":"2024","unstructured":"Kushwaha P, Jain A, Varma P, et al. Impact of BB84 QKD transmitter\u2019s parameter mismatch on secure key generation rate. Photon Netw Commun. 2024;47(2):106\u201313. https:\/\/doi.org\/10.1007\/s11107-023-01010-3.","journal-title":"Photon Netw Commun"},{"key":"9613_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TSUSC.2024.3503580","volume":"11","author":"J Zhang","year":"2024","unstructured":"Zhang J, Zhang Z. Novel approach of vehicular cooperative communication based on strategy of interval type-2 fuzzy logic and cooperative game. IEEE Trans Sustain Comput. 2024;11:1\u201314. https:\/\/doi.org\/10.1109\/TSUSC.2024.3503580.","journal-title":"IEEE Trans Sustain Comput"},{"issue":"3","key":"9613_CR3","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1364\/JOCN.413918","volume":"13","author":"P Wright","year":"2021","unstructured":"Wright P, White C, Parker RC, et al. 5G network slicing with QKD and quantum-safe security. Opt Soc Am. 2021;13(3):33\u201340. https:\/\/doi.org\/10.1364\/JOCN.413918.","journal-title":"Opt Soc Am"},{"issue":"11","key":"9613_CR4","doi-asserted-by":"publisher","first-page":"938","DOI":"10.1364\/JOCN.503612","volume":"15","author":"M Wenning","year":"2023","unstructured":"Wenning M, Samonaki M, Mas-Machuca FC. Multi-layer optimization for QKD and key management networks. J Opt Commun nnetw. 2023;15(11):938\u201347. https:\/\/doi.org\/10.1364\/JOCN.503612.","journal-title":"J Opt Commun nnetw"},{"issue":"5","key":"9613_CR5","doi-asserted-by":"publisher","first-page":"2281","DOI":"10.1109\/tnet.2023.3246114","volume":"31","author":"MS Akhtar","year":"2023","unstructured":"Akhtar MS, Krishnakumar G, Sinha VB. Fast and secure routing algorithms for quantum key distribution networks. IEEE\/ACM Trans Netw A Joint Publ IEEE Commun Soc IEEE Comput Soc ACM Special Interest Group Data Commun. 2023;31(5):2281\u201396. https:\/\/doi.org\/10.1109\/tnet.2023.3246114.","journal-title":"IEEE\/ACM Trans Netw A Joint Publ IEEE Commun Soc IEEE Comput Soc ACM Special Interest Group Data Commun"},{"issue":"8","key":"9613_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s00340-023-08063-2","volume":"129","author":"Y Mizutani","year":"2023","unstructured":"Mizutani Y, Horikiri T. Nonlinear improvement of measurement-device-independent quantum key distribution using multimode quantum memory. Appl Phys B Lasers Opt. 2023;129(8):1\u20139. https:\/\/doi.org\/10.1007\/s00340-023-08063-2.","journal-title":"Appl Phys B Lasers Opt"},{"issue":"16","key":"9613_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1002\/dac.4713","volume":"35","author":"YMM John","year":"2021","unstructured":"John YMM, Ravi G. Real time regional mobility energy feature approximation-based secure routing for improved quality of service in MANET. Int J Commun Syst. 2021;35(16):1\u201312. https:\/\/doi.org\/10.1002\/dac.4713.","journal-title":"Int J Commun Syst"},{"issue":"2","key":"9613_CR8","doi-asserted-by":"publisher","first-page":"1815","DOI":"10.1007\/s11277-021-09432-w","volume":"124","author":"AFSJ Syed","year":"2022","unstructured":"Syed AFSJ, Lalitha T, Ahmad F, et al. Unital design based location service for subterranean network using long range topology. Wireless Pers Commun. 2022;124(2):1815\u201339. https:\/\/doi.org\/10.1007\/s11277-021-09432-w.","journal-title":"Wireless Pers Commun"},{"issue":"23","key":"9613_CR9","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1364\/AO.486818","volume":"62","author":"A Miloshevsky","year":"2023","unstructured":"Miloshevsky A, Wilson BA, Williams BP, Hooper DA, Grice WP, Peters NA. Space-based quantum networking in the presence of a nuclear disturbed environment. Appl Opt. 2023;62(23):60\u20138. https:\/\/doi.org\/10.1364\/AO.486818.","journal-title":"Appl Opt"},{"issue":"7","key":"9613_CR10","doi-asserted-by":"publisher","first-page":"188","DOI":"10.13182\/T126-38427","volume":"126","author":"K Gkouliaras","year":"2022","unstructured":"Gkouliaras K, Chatzidakis S. Evaluation of a QKD network structure suitable for secure communications for advanced nuclear reactors. Trans Am Nucl Soc. 2022;126(7):188\u201391. https:\/\/doi.org\/10.13182\/T126-38427.","journal-title":"Trans Am Nucl Soc"},{"issue":"183","key":"9613_CR11","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1016\/j.comcom.2021.11.012","volume":"2022","author":"CH Ni","year":"2022","unstructured":"Ni CH, Zhang J. A kind of novel edge computing architecture based on adaptive stratified sampling. Comput Commun. 2022;2022(183):121\u201335. https:\/\/doi.org\/10.1016\/j.comcom.2021.11.012.","journal-title":"Comput Commun"},{"issue":"5","key":"9613_CR12","doi-asserted-by":"publisher","first-page":"1377","DOI":"10.13052\/jwe1540-9589.2151","volume":"21","author":"KS Shim","year":"2022","unstructured":"Shim KS, Kim YH, Sohn I, et al. Design and validation of quantum key management system for construction of KREONET quantum cryptography communication. J Web Eng. 2022;21(5):1377\u2013417. https:\/\/doi.org\/10.13052\/jwe1540-9589.2151.","journal-title":"J Web Eng"},{"issue":"4","key":"9613_CR13","doi-asserted-by":"publisher","first-page":"407","DOI":"10.3233\/WEB-220104","volume":"21","author":"R Mahajan","year":"2023","unstructured":"Mahajan R, Chavan S, Khadkikar ABSA. A secure authentication protocol for healthcare service in IoT with Q-net based secret key generation. Web Intell Agent Syst. 2023;21(4):407\u201333. https:\/\/doi.org\/10.3233\/WEB-220104.","journal-title":"Web Intell Agent Syst"},{"issue":"4","key":"9613_CR14","doi-asserted-by":"publisher","first-page":"2439","DOI":"10.1007\/s11276-024-03674-9","volume":"30","author":"S Soundararajan","year":"2024","unstructured":"Soundararajan S, Nithya B, Nithya N, et al. Block chain espoused adaptive multi-scale dual attention network with quaternion fractional order meixner moments encryption for cyber security in wireless communication network. Wirel Netw (10220038). 2024;30(4):2439\u201355. https:\/\/doi.org\/10.1007\/s11276-024-03674-9.","journal-title":"Wirel Netw (10220038)"},{"issue":"166","key":"9613_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.adhoc.2024.103682","volume":"2025","author":"J Zhang","year":"2025","unstructured":"Zhang J, Zhang L. New routing method based on sticky bacteria algorithm and link stability for VANET. Ad Hoc Netw. 2025;2025(166):1\u201312. https:\/\/doi.org\/10.1016\/j.adhoc.2024.103682.","journal-title":"Ad Hoc Netw"},{"issue":"7","key":"9613_CR16","doi-asserted-by":"publisher","first-page":"530","DOI":"10.1038\/s41566-021-00811-0","volume":"15","author":"M Pittaluga","year":"2021","unstructured":"Pittaluga M, Minder M, Lucamarini M, et al. 600-km repeater-like quantum communications with dual-band stabilization. Nat Photonics. 2021;15(7):530\u20137. https:\/\/doi.org\/10.1038\/s41566-021-00811-0.","journal-title":"Nat Photonics"},{"issue":"7","key":"9613_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.adhoc.2021.102502","volume":"117","author":"M Kadadha","year":"2021","unstructured":"Kadadha M, Otrok H. A blockchain-enabled relay selection for QoS-OLSR in urban VANET: A Stackelberg game model. Ad Hoc Netw. 2021;117(7):1\u201311. https:\/\/doi.org\/10.1016\/j.adhoc.2021.102502.","journal-title":"Ad Hoc Netw"},{"issue":"4","key":"9613_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.adhoc.2020.102403","volume":"114","author":"C Suraci","year":"2021","unstructured":"Suraci C, Pizzi S, Garompolo D, et al. Trusted and secured D2D-aided communications in 5G networks. Ad Hoc Netw. 2021;114(4):1\u201315. https:\/\/doi.org\/10.1016\/j.adhoc.2020.102403.","journal-title":"Ad Hoc Netw"},{"issue":"15","key":"9613_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jnca.2017.03.025","volume":"88","author":"S Liu","year":"2017","unstructured":"Liu S. Novel unequal clustering routing protocol considering energy balancing based on network partition & distance for mobile education. J Netw Comput Appl. 2017;88(15):1\u20139. https:\/\/doi.org\/10.1016\/j.jnca.2017.03.025.","journal-title":"J Netw Comput Appl"},{"issue":"1","key":"9613_CR20","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1364\/JOSAB.469933","volume":"40","author":"I Vorontsova","year":"2023","unstructured":"Vorontsova I, Goncharov R, Tarabrina FEV. Theoretical analysis of quantum key distribution systems when integrated with a DWDM optical transport network. J Opt Soc Am B Opt Phys. 2023;40(1):63\u201371. https:\/\/doi.org\/10.1364\/JOSAB.469933.","journal-title":"J Opt Soc Am B Opt Phys"},{"issue":"7","key":"9613_CR21","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1016\/j.asoc.2019.03.053","volume":"80","author":"YY Cui","year":"2019","unstructured":"Cui YY, Zhang T. New quantum-genetic based OLSR protocol (QG-OLSR) for mobile Ad hoc network. Appl Soft Comput. 2019;80(7):285\u201396. https:\/\/doi.org\/10.1016\/j.asoc.2019.03.053.","journal-title":"Appl Soft Comput"},{"issue":"138","key":"9613_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.adhoc.2022.103012","volume":"2023","author":"S Wang","year":"2023","unstructured":"Wang S, Jie Z, Haoli Z. A content distribution method of internet of vehicles based on edge cache and immune cloning strategy. Ad Hoc Netw. 2023;2023(138):1\u201312. https:\/\/doi.org\/10.1016\/j.adhoc.2022.103012.","journal-title":"Ad Hoc Netw"},{"issue":"6","key":"9613_CR23","doi-asserted-by":"publisher","first-page":"3181","DOI":"10.1109\/TCSS.2022.3193739","volume":"10","author":"JX Wang","year":"2023","unstructured":"Wang JX, Zhang J. New method of fuzzy mutli-criteria routing in vehicle Ad-Hoc network. IEEE Transactions on Comput Soc Syst. 2023;10(6):3181\u201393. https:\/\/doi.org\/10.1109\/TCSS.2022.3193739.","journal-title":"IEEE Transactions on Comput Soc Syst"},{"issue":"1","key":"9613_CR24","doi-asserted-by":"publisher","first-page":"770","DOI":"10.1109\/TCSS.2022.3228692","volume":"11","author":"WM Dong","year":"2024","unstructured":"Dong WM, Zhang T. New computing tasks offloading method for MEC based on prospect theory framework. IEEE Trans Comput Soc Syst. 2024;11(1):770\u201381. https:\/\/doi.org\/10.1109\/TCSS.2022.3228692.","journal-title":"IEEE Trans Comput Soc Syst"},{"issue":"8","key":"9613_CR25","doi-asserted-by":"publisher","first-page":"8324","DOI":"10.1109\/TITS.2023.3264553","volume":"24","author":"W Wang","year":"2023","unstructured":"Wang W, Zhang J, Zhang T. Novel edge caching approach based on multi-agent deep reinforcement learning for internet of vehicles. IEEE Trans Intell Transp Syst. 2023;24(8):8324\u201338. https:\/\/doi.org\/10.1109\/TITS.2023.3264553.","journal-title":"IEEE Trans Intell Transp Syst"},{"issue":"4","key":"9613_CR26","doi-asserted-by":"publisher","first-page":"741","DOI":"10.1109\/TSC.2014.2370642","volume":"7","author":"X Wang","year":"2014","unstructured":"Wang X, Song XD. A novel approach to mapped correlation of ID for RFID anti-collision. IEEE Trans Serv Comput. 2014;7(4):741\u20138. https:\/\/doi.org\/10.1109\/TSC.2014.2370642.","journal-title":"IEEE Trans Serv Comput"},{"issue":"6","key":"9613_CR27","doi-asserted-by":"publisher","first-page":"4203","DOI":"10.1007\/s10586-022-03635-x","volume":"25","author":"J Zhang","year":"2022","unstructured":"Zhang J, Piao M. An approach of multi-objective computing task offloading scheduling based NSGS for IOV. Clust Comput. 2022;25(6):4203\u201319. https:\/\/doi.org\/10.1007\/s10586-022-03635-x.","journal-title":"Clust Comput"},{"issue":"2","key":"9613_CR28","doi-asserted-by":"publisher","first-page":"2042","DOI":"10.1109\/TII.2023.3285301","volume":"20","author":"Z Jie","year":"2024","unstructured":"Jie Z, Chen-Hao N. New method of edge computing based data adaptive return in internet of vehicles. IEEE Trans Ind Inform. 2024;20(2):2042\u201352. https:\/\/doi.org\/10.1109\/TII.2023.3285301.","journal-title":"IEEE Trans Ind Inform"},{"issue":"3","key":"9613_CR29","doi-asserted-by":"publisher","first-page":"3598","DOI":"10.1109\/TNSM.2024.3355967","volume":"21","author":"HZ An","year":"2024","unstructured":"An HZ, Zhang J, Zhang T, Dong WM, Jiang XR. Novel privacy awareness task offloading approach based on privacy entropy. IEEE Trans Netw Serv Manag. 2024;21(3):3598\u2013608. https:\/\/doi.org\/10.1109\/TNSM.2024.3355967.","journal-title":"IEEE Trans Netw Serv Manag"},{"issue":"147","key":"9613_CR30","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.adhoc.2024.103434","volume":"2024","author":"Z-H Zhang","year":"2024","unstructured":"Zhang Z-H, Zhang J. UAV-assisted task offloading system using dung beetle optimization algorithm & deep reinforcement learning. Ad Hoc Netw. 2024;2024(147):1\u201318. https:\/\/doi.org\/10.1016\/j.adhoc.2024.103434.","journal-title":"Ad Hoc Netw"},{"issue":"141","key":"9613_CR31","doi-asserted-by":"publisher","first-page":"577","DOI":"10.1016\/j.future.2022.12.016","volume":"2023","author":"Lu Chen","year":"2023","unstructured":"Chen Lu. A novel offloading approach of IoT user perception task based on quantum behavior particle swarm optimization. Futur Gener Comput Syst. 2023;2023(141):577\u201394. https:\/\/doi.org\/10.1016\/j.future.2022.12.016.","journal-title":"Futur Gener Comput Syst"},{"issue":"148","key":"9613_CR32","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.aeue.2022.154172","volume":"2022","author":"L Chen","year":"2022","unstructured":"Chen L. An approach of flow compensation incentive based on Q-learning strategy for IoT user privacy protection. AEU-Int J Electron C. 2022;2022(148):1\u201320. https:\/\/doi.org\/10.1016\/j.aeue.2022.154172.","journal-title":"AEU-Int J Electron C"},{"issue":"3539865","key":"9613_CR33","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TNSM.2025.3539865","volume":"2","author":"J Zhang","year":"2025","unstructured":"Zhang J, Zhang D. New offloading method of computing task based on gray wolf hunting optimization mechanism for the IOV. IEEE Trans Netw Serv Manage. 2025;2(3539865):1\u201314. https:\/\/doi.org\/10.1109\/TNSM.2025.3539865.","journal-title":"IEEE Trans Netw Serv Manage"},{"issue":"6","key":"9613_CR34","doi-asserted-by":"publisher","first-page":"3587","DOI":"10.1007\/s11276-019-01955-2","volume":"25","author":"JX Gao","year":"2019","unstructured":"Gao JX. Novel approach of distributed & adaptive trust metrics for MANET. Wireless Netw. 2019;25(6):3587\u2013603. https:\/\/doi.org\/10.1007\/s11276-019-01955-2.","journal-title":"Wireless Netw"},{"issue":"1","key":"9613_CR35","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1016\/j.neucom.2020.09.042","volume":"420","author":"T Zhang","year":"2021","unstructured":"Zhang T. A new method of data missing estimation with fnn-based tensor heterogeneous ensemble learning for internet of vehicle. Neurocomputing. 2021;420(1):98\u2013110. https:\/\/doi.org\/10.1016\/j.neucom.2020.09.042.","journal-title":"Neurocomputing"},{"issue":"5","key":"9613_CR36","doi-asserted-by":"publisher","first-page":"1866","DOI":"10.1007\/s10489-018-1368-y","volume":"49","author":"T Zhang","year":"2019","unstructured":"Zhang T. Novel self-adaptive routing service algorithm for application of VANET. Appl Intell. 2019;49(5):1866\u201379. https:\/\/doi.org\/10.1007\/s10489-018-1368-y.","journal-title":"Appl Intell"},{"issue":"162","key":"9613_CR37","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13638-015-0399-x","volume":"2015","author":"X Wang","year":"2015","unstructured":"Wang X, Song XD. New clustering routing method based on PECE for WSN. EURASIP J Wirel Commun Netw. 2015;2015(162):1\u201313. https:\/\/doi.org\/10.1186\/s13638-015-0399-x.","journal-title":"EURASIP J Wirel Commun Netw"},{"issue":"1","key":"9613_CR38","doi-asserted-by":"publisher","first-page":"766","DOI":"10.1109\/TII.2013.2250910","volume":"10","author":"DG Zhang","year":"2014","unstructured":"Zhang DG, Li G, Zheng K. An energy-balanced routing method based on forward-aware factor for wireless sensor network. IEEE Trans Industr Inf. 2014;10(1):766\u201373. https:\/\/doi.org\/10.1109\/TII.2013.2250910.","journal-title":"IEEE Trans Industr Inf"}],"container-title":["Discover Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10791-025-09613-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10791-025-09613-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10791-025-09613-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,27]],"date-time":"2025-05-27T18:31:21Z","timestamp":1748370681000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10791-025-09613-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,27]]},"references-count":38,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["9613"],"URL":"https:\/\/doi.org\/10.1007\/s10791-025-09613-2","relation":{},"ISSN":["2948-2992"],"issn-type":[{"value":"2948-2992","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,5,27]]},"assertion":[{"value":"14 November 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 May 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 May 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"96"}}