{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T02:13:56Z","timestamp":1760494436029,"version":"build-2065373602"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"1-2","license":[{"start":{"date-parts":[[2025,4,1]],"date-time":"2025-04-01T00:00:00Z","timestamp":1743465600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,4,1]],"date-time":"2025-04-01T00:00:00Z","timestamp":1743465600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Mobile Netw Appl"],"published-print":{"date-parts":[[2025,4]]},"DOI":"10.1007\/s11036-025-02452-x","type":"journal-article","created":{"date-parts":[[2025,5,8]],"date-time":"2025-05-08T15:54:53Z","timestamp":1746719693000},"page":"215-231","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Security Protection of Logistics Information on Mobile Network Platforms"],"prefix":"10.1007","volume":"30","author":[{"given":"Ling","family":"Qiu","sequence":"first","affiliation":[]},{"given":"Lin","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Longtian","family":"Fu","sequence":"additional","affiliation":[]},{"given":"Kadiyala","family":"Ramana","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,5,8]]},"reference":[{"issue":"2","key":"2452_CR1","first-page":"2847","volume":"45","author":"D Madhu","year":"2023","unstructured":"Madhu D, Vasuhi S (2023) Lightweight encryption assisted man-in-the-middle attack-resilient steganography model for secure satellite imagery services: LEMARS. J Intell Fuzzy Syst 45(2):2847\u20132869","journal-title":"J Intell Fuzzy Syst"},{"issue":"1","key":"2452_CR2","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1108\/WJE-04-2021-0218","volume":"20","author":"T Garg","year":"2023","unstructured":"Garg T, Kagalwalla N, Puthran S, Churi P, Pawar A (2023) A novel approach of privacy-preserving data sharing system through data-tagging with role-based access control. World J Eng 20(1):12\u201328","journal-title":"World J Eng"},{"issue":"1","key":"2452_CR3","doi-asserted-by":"publisher","first-page":"e5361","DOI":"10.1002\/dac.5361","volume":"36","author":"M Vijayakumar","year":"2022","unstructured":"Vijayakumar M (2022) Network statistics-based routing and path orient data encryption scheme for efficient healthcare monitoring with IoT in WSN. Int J Commun Syst 36(1):e5361","journal-title":"Int J Commun Syst"},{"issue":"1","key":"2452_CR4","first-page":"159","volume":"21","author":"S Ramasamy","year":"2020","unstructured":"Ramasamy S, Gnanamurthy RK (2020) Cluster based multi layer user authentication data center storage architecture for big data security in cloud computing. J Internet Technol 21(1):159\u2013171","journal-title":"J Internet Technol"},{"issue":"7","key":"2452_CR5","doi-asserted-by":"publisher","first-page":"2254","DOI":"10.1109\/JSAC.2021.3078497","volume":"39","author":"Z Li","year":"2021","unstructured":"Li Z, Rios ALG, Trajkovic L (2021) Machine learning for detecting anomalies and intrusions in communication networks. IEEE J Sel Areas Commun 39(7):2254\u20132264","journal-title":"IEEE J Sel Areas Commun"},{"issue":"6","key":"2452_CR6","doi-asserted-by":"publisher","first-page":"4101","DOI":"10.1109\/TNSE.2022.3195862","volume":"9","author":"M Dai","year":"2022","unstructured":"Dai M, Luo L, Ren J, Yu H, Sun G (2022) PSACCF: Prioritized online slice admission control considering fairness in 5G\/B5G networks. IEEE Trans Netw Sci Eng 9(6):4101\u20134114","journal-title":"IEEE Trans Netw Sci Eng"},{"issue":"10","key":"2452_CR7","doi-asserted-by":"publisher","first-page":"7155","DOI":"10.1109\/TII.2020.3042872","volume":"17","author":"G Sun","year":"2021","unstructured":"Sun G, Xu Z, Yu H, Chang V (2021) Dynamic network function provisioning to enable network in box for industrial applications. IEEE Trans Industr Inf 17(10):7155\u20137164","journal-title":"IEEE Trans Industr Inf"},{"issue":"11","key":"2452_CR8","doi-asserted-by":"publisher","first-page":"12935","DOI":"10.1109\/TII.2024.3431020","volume":"20","author":"C Li","year":"2024","unstructured":"Li C, He A, Liu G, Wen Y, Chronopoulos AT, Giannakos A (2024) RFL-APIA: a comprehensive framework for mitigating poisoning attacks and promoting model aggregation in IIoT federated learning. IEEE Trans Industr Inf 20(11):12935\u201312944","journal-title":"IEEE Trans Industr Inf"},{"key":"2452_CR9","doi-asserted-by":"publisher","first-page":"104155","DOI":"10.1016\/j.cose.2024.104155","volume":"148","author":"W Zhou","year":"2025","unstructured":"Zhou W, Xia C, Wang T, Liang X, Lin W, Li X, Zhang S (2025) HIDIM: A novel framework of network intrusion detection for hierarchical dependency and class imbalance. Comput Secur 148:104155","journal-title":"Comput Secur"},{"issue":"2","key":"2452_CR10","doi-asserted-by":"publisher","first-page":"467","DOI":"10.1007\/s10207-022-00649-9","volume":"22","author":"B Alzahrani","year":"2023","unstructured":"Alzahrani B, Fotiou N, Albeshri A, Almuhaimeed A, Alsubhi K (2023) Distributed access control for information-centric networking architectures using verifiable credentials. Int J Inf Secur 22(2):467\u2013478","journal-title":"Int J Inf Secur"},{"issue":"4","key":"2452_CR11","doi-asserted-by":"publisher","first-page":"2409","DOI":"10.1007\/s10586-022-03733-w","volume":"26","author":"N Sivaselvan","year":"2023","unstructured":"Sivaselvan N, Vivekananda BK, Muttukrishnan R, Kumar DA, Rodrigues JJPC (2023) Suacc-iot: secure unified authentication and access control system based on capability for iot. Clust Comput 26(4):2409\u20132428","journal-title":"Clust Comput"},{"issue":"11","key":"2452_CR12","doi-asserted-by":"publisher","first-page":"12074","DOI":"10.1007\/s11227-023-05107-4","volume":"79","author":"I Merdassi","year":"2023","unstructured":"Merdassi I, Ghazel C, Saidane L (2023) A new LTMA-ABE location and time access security control scheme for mobile cloud. J Supercomput 79(11):12074\u201312105","journal-title":"J Supercomput"},{"issue":"25","key":"2452_CR13","doi-asserted-by":"publisher","first-page":"6636","DOI":"10.1364\/AO.536463","volume":"63","author":"K Song","year":"2024","unstructured":"Song K, Hu H, Yan L, Hou X, Wei J (2024) Parallel rsa encryption algorithm based on a ternary optical computer. Appl Opt 63(25):6636\u20136645","journal-title":"Appl Opt"},{"issue":"1","key":"2452_CR14","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1080\/23307706.2022.2067252","volume":"10","author":"S Saravanan","year":"2023","unstructured":"Saravanan S, Poornima N (2023) Big data analytics for privacy through nd-homomorphic encryption. J Control Decis 10(1):64\u201371","journal-title":"J Control Decis"},{"key":"2452_CR15","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1016\/j.patrec.2021.10.029","volume":"152","author":"TS Arulananth","year":"2021","unstructured":"Arulananth TS, Baskar M, Anbarasu V, Thiagarajan R, Rajendran T, Balaji A (2021) Multi party secure data access management in cloud using user centric block chain data encryption. Pattern Recogn Lett 152:295\u2013301","journal-title":"Pattern Recogn Lett"},{"issue":"13","key":"2452_CR16","doi-asserted-by":"publisher","first-page":"14743","DOI":"10.1007\/s11227-023-05222-2","volume":"79","author":"X Zhang","year":"2023","unstructured":"Zhang X, Du W, Moshayedi AJ (2023) A traceable and revocable multi-authority attribute-based access control scheme for mineral industry data secure storage in blockchain. J Supercomput 79(13):14743\u201314779","journal-title":"J Supercomput"},{"key":"2452_CR17","doi-asserted-by":"crossref","unstructured":"Xu G, Kong DL, Zhang K, Xu S, Cao Y, Mao Y, ..., Chen XB (2025) A model value transfer incentive mechanism for federated learning with smart contracts in AIoT. IEEE Internet Things J 12(3):2530\u20132544","DOI":"10.1109\/JIOT.2024.3468443"},{"issue":"1","key":"2452_CR18","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/s10207-022-00629-z","volume":"22","author":"NC Rathore","year":"2023","unstructured":"Rathore NC, Tripathy S (2023) Restricting data-leakage using fine-grained access control on osn objects. Int J Inf Secur 22(1):93\u2013106","journal-title":"Int J Inf Secur"},{"issue":"1","key":"2452_CR19","doi-asserted-by":"publisher","first-page":"987","DOI":"10.1007\/s11227-021-03908-z","volume":"78","author":"K Dhal","year":"2022","unstructured":"Dhal K, Rai SC, Pattnaik PK, Tripathy S (2022) CEMAR: a fine grained access control with revocation mechanism for centralized multi-authority cloud storage. J Supercomput 78(1):987\u20131009","journal-title":"J Supercomput"},{"issue":"6","key":"2452_CR20","doi-asserted-by":"publisher","first-page":"1975857866","DOI":"10.1177\/15501329221104330","volume":"18","author":"M Zhang","year":"2022","unstructured":"Zhang M, Zhang Y, Cen Q, Wu S (2022) Deep learning\u2013based resource allocation for secure transmission in a non-orthogonal multiple access network. Int J Distrib Sens Netw 18(6):1975857866","journal-title":"Int J Distrib Sens Netw"},{"issue":"4","key":"2452_CR21","doi-asserted-by":"publisher","first-page":"2663","DOI":"10.1007\/s11277-019-06544-2","volume":"108","author":"B Bi","year":"2019","unstructured":"Bi B, Huang D, Mi B, Deng Z, Pan H (2019) Efficient LBS security-preserving based on NTRU oblivious transfer. Wireless Pers Commun 108(4):2663\u20132674","journal-title":"Wireless Pers Commun"},{"issue":"1","key":"2452_CR22","doi-asserted-by":"publisher","first-page":"1047","DOI":"10.1007\/s10586-023-04038-2","volume":"27","author":"J Kaur","year":"2024","unstructured":"Kaur J, Rani R, Kalra N (2024) Attribute-based access control scheme for secure storage and sharing of EHRs using blockchain and IPFS. Clust Comput 27(1):1047\u20131061","journal-title":"Clust Comput"},{"issue":"5","key":"2452_CR23","doi-asserted-by":"publisher","first-page":"3025","DOI":"10.1002\/int.22810","volume":"37","author":"F Ahmed","year":"2022","unstructured":"Ahmed F, Wei L, Niu Y, Zhao T, Zhang W, Zhang D, Dong W (2022) Toward fine-grained access control and privacy protection for video sharing in media convergence environment. Int J Intell Syst 37(5):3025\u20133049","journal-title":"Int J Intell Syst"},{"issue":"3","key":"2452_CR24","first-page":"426","volume":"58","author":"J Ma","year":"2022","unstructured":"Ma J, Hu J (2022) Safe consensus control of cooperative-competitive multi-agent systems via differential privacy. Kybernetika 58(3):426\u2013439","journal-title":"Kybernetika"},{"key":"2452_CR25","first-page":"100257","volume":"26","author":"PKR Maddikunta","year":"2021","unstructured":"Maddikunta PKR, Pham Q, B P, Deepa N, Dev K, Gadekallu TR, Ruby R, Liyanage M (2021) Industry 5.0: A survey on enabling technologies and potential applications. J Ind Inf Integr 26:100257","journal-title":"J Ind Inf Integr"},{"key":"2452_CR26","doi-asserted-by":"publisher","unstructured":"Deng J, Wang W., Wang L, Bashir AK, Gadekallu TR, Feng H, ..., Fang K (2025) FIDSUS: federated intrusion detection for securing UAV swarms in smart aerial computing. IEEE Internet Things J. online first, https:\/\/doi.org\/10.1109\/JIOT.2025.3549508","DOI":"10.1109\/JIOT.2025.3549508"},{"issue":"4","key":"2452_CR27","doi-asserted-by":"publisher","first-page":"2351","DOI":"10.1007\/s10586-022-03790-1","volume":"26","author":"T Devisha","year":"2023","unstructured":"Devisha T, Bhaskar M, Kumar SS, Deepika K (2023) Lightweight encryption for privacy protection of data transmission in cyber physical systems. Clust Comput 26(4):2351\u20132365","journal-title":"Clust Comput"},{"key":"2452_CR28","doi-asserted-by":"publisher","first-page":"262","DOI":"10.1016\/j.comcom.2023.03.006","volume":"203","author":"I Huso","year":"2023","unstructured":"Huso I, Sparapano D, Piro G, Boggia G (2023) Privacy-preserving data dissemination scheme based on searchable encryption, publish-subscribe model, and edge computing. Comput Commun 203:262\u2013275","journal-title":"Comput Commun"},{"issue":"1","key":"2452_CR29","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1109\/JIOT.2021.3098859","volume":"9","author":"G Kuldeep","year":"2022","unstructured":"Kuldeep G, Zhang Q (2022) Design prototype and security analysis of a lightweight joint compression and encryption scheme for resource-constrained iot devices. IEEE Internet Things J 9(1):165\u2013181","journal-title":"IEEE Internet Things J"},{"key":"2452_CR30","first-page":"103624","volume":"78","author":"O Italis","year":"2023","unstructured":"Italis O, Pierre S, Quintero A (2023) Privacy-preserving model for biometric-based authentication and key derivation function. J Inf Secur Appl 78:103624","journal-title":"J Inf Secur Appl"},{"issue":"4","key":"2452_CR31","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1049\/ise2.12052","volume":"16","author":"U Dowerah","year":"2022","unstructured":"Dowerah U, Krishnaswamy S (2022) Towards an efficient lwe-based fully homomorphic encryption scheme. IET Inf Secur 16(4):235\u2013252","journal-title":"IET Inf Secur"},{"issue":"9","key":"2452_CR32","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3477139","volume":"54","author":"A Aloufi","year":"2021","unstructured":"Aloufi A, Hu P, Song Y, Lauter K (2021) Computing blindfolded on data homomorphically encrypted under multiple keys: a survey. ACM Comput Surv 54(9):1\u201337","journal-title":"ACM Comput Surv"},{"issue":"3","key":"2452_CR33","doi-asserted-by":"publisher","first-page":"736","DOI":"10.1109\/TCSS.2018.2855047","volume":"5","author":"W Wei","year":"2018","unstructured":"Wei W, Liu S, Li W, Du D (2018) Fractal intelligent privacy protection in online social network using attribute-based encryption schemes. IEEE Trans Comput Soc Syst 5(3):736\u2013747","journal-title":"IEEE Trans Comput Soc Syst"},{"issue":"5","key":"2452_CR34","doi-asserted-by":"publisher","first-page":"2140020","DOI":"10.1142\/S0218348X2140020X","volume":"29","author":"A Qi","year":"2021","unstructured":"Qi A, Khan M, Liu S (2021) Dynamical analysis of the meminductor-based chaotic system with hidden attractor. Fractals 29(5):2140020","journal-title":"Fractals"}],"container-title":["Mobile Networks and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-025-02452-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11036-025-02452-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-025-02452-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T01:42:58Z","timestamp":1760492578000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11036-025-02452-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4]]},"references-count":34,"journal-issue":{"issue":"1-2","published-print":{"date-parts":[[2025,4]]}},"alternative-id":["2452"],"URL":"https:\/\/doi.org\/10.1007\/s11036-025-02452-x","relation":{},"ISSN":["1383-469X","1572-8153"],"issn-type":[{"type":"print","value":"1383-469X"},{"type":"electronic","value":"1572-8153"}],"subject":[],"published":{"date-parts":[[2025,4]]},"assertion":[{"value":"23 April 2025","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 May 2025","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing Interests"}}]}}