{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T01:39:51Z","timestamp":1763343591953,"version":"3.45.0"},"reference-count":29,"publisher":"Tech Science Press","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.064102","type":"journal-article","created":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T08:46:29Z","timestamp":1746261989000},"page":"957-973","source":"Crossref","is-referenced-by-count":0,"title":["Distributed Computing-Based Optimal Route Finding Algorithm for Trusted Devices in the Internet of Things"],"prefix":"10.32604","volume":"84","author":[{"given":"Amal","family":"Al-Rasheed","sequence":"first","affiliation":[]},{"given":"Rahim","family":"Khan","sequence":"additional","affiliation":[]},{"given":"Fahad","family":"Alturise","sequence":"additional","affiliation":[]},{"given":"Salem","family":"Alkhalaf","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","first-page":"2261","article-title":"Improved transportation model with internet of things using artificial intelligence algorithm","volume":"76","author":"Al-Ani","year":"2023","journal-title":"Comput Mater Contin"},{"key":"ref2","first-page":"65","article-title":"Internet of things authentication protocols: comparative study","volume":"79","author":"Dargaoui","year":"2024","journal-title":"Comput Mater Contin"},{"key":"ref3","series-title":"Proceedings of the 20th ACM Conference on Embedded Networked Sensor Systems","first-page":"16","article-title":"Automatch: leveraging traffic camera to improve perception and localization of autonomous vehicles","author":"He","year":"2022"},{"key":"ref4","series-title":"IEEE INFOCOM 2024\u2014IEEE Conference on Computer Communications","first-page":"731","article-title":"A lightweight path validation scheme in software-defined networks","author":"Hu","year":"2024 May 20\u201323"},{"key":"ref5","series-title":"IEEE INFOCOM 2024\u2014IEEE Conference on Computer Communications","first-page":"1411","article-title":"Routing and photon source provisioning in quantum key distribution networks","author":"Xu","year":"2024"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"101135","DOI":"10.1016\/j.iot.2024.101135","article-title":"A systematic review of applying grey wolf optimizer, its variants, and its developments in different Internet of Things applications","volume":"26","author":"Nadimi-Shahraki","year":"2024","journal-title":"Int Things"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"7294","DOI":"10.3390\/s24227294","article-title":"Intelligent wireless charging path optimization for critical nodes in internet of things-integrated renewable sensor networks","volume":"24","author":"Aslam","year":"2024","journal-title":"Sensors"},{"key":"ref8","first-page":"427","article-title":"Improving network availability through optimized multipath routing and incremental deployment strategies","volume":"80","author":"Zhang","year":"2024","journal-title":"Comput Mater Contin"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"3967","DOI":"10.1007\/s00521-020-05457-7","article-title":"Dynamic traffic classification algorithm and simulation of energy Internet of things based on machine learning","volume":"33","author":"Liu","year":"2021","journal-title":"Neural Comput Applicat"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"568","DOI":"10.37391\/ijeer.110244","article-title":"A hybrid feature selection approach based on random forest and particle swarm optimization for IoT network traffic analysis","volume":"11","author":"Lavate","year":"2023","journal-title":"Int J Electr Electro Res"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"1907","DOI":"10.18280\/ijsse.140624","article-title":"Optimizing feature selection for intrusion detection: a hybrid approach using cuckoo search and particle swarm optimization","volume":"14","author":"Gheni","year":"2024","journal-title":"Int J Safety Secur Eng"},{"key":"ref12","first-page":"8645","article-title":"Semisupervised federated-learning-based intrusion detection method for Internet of Things","volume":"10","author":"Zhao","year":"2022","journal-title":"IEEE Int Things J"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"102118","DOI":"10.1016\/j.adhoc.2020.102118","article-title":"A secure multipath reactive protocol for routing in IoT and HANETs","volume":"103","author":"Hammi","year":"2020","journal-title":"Ad Hoc Netw"},{"key":"ref14","first-page":"10397","article-title":"Task offloading and resource allocation for IoV using 5G NR-V2X communication","volume":"9","author":"Raza","year":"2021","journal-title":"IEEE Int Things J"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"2500","DOI":"10.1109\/JSYST.2023.3249217","article-title":"Joint computation offloading and resource allocation for edge-cloud collaboration in internet of vehicles via deep reinforcement learning","volume":"17","author":"Huang","year":"2023","journal-title":"IEEE Syst J"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"4277","DOI":"10.1109\/TITS.2022.3230430","article-title":"Joint task offloading and resource allocation for vehicular edge computing based on V2I and V2V modes","volume":"24","author":"Fan","year":"2023","journal-title":"IEEE Transact Intell Transport Syst"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"3612","DOI":"10.1109\/TWC.2022.3219890","article-title":"Integrated sensing and communications for V2I networks: dynamic predictive beamforming for extended vehicle targets","volume":"22","author":"Du","year":"2022","journal-title":"IEEE Transact Wirel Communicat"},{"key":"ref18","series-title":"2024 IEEE 23rd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","first-page":"2453","article-title":"Shield-U: safeguarding traffic sign recognition against perturbation attacks","author":"Xu","year":"2024"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"1370","DOI":"10.1109\/JSYST.2015.2416396","article-title":"Lightweight and energy-efficient mutual authentication and key agreement scheme with user anonymity for secure communication in global mobility networks","volume":"10","author":"Gope","year":"2015","journal-title":"IEEE Syst J"},{"key":"ref20","series-title":"2014 5th International Conference-Confluence the Next Generation Information Technology Summit (Confluence)","first-page":"347","article-title":"An improved genetic based routing protocol for VANETs","author":"Gupta","year":"2014"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"16283","DOI":"10.1109\/TVT.2024.3422270","article-title":"IoV-oriented integrated sensing, computation, and communication: system design and resource allocation","volume":"73","author":"Zhao","year":"2024","journal-title":"IEEE Trans Vehicular Technol"},{"key":"ref22","first-page":"4197","article-title":"Enabling efficient data transmission in wireless sensor networks-based IoT applications","volume":"79","author":"Al-Hejri","year":"2024","journal-title":"Comput Mater Contin"},{"key":"ref23","first-page":"100812","article-title":"FedGen: federated learning-based green edge computing for optimal route selection using genetic algorithm in internet of vehicular things","volume":"12","author":"Khatua","year":"2024","journal-title":"Veh Commun"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"25385","DOI":"10.1109\/ACCESS.2024.3366280","article-title":"RHRA-DRL: RSU-assisted hybrid road-aware routing using distributed reinforcement learning in internet of vehicles","volume":"12","author":"Park","year":"2024","journal-title":"IEEE Access"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"81471","DOI":"10.1109\/ACCESS.2024.3409361","article-title":"A blockchain-based secure distributed authentication scheme for internet of vehicles","volume":"12","author":"Ma","year":"2024","journal-title":"IEEE Access"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"454","DOI":"10.1016\/j.procs.2018.03.024","article-title":"An effective AODV-based flooding detection and prevention for smart meter network","volume":"129","author":"Hasan","year":"2018","journal-title":"Procedia Comput Sci"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"1147","DOI":"10.3390\/sym15061147","article-title":"Security concepts in emerging 6G communication: threats, countermeasures, authentication techniques and research directions","volume":"15","author":"Kazmi","year":"2023","journal-title":"Symmetry"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"108465","DOI":"10.1016\/j.comnet.2021.108465","article-title":"Lightweight and secure authentication scheme for IoT network based on publish-subscribe fog computing model","volume":"199","author":"Amanlou","year":"2021","journal-title":"Comput Netw"},{"key":"ref29","unstructured":"118E277 T. IoT traffic generation patterns dataset; 2021. [cited 2025 Mar 27]. Available from: https:\/\/www.kaggle.com\/tubitak1001118e277\/iot-traffic-generation-patterns."}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-84-1\/TSP_CMC_64102\/TSP_CMC_64102.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T01:34:52Z","timestamp":1763343292000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v84n1\/61755"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":29,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.064102","relation":{},"ISSN":["1546-2226"],"issn-type":[{"type":"electronic","value":"1546-2226"}],"subject":[],"published":{"date-parts":[[2025]]}}}