{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,24]],"date-time":"2026-01-24T12:06:50Z","timestamp":1769256410613,"version":"3.49.0"},"reference-count":63,"publisher":"MDPI AG","issue":"4","license":[{"start":{"date-parts":[[2025,4,11]],"date-time":"2025-04-11T00:00:00Z","timestamp":1744329600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Future Internet"],"abstract":"<jats:p>The Internet of Things (IoT) has revolutionized modern communication systems by enabling seamless connectivity among low-power devices. However, the increasing demand for high-performance wireless networks necessitates advanced frameworks that optimize both energy efficiency (EE) and security. Cell-free massive multiple-input multiple-output (CF m-MIMO) has emerged as a promising solution for IoT networks, offering enhanced spectral efficiency, low-latency communication, and robust connectivity. Nevertheless, balancing EE and security in such systems remains a significant challenge due to the stringent power and computational constraints of IoT devices. This study employs secrecy energy efficiency (SEE) as a key performance metric to evaluate the trade-off between power consumption and secure communication efficiency. By jointly considering energy consumption and secrecy rate, our analysis provides a comprehensive assessment of security-aware energy efficiency in CF m-MIMO-based IoT networks. To enhance SEE, we introduce a hybrid deep-learning (DL) framework that integrates convolutional neural networks (CNN) and long short-term memory (LSTM) networks for joint EE and security optimization. The CNN extracts spatial features, while the LSTM captures temporal dependencies, enabling a more robust and adaptive modeling of dynamic IoT communication patterns. Additionally, a multi-objective improved biogeography-based optimization (MOIBBO) algorithm is utilized to optimize hyperparameters, ensuring an improved balance between convergence speed and model performance. Extensive simulation results demonstrate that the proposed MOIBBO-CNN\u2013LSTM framework achieves superior SEE performance compared to benchmark schemes. Specifically, MOIBBO-CNN\u2013LSTM attains an SEE gain of up to 38% compared to LSTM and 22% over CNN while converging significantly faster at early training epochs. Furthermore, our results reveal that SEE improves with increasing AP transmit power up to a saturation point (approximately 9.5 Mb\/J at PAPmax=500 mW), beyond which excessive power consumption limits efficiency gains. Additionally, SEE decreases as the number of APs increases, underscoring the need for adaptive AP selection strategies to mitigate static power consumption in backhaul links. These findings confirm that MOIBBO-CNN\u2013LSTM offers an effective solution for optimizing SEE in CF m-MIMO-based IoT networks, paving the way for more energy-efficient and secure IoT communications.<\/jats:p>","DOI":"10.3390\/fi17040169","type":"journal-article","created":{"date-parts":[[2025,4,11]],"date-time":"2025-04-11T10:05:51Z","timestamp":1744365951000},"page":"169","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Energy-Efficient Secure Cell-Free Massive MIMO for Internet of Things: A Hybrid CNN\u2013LSTM-Based Deep-Learning Approach"],"prefix":"10.3390","volume":"17","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-2801-9416","authenticated-orcid":false,"given":"Ali","family":"Vaziri","sequence":"first","affiliation":[{"name":"Department of Systems and Enterprises, Stevens Institute of Technology, Hoboken, NJ 07030, USA"}]},{"given":"Pardis Sadatian","family":"Moghaddam","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Georgia State University, Atlanta, GA 30302, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-5470-0397","authenticated-orcid":false,"given":"Mehrdad","family":"Shoeibi","sequence":"additional","affiliation":[{"name":"The WPI Business School, Worcester Polytechnic Institute, Worcester, MA 01609, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0752-8054","authenticated-orcid":false,"given":"Masoud","family":"Kaveh","sequence":"additional","affiliation":[{"name":"Department of Information and Communication Engineering, Aalto University, 02150 Espoo, Finland"}]}],"member":"1968","published-online":{"date-parts":[[2025,4,11]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"127017","DOI":"10.1016\/j.neucom.2023.127017","article-title":"A Review of IoT Applications in Healthcare","volume":"565","author":"Li","year":"2024","journal-title":"Neurocomputing"},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Bellini, P., Nesi, P., and Pantaleo, G. (2022). IoT-Enabled Smart Cities: A Review of Concepts, Frameworks and Key Technologies. Appl. Sci., 12.","DOI":"10.3390\/app12031607"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"2422","DOI":"10.1109\/TMC.2024.3494612","article-title":"EPUF: An Entropy-Derived Latency-Based DRAM Physical Unclonable Function for Lightweight Authentication in Internet of Things","volume":"24","author":"Najafi","year":"2025","journal-title":"IEEE Trans. Mob. Comput."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"6","DOI":"10.26794\/2308-944X-2024-12-3-6-27","article-title":"A Systematic Review on Exploring the Influence of Industry 4.0 Technologies to Enhance Supply Chain Visibility and Operational Efficiency","volume":"12","author":"Khan","year":"2024","journal-title":"Rev. Bus. Econ. Stud."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"101816","DOI":"10.1016\/j.tele.2022.101816","article-title":"Internet of Things Technology: Balancing Privacy Concerns with Convenience","volume":"70","author":"Jeon","year":"2022","journal-title":"Telemat. Inform."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"28","DOI":"10.57219\/crrst.2024.2.2.0036","article-title":"Application of Internet of Things (IoT) in Energy Infrastructure: Lessons for the Future of Operations and Maintenance","volume":"2","author":"Erhueh","year":"2024","journal-title":"Compr. Res. Rev. Sci. Technol."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"2021","DOI":"10.1109\/COMST.2023.3278239","article-title":"Backscatter Communication Meets Practical Battery-Free Internet of Things: A Survey and Outlook","volume":"25","author":"Jiang","year":"2023","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"21647","DOI":"10.1109\/JIOT.2024.3377451","article-title":"Joint Optimization of Internet-of-Things and Smart Grid for Energy Generation, Battery (Dis)charging, and Information Delivery","volume":"11","author":"Qi","year":"2024","journal-title":"IEEE Internet Things J."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"104596","DOI":"10.1016\/j.est.2022.104596","article-title":"IoT Real-Time System for Monitoring Lithium-Ion Battery Long-Term Operation in Microgrids","volume":"51","author":"Gonzalez","year":"2022","journal-title":"J. Energy Storage"},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Zikria, Y.B., Ali, R., Afzal, M.K., and Kim, S.W. (2021). Next-Generation Internet of Things (IoT): Opportunities, Challenges, and Solutions. Sensors, 21.","DOI":"10.3390\/s21041174"},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Aini, N., and Wibisono, G. (2021, January 29\u201330). Method Comparison for Increasing Data Rate on 5G-IoT Technology. Proceedings of the 2021 International Conference on Artificial Intelligence and Computer Science Technology (ICAICST), Jakarta, Indonesia.","DOI":"10.1109\/ICAICST53116.2021.9497815"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"101228","DOI":"10.1016\/j.segan.2023.101228","article-title":"An Efficient Authentication Protocol for Smart Grid Communication Based on On-Chip-Error-Correcting Physical Unclonable Function","volume":"36","author":"Kaveh","year":"2023","journal-title":"Sustain. Energy Grids Netw."},{"key":"ref_13","first-page":"100285","article-title":"Evolution of IoT-Enabled Connectivity and Applications in Automotive Industry: A Review","volume":"27","author":"Rahim","year":"2021","journal-title":"Veh. Commun."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3536424","article-title":"NB-IoT Coverage and Sensor Node Connectivity in Dense Urban Environments: An Empirical Study","volume":"18","author":"Yau","year":"2022","journal-title":"ACM Trans. Sens. Netw. (TOSN)"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"363","DOI":"10.1007\/s00607-018-0623-8","article-title":"Area Coverage of Heterogeneous Wireless Sensor Networks in Support of Internet of Things Demands","volume":"101","year":"2019","journal-title":"Computing"},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Gava, M.A., Rocha, H.R.O., Faber, M.J., Segatto, M.E.V., W\u00f6rtche, H., and Silva, J.A.L. (2023). Optimizing Resources and Increasing the Coverage of Internet-of-Things (IoT) Networks: An Approach Based on LoRaWAN. Sensors, 23.","DOI":"10.3390\/s23031239"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"108572","DOI":"10.1016\/j.cie.2022.108572","article-title":"Narrow Band-IoT and Long-Range Technology of IoT Smart Communication: Designs and Challenges","volume":"172","author":"Malik","year":"2022","journal-title":"Comput. Ind. Eng."},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Mishra, R., and Mishra, A. (2025). Current Research on Internet of Things (IoT) Security Protocols: A Survey. Comput. Secur., 104310.","DOI":"10.1016\/j.cose.2024.104310"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"5415","DOI":"10.1109\/TII.2023.3333842","article-title":"Secrecy Performance Analysis of RIS-Aided Smart Grid Communications","volume":"20","author":"Kaveh","year":"2024","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"111045","DOI":"10.1016\/j.comnet.2025.111045","article-title":"Enhancing IoT Security: A Comprehensive Exploration of Privacy, Security Measures, and Advanced Routing Solutions","volume":"258","author":"Naik","year":"2025","journal-title":"Comput. Netw."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"2074","DOI":"10.1109\/JSYST.2024.3476447","article-title":"Physical Layer Security Performance of Cooperative Dual-RIS-Aided V2V NOMA Communications","volume":"18","author":"Ghadi","year":"2024","journal-title":"IEEE Syst. J."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"805","DOI":"10.1109\/JPROC.2024.3393514","article-title":"Ultradense Cell-Free Massive MIMO for 6G: Technical Overview and Open Questions","volume":"112","author":"Ngo","year":"2024","journal-title":"Proc. IEEE"},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Apiyo, A., and Izydorczyk, J. (2024). A Survey of NOMA-Aided Cell-Free Massive MIMO Systems. Electronics, 13.","DOI":"10.3390\/electronics13010231"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"140","DOI":"10.1109\/MWC.004.2300043","article-title":"Mobile Cell-Free Massive MIMO: Challenges, Solutions, and Future Directions","volume":"31","author":"Zheng","year":"2024","journal-title":"IEEE Wirel. Commun."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"1372","DOI":"10.1109\/JPROC.2024.3451372","article-title":"Next-Generation Multiple Access With Cell-Free Massive MIMO","volume":"112","author":"Mohammadi","year":"2024","journal-title":"Proc. IEEE"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"12396","DOI":"10.1109\/TWC.2024.3392330","article-title":"Communication-Sensing Region for Cell-Free Massive MIMO ISAC Systems","volume":"23","author":"Mao","year":"2024","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Shi, X., Shao, X., Zheng, B., and Zhang, R. (2025). 6DMA-Aided Cell-Free Massive MIMO Communication. IEEE Wirel. Commun. Lett., Early Access.","DOI":"10.1109\/LWC.2025.3542546"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"8384","DOI":"10.1109\/JIOT.2020.2990378","article-title":"Wirelessly powered cell-free IoT: Analysis and optimization","volume":"7","author":"Wang","year":"2020","journal-title":"IEEE Internet Things J."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"6520","DOI":"10.1109\/JIOT.2021.3112195","article-title":"Cell-free massive MIMO for massive low-power Internet of Things networks","volume":"9","author":"Lee","year":"2021","journal-title":"IEEE Internet Things J."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"14705","DOI":"10.1109\/JIOT.2021.3071781","article-title":"A scalable and energy-efficient IoT system supported by cell-free massive MIMO","volume":"8","author":"Yan","year":"2021","journal-title":"IEEE Internet Things J."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"9625","DOI":"10.1109\/JIOT.2021.3130026","article-title":"Performance analysis and optimization of NOMA-based cell-free massive MIMO for IoT","volume":"9","author":"Zhang","year":"2021","journal-title":"IEEE Internet Things J."},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Rao, S., Ashikhmin, A., and Yang, H. (2019, January 3\u20136). Internet of Things based on cell-free massive MIMO. Proceedings of the 53rd Asilomar Conference on Signals, Systems, and Computers, Pacific Grove, CA, USA.","DOI":"10.1109\/IEEECONF44664.2019.9048705"},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"25237","DOI":"10.1109\/JIOT.2022.3195899","article-title":"Fingerprint-based localization and channel estimation integration for cell-free massive MIMO IoT systems","volume":"9","author":"Wei","year":"2022","journal-title":"IEEE Internet Things J."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"1110","DOI":"10.1109\/JIOT.2023.3288477","article-title":"A new framework of RIS-aided user-centric cell-free massive MIMO system for IoT networks","volume":"11","author":"Lan","year":"2023","journal-title":"IEEE Internet Things J."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"8658","DOI":"10.1109\/JIOT.2023.3319715","article-title":"User-centric cell-free massive MIMO for IoT in highly dynamic environments","volume":"11","author":"Li","year":"2023","journal-title":"IEEE Internet Things J."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"143288","DOI":"10.1109\/ACCESS.2024.3471672","article-title":"Cell-Free Massive MIMO System for Indoor Industrial IoT Networks","volume":"12","author":"Mahmoud","year":"2024","journal-title":"IEEE Access"},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"756","DOI":"10.1109\/JSAC.2020.3018807","article-title":"Massive access in cell-free massive MIMO-based Internet of Things: Cloud computing and edge computing paradigms","volume":"39","author":"Ke","year":"2020","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Yan, H., Ashikhmin, A., and Yang, H. (2020, January 7\u201311). Optimally supporting IoT with cell-free massive MIMO. Proceedings of the IEEE Global Communications Conference (GLOBECOM), Taipei, Taiwan.","DOI":"10.1109\/GLOBECOM42002.2020.9348004"},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"2311","DOI":"10.1109\/TWC.2024.3520205","article-title":"Cell-Free Massive MIMO Symbiotic Radio for IoT: RIS or BD?","volume":"24","author":"Li","year":"2024","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"18201","DOI":"10.1109\/TWC.2024.3463488","article-title":"Physical Layer Security Over Fluid Antenna Systems: Secrecy Performance Analysis","volume":"23","author":"Ghadi","year":"2024","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Kaveh, M., Rostami Ghadi, F., J\u00e4ntti, R., and Yan, Z. (2023). Secrecy Performance Analysis of Backscatter Communications with Side Information. Sensors, 23.","DOI":"10.3390\/s23208358"},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"4290","DOI":"10.1109\/TWC.2020.2982383","article-title":"Secrecy energy efficiency in multi-antenna SWIPT networks with dual-layer PS receivers","volume":"19","author":"Lu","year":"2020","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"5588","DOI":"10.1109\/TCOMM.2019.2915623","article-title":"Secrecy energy efficiency of MIMOME wiretap channels with full-duplex jamming","volume":"67","author":"Taghizadeh","year":"2019","journal-title":"IEEE Trans. Commun."},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"3493","DOI":"10.1109\/LCOMM.2021.3109888","article-title":"Secrecy energy efficiency in full-duplex AF relay systems with untrusted energy harvesters","volume":"25","author":"Ouyang","year":"2021","journal-title":"IEEE Commun. Lett."},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"6009","DOI":"10.1109\/TVT.2022.3229742","article-title":"Secrecy energy efficiency maximization for multi-user multi-eavesdropper cell-free massive MIMO networks","volume":"72","author":"Jiang","year":"2023","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"3234","DOI":"10.1109\/TCOMM.2019.2893221","article-title":"Massive MIMO with Spatially Correlated Rician Fading Channels","volume":"67","author":"Ozdogan","year":"2019","journal-title":"IEEE Trans. Commun."},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1109\/TWC.2019.2941478","article-title":"Making Cell-Free Massive MIMO Competitive with MMSE Processing and Centralized Implementation","volume":"19","author":"Bjornson","year":"2020","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"1834","DOI":"10.1109\/TWC.2017.2655515","article-title":"Cell-Free Massive MIMO versus Small Cells","volume":"16","author":"Ngo","year":"2017","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_49","doi-asserted-by":"crossref","first-page":"4724","DOI":"10.1109\/TCOMM.2018.2837132","article-title":"Cell-Free Massive MIMO Networks: Optimal Power Control Against Active Eavesdropping","volume":"66","author":"Hoang","year":"2018","journal-title":"IEEE Trans. Commun."},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"1983","DOI":"10.1109\/TIFS.2019.2954748","article-title":"Optimal Downlink Transmission for Cell-Free SWIPT Massive MIMO Systems with Active Eavesdropping","volume":"15","author":"Alageli","year":"2020","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_51","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1007\/s10462-024-10721-6","article-title":"A Review of Convolutional Neural Networks in Computer Vision","volume":"57","author":"Zhao","year":"2024","journal-title":"Artif. Intell. Rev."},{"key":"ref_52","doi-asserted-by":"crossref","unstructured":"Taye, M.M. (2023). Theoretical Understanding of Convolutional Neural Network: Concepts, Architectures, Applications, Future Directions. Computation, 11.","DOI":"10.3390\/computation11030052"},{"key":"ref_53","doi-asserted-by":"crossref","unstructured":"Chen, C., Mat Isa, N.A., and Liu, X. (2025). A Review of Convolutional Neural Network Based Methods for Medical Image Classification. Comput. Biol. Med., 185.","DOI":"10.1016\/j.compbiomed.2024.109507"},{"key":"ref_54","doi-asserted-by":"crossref","unstructured":"Krichen, M. (2023). Convolutional Neural Networks: A Survey. Computers, 12.","DOI":"10.3390\/computers12080151"},{"key":"ref_55","doi-asserted-by":"crossref","first-page":"48322","DOI":"10.1109\/ACCESS.2023.3276628","article-title":"Time Series Prediction Based on LSTM-Attention-LSTM Model","volume":"11","author":"Wen","year":"2023","journal-title":"IEEE Access"},{"key":"ref_56","doi-asserted-by":"crossref","first-page":"102068","DOI":"10.1016\/j.jksuci.2024.102068","article-title":"RNN-LSTM: From Applications to Modeling Techniques and Beyond\u2014Systematic Review","volume":"36","author":"Hassan","year":"2024","journal-title":"J. King Saud-Univ.-Comput. Inf. Sci."},{"key":"ref_57","doi-asserted-by":"crossref","first-page":"104667","DOI":"10.1016\/j.micpro.2022.104667","article-title":"An Efficient Modeling Attack for Breaking the Security of XOR-Arbiter PUFs by Using the Fully Connected and Long-Short Term Memory","volume":"94","author":"Fard","year":"2024","journal-title":"Microprocess. Microsyst."},{"key":"ref_58","doi-asserted-by":"crossref","first-page":"122333","DOI":"10.1016\/j.eswa.2023.122333","article-title":"NOA-LSTM: An Efficient LSTM Cell Architecture for Time Series Forecasting","volume":"238","author":"Yadav","year":"2024","journal-title":"Expert Syst. Appl."},{"key":"ref_59","doi-asserted-by":"crossref","first-page":"702","DOI":"10.1109\/TEVC.2008.919004","article-title":"Biogeography-Based Optimization","volume":"12","author":"Simon","year":"2008","journal-title":"IEEE Trans. Evol. Comput."},{"key":"ref_60","doi-asserted-by":"crossref","first-page":"391","DOI":"10.1109\/TETCI.2017.2739124","article-title":"Biogeography-Based Optimization: A 10-Year Review","volume":"1","author":"Ma","year":"2017","journal-title":"IEEE Trans. Emerg. Top. Comput. Intell."},{"key":"ref_61","doi-asserted-by":"crossref","first-page":"9715","DOI":"10.1007\/s11227-023-05047-z","article-title":"TDMBBO: A Novel Three-Dimensional Migration Model of Biogeography-Based Optimization (Case Study: Facility Planning and Benchmark Problems)","volume":"79","author":"Kaveh","year":"2023","journal-title":"J. Supercomput."},{"key":"ref_62","first-page":"3","article-title":"Secrecy Outage Probability Minimization in Wireless-Powered Communications Using an Improved Biogeography-Based Optimization-Inspired Recurrent Neural Network","volume":"78","author":"Nevisi","year":"2024","journal-title":"Comput. Mater. Contin."},{"key":"ref_63","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1109\/TGCN.2017.2770215","article-title":"On the Total Energy Efficiency of Cell-Free Massive MIMO","volume":"2","author":"Ngo","year":"2018","journal-title":"IEEE Trans. Green Commun. Netw."}],"container-title":["Future Internet"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-5903\/17\/4\/169\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T17:12:53Z","timestamp":1760029973000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-5903\/17\/4\/169"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,11]]},"references-count":63,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2025,4]]}},"alternative-id":["fi17040169"],"URL":"https:\/\/doi.org\/10.3390\/fi17040169","relation":{},"ISSN":["1999-5903"],"issn-type":[{"value":"1999-5903","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,4,11]]}}}