{"id":"https://openalex.org/W3096233165","doi":"https://doi.org/10.1108/lht-09-2020-0217","title":"A secure anonymous tracing fog-assisted method for the Internet of Robotic Things","display_name":"A secure anonymous tracing fog-assisted method for the Internet of Robotic Things","publication_year":2020,"publication_date":"2020-10-28","ids":{"openalex":"https://openalex.org/W3096233165","doi":"https://doi.org/10.1108/lht-09-2020-0217","mag":"3096233165"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1108/lht-09-2020-0217","pdf_url":null,"source":{"id":"https://openalex.org/S143568823","display_name":"Library Hi Tech","issn_l":"0737-8831","issn":["0737-8831","2054-166X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5035762316","display_name":"Abdulrahman Alamer","orcid":"https://orcid.org/0000-0002-1061-7093"},"institutions":[{"id":"https://openalex.org/I91450128","display_name":"Jazan University","ror":"https://ror.org/02bjnq803","country_code":"SA","type":"education","lineage":["https://openalex.org/I91450128"]}],"countries":["SA"],"is_corresponding":true,"raw_author_name":"Abdulrahman Alamer","raw_affiliation_strings":["Department of Information Technology and Security, College of Computer Science and Information Technology, Jazan University, Jazan, Kingdom of Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Department of Information Technology and Security, College of Computer Science and Information Technology, Jazan University, Jazan, Kingdom of Saudi Arabia","institution_ids":["https://openalex.org/I91450128"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5035762316"],"corresponding_institution_ids":["https://openalex.org/I91450128"],"apc_list":null,"apc_paid":null,"fwci":1.15,"has_fulltext":false,"cited_by_count":12,"citation_normalized_percentile":{"value":0.999945,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":88,"max":89},"biblio":{"volume":"40","issue":"4","first_page":"1081","last_page":"1103"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11478","display_name":"Caching and Content Delivery","score":0.9993,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11478","display_name":"Caching and Content Delivery","score":0.9993,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9978,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9959,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/tracing","display_name":"Tracing","score":0.810498}],"concepts":[{"id":"https://openalex.org/C138673069","wikidata":"https://www.wikidata.org/wiki/Q322229","display_name":"Tracing","level":2,"score":0.810498},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7691126},{"id":"https://openalex.org/C167615521","wikidata":"https://www.wikidata.org/wiki/Q1048911","display_name":"Elliptic curve cryptography","level":4,"score":0.5205982},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.5200919},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.43629062},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4336245},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4157126},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.39864534},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.373039},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.34917852},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3481608},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.2838469},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.13685173},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.11286956},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1108/lht-09-2020-0217","pdf_url":null,"source":{"id":"https://openalex.org/S143568823","display_name":"Library Hi Tech","issn_l":"0737-8831","issn":["0737-8831","2054-166X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","score":0.42,"display_name":"Industry, innovation and infrastructure"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":31,"referenced_works":["https://openalex.org/W1831876755","https://openalex.org/W1993284846","https://openalex.org/W2043012581","https://openalex.org/W2074633331","https://openalex.org/W2100632211","https://openalex.org/W2102140417","https://openalex.org/W2117354552","https://openalex.org/W2126540423","https://openalex.org/W2274668409","https://openalex.org/W2416787247","https://openalex.org/W2747548784","https://openalex.org/W2773451080","https://openalex.org/W2883837786","https://openalex.org/W2898898096","https://openalex.org/W2900770881","https://openalex.org/W2946339525","https://openalex.org/W2962079123","https://openalex.org/W2964373423","https://openalex.org/W2973797313","https://openalex.org/W2980624050","https://openalex.org/W2980967476","https://openalex.org/W2981148748","https://openalex.org/W2985020236","https://openalex.org/W2996812502","https://openalex.org/W2999660017","https://openalex.org/W3009134807","https://openalex.org/W3015134349","https://openalex.org/W3019458743","https://openalex.org/W3023612450","https://openalex.org/W3033857256","https://openalex.org/W3034481240"],"related_works":["https://openalex.org/W767161385","https://openalex.org/W4322486674","https://openalex.org/W4300630816","https://openalex.org/W4226182343","https://openalex.org/W2888673113","https://openalex.org/W2235903869","https://openalex.org/W2164478452","https://openalex.org/W1956043843","https://openalex.org/W1590958755","https://openalex.org/W1556944867"],"abstract_inverted_index":{"Purpose":[0],"Employing":[1],"a":[2,65,75,81,105,119,140,145,150,161,164,220],"fog":[3,141,157],"computing":[4],"(FC)":[5],"network":[6,11,30,44,99,121,214],"system":[7,12,45,122],"in":[8,80,149],"the":[9,35,42,95,113,125,136,156,175,184,202],"robotic":[10,19,25],"is":[13,90,187,205,236],"an":[14,28,212,232],"effective":[15],"solution":[16],"to":[17,52,73,93,111,163,199,207],"support":[18,112,208],"application":[20],"issues.":[21],"The":[22],"interconnection":[23],"between":[24],"devices":[26,79,117],"through":[27,118],"FC":[29,43,120,213],"can":[31,46,143,159],"be":[32],"referred":[33],"as":[34,174,231],"Internet":[36],"of":[37,49,97,115],"Robotic":[38],"Things":[39],"(IoRT).":[40],"Although":[41],"provide":[47,74,160],"number":[48],"services":[50,63],"closer":[51],"IoRT":[53,98,116,209],"devices,":[54],"it":[55],"still":[56],"faces":[57],"significant":[58],"challenges":[59],"including":[60],"real-time":[61],"tracing":[62,67,108,114,193,239],"and":[64,83,130,190,226],"secure":[66,82,106,151],"services.":[68],"Therefore,":[69],"this":[70],"paper":[71,103,218],"aims":[72],"tracking":[76],"mobile":[77],"robot":[78,147,166],"private":[84,171],"manner,":[85,152],"with":[86],"high":[87],"efficiency":[88],"performance,":[89],"considered":[91],"essential":[92],"ensuring":[94],"success":[96],"applications.":[100],"Design/methodology/approach":[101],"This":[102,217],"proposes":[104],"anonymous":[107],"(SAT)":[109],"method":[110,222],"based":[123,223],"on":[124,224],"Counting":[126],"Bloom":[127],"filter":[128],"(CBF)":[129],"elliptic":[131,227],"curve":[132,228],"cryptography":[133,229],"techniques.":[134],"With":[135],"proposed":[137,203],"SAT":[138,185,221],"mechanism,":[139],"node":[142,158],"trace":[144],"particular":[146,165],"device":[148,167],"which":[153],"means":[154],"that":[155,183,201,235],"service":[162],"without":[168],"revealing":[169],"any":[170],"data":[172],"such":[173],"device's":[176],"identity":[177],"or":[178],"location.":[179],"Findings":[180],"Analysis":[181],"shows":[182],"mechanism":[186,204,234],"both":[188],"efficient":[189,233],"resilient":[191,237],"against":[192,238],"attacks.":[194,240],"Simulation":[195],"results":[196],"are":[197],"provided":[198],"show":[200],"beneficial":[206],"applications":[210],"over":[211],"system.":[215],"Originality/value":[216],"represents":[219],"CBF":[225],"techniques":[230]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W3096233165","counts_by_year":[{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":6},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1}],"updated_date":"2024-12-12T09:33:46.571952","created_date":"2020-11-09"}