SECRE-MEN: A Lightweight Quantum-Resilient Authentication Framework for IoT-Edge Networks
DOI:
https://doi.org/10.18196/jrc.v6i4.26006Keywords:
Masked Cryptographic Techniques, Post-Quantum Authentication, Bloom Filter Revocation, MEC Security, PUFBased IoT AuthenticationAbstract
The wide 6G-IoT and Mobile Edge Computing (MEC) deployments give rise to severe concerns in authentication, revocation and protection against quantum-post and side channel attacks. In this paper, SECRE-MEN (Secure and Efficient Cryptographic Revocable Authentication for MEC enabled Networks) is presented to be a lightweight and scalable authentication architecture specifically designed for the resource limited IoT systems. SECRE-MEN consists of three main parts: (1) Masked Cryptographic Techniques that are used to randomise elliptic curve operations, thereby mitigate side-channel attacks, (2) VCs, providing support for digitally-signed, lightweight authentication, without requiring the use of bulky certificates, and (3) a Bloom filter-based RDB, which is distributed across multiple MEC nodes, to allow for fast, memory-efficient revocation checks. To enable future-proof security post-quantum cryptography (PQC) is included in SECRE-MEN by lattice-based schemes, such as Kyber and Dilithium, which may incur additional computational cost on ultra-low-power platforms according to the trade-off introduced in this paper. Effort experiments show that the proposed RAM-MENAMI decreases 29.3% the computation cost, and reduces 21.8% the communication budget and improve 20.3% of power efficiency in comparison with the RAM-MEN. In addition, SECRE-MEN is resistant against impersonation, MITM, replay and quantum attacks, as well as allows for dynamic revocation and secure synchronization among MEC nodes. This places SECREMEN as an effective toolkit for cybersecurity of massive IoT-MEC networks in the era of the evolving 6G.
References
R. Mishra and A. Mishra, “Current research on internet of things (iot) security protocols: A survey,” Computers & Security, vol. 151, 2025, doi: 10.1016/j.cose.2024.104310.
Q. A. Al-Haija and A. Droos, “A comprehensive survey on deep learningbased intrusion detection systems in internet of things (iot),” Expert Systems, vol. 42, no. 2, 2025, doi: 10.1111/exsy.13726.
K. C. Rath, A. Khang, and D. Roy, “The role of internet of things (iot) technology in industry 4.0 economy,” in Advanced IoT technologies and applications in the industry 4.0 digital economy, pp. 1–28, 2024.
M. Alaa, A. A. Zaidan, B. B. Zaidan, M. Talal, and M. L. M. Kiah, “A review of smart home applications based on internet of things,” Journal of network and computer applications, vol. 97, pp. 48–65, 2017, doi: 10.1016/j.jnca.2017.08.017.
S. I. Loutfi, I. Shayea, U. Tureli, A. A. El-Saleh, and W. Tashan, “An overview of mobility awareness with mobile edge computing over 6g network: Challenges and future research directions,” Results in Engineering, vol. 23, 2024, doi: 10.1016/j.rineng.2024.102601.
B. A. Mohammed, M. A. Al-Shareeda, Z. G. Al-Mekhlafi, J. S. Alshudukhi and K. A. Al-Dhlan, “HAFC: Handover Authentication Scheme Based on Fog Computing for 5G-Assisted Vehicular Blockchain Networks,” in IEEE Access, vol. 12, pp. 6251-6261, 2024, doi: 10.1109/ACCESS.2024.3351278.
N. Yang, S. Chen, H. Zhang and R. Berry, “Beyond the Edge: An Advanced Exploration of Reinforcement Learning for Mobile Edge Computing, Its Applications, and Future Research Trajectories,” in IEEE Communications Surveys & Tutorials, vol. 27, no. 1, pp. 546-594, 2025, doi: 10.1109/COMST.2024.3405075.
A. A. A. Almazroi, M. A. Alqarni, M. A. Al-Shareeda, and S. Manickam, “L-cppa: Lattice-based conditional privacy-preserving authentication scheme for fog computing with 5g-enabled vehicular system,” PLOS ONE, vol. 18, 2023, doi: 10.1371/journal.pone.0292690.
A. M. Rahmani, S. Alsubai, A. Alanazi, A. Alqahtani, M. M. Zaidi, and M. Hosseinzadeh, “The role of mobile edge computing in advancing federated learning algorithms and techniques: A systematic review of applications, challenges, and future directions,” Computers and Electrical Engineering, vol. 120, 2024, doi: 10.1016/j.compeleceng.2024.109812.
V. Rajyalakshmi and K. Lakshmanna, “A review on smart city-iot and deep learning algorithms, challenges,” International journal of engineering systems modelling and simulation, vol. 13, no. 1, pp. 3–26, 2022, doi: 10.1504/IJESMS.2022.122733.
P. Bellini, P. Nesi, and G. Pantaleo, “Iot-enabled smart cities: A review of concepts, frameworks and key technologies,” Applied Sciences, vol. 12, no. 3, 2022, doi: 10.3390/app12031607.
T. M. Ghazal et al., “Iot for smart cities: Machine learning approaches in smart healthcare—a review,” Future Internet, vol. 13, no. 8, 2021, doi: 10.3390/fi13080218.
S. A. Alowais et al., “Revolutionizing healthcare: the role of artificial intelligence in clinical practice,” BMC medical education, vol. 23, no. 689, 2023, doi: 10.1186/s12909-023-04698-z.
B. Maschler and M. Weyrich, “Deep Transfer Learning for Industrial Automation: A Review and Discussion of New Techniques for DataDriven Machine Learning,” in IEEE Industrial Electronics Magazine, vol. 15, no. 2, pp. 65-75, 2021, doi: 10.1109/MIE.2020.3034884.
M. M. Hamdi, A. S. Mustafa, H. F. Mahd, M. S. Abood, C. Kumar and M. A. Al-shareeda, “Performance Analysis of QoS in MANET based on IEEE 802.11b,” 2020 IEEE International Conference for Innovation in Technology (INOCON), pp. 1-5, 2020, doi: 10.1109/INOCON50539.2020.9298362.
A. Haleem, M. Javaid, R. P. Singh, S. Rab, and R. Suman, “Hyperautomation for the enhancement of automation in industries,” Sensors International, vol. 2, 2021, doi: 10.1016/j.sintl.2021.100124.
A. E. Adeniyi, R. G. Jimoh, and J. B. Awotunde, “A systematic review on elliptic curve cryptography algorithm for internet of things: Categorization, application areas, and security,” Computers and Electrical Engineering, vol. 118, 2024, doi: 10.1016/j.compeleceng.2024.109330.
A. A. A. Almazroi, M. H. Alkinani, M. A. Al-Shareeda, and S. Manickam, “A novel ddos mitigation strategy in 5g-based vehicular networks using chebyshev polynomials,” Arabian Journal for Science and Engineering, vol. 49, pp. 11991–12004, 2024, doi: 10.1007/s13369-023-08535-9.
Z. AlZamili, K. M. Danach and M. Frikha, “Deep Learning-Based PatchWise Illumination Estimation for Enhanced Multi-Exposure Fusion,” in IEEE Access, vol. 11, pp. 120642-120653, 2023, doi: 10.1109/ACCESS.2023.3328579.
X. Zhang, K. Chen, J. Ding, Y. Yang, W. Zhang and N. Yu, “Provably Secure Public-Key Steganography Based on Elliptic Curve Cryptography,” in IEEE Transactions on Information Forensics and Security, vol. 19, pp. 3148-3163, 2024, doi: 10.1109/TIFS.2024.3361219.
K. A.-A. Mutlaq, V. O. Nyangaresi, M. A. Omar, Z. A. Abduljabbar, I. Q. Abduljaleel, J. Ma, and M. A. Al Sibahee, “Low complexity smart grid security protocol based on elliptic curve cryptography, biometrics and hamming distance,” Plos one, vol. 19, no. 1, 2024, doi: 10.1371/journal.pone.0296781.
M. El-Hajj and P. Beune, “Lightweight public key infrastructure for the internet of things: A systematic literature review,” Journal of Industrial Information Integration, vol. 41, 2024, doi: 10.1016/j.jii.2024.100670.
S. Choudhary, A. Kumar, and K. Kumar, “Pkif-aka: A public key infrastructure free authenticated key agreement protocol for smart grid communication,” IETE Journal of Research, vol. 70, no. 4, pp. 3395– 3406, 2024, doi: 10.1080/03772063.2023.2200381.
Z. Ghaleb Al-Mekhlafi et al., “Oblivious Transfer-Based Authentication and Privacy-Preserving Protocol for 5G-Enabled Vehicular Fog Computing,” in IEEE Access, vol. 12, pp. 100152-100166, 2024, doi: 10.1109/ACCESS.2024.3429179.
R. Halder, D. Das Roy, and D. Shin, “A blockchain-based decentralized public key infrastructure using the web of trust,” Journal of Cybersecurity and Privacy, vol. 4, no. 2, pp. 196–222, 2024, doi: 10.3390/jcp4020010.
K. K. Coelho, M. Nogueira, M. C. Marim, E. F. Silva, A. B. Vieira and J. A. M. Nacif, “LORENA: Low memORy symmEtric-Key geNerAtion Method for Based on Group Cryptography Protocol Applied to the Internet of Healthcare Things,” in IEEE Access, vol. 10, pp. 12564-12579, 2022, doi: 10.1109/ACCESS.2022.3143210.
A. Nurgaliyev and H. Wang, “Comparative study of symmetric cryptographic algorithms,” 2021 International Conference on Networking and Network Applications (NaNA), pp. 107-112, 2021, doi: 10.1109/NaNA53684.2021.00026.
V. O. Nyangaresi, M. Ahmad, A. Alkhayyat, and W. Feng, “Artificial neural network and symmetric key cryptography based verification protocol for 5g enabled internet of things,” Expert Systems, vol. 39, no. 10, 2022, doi: 10.1111/exsy.13126.
A. Alomari and S. A. Kumar, “Securing iot systems in a post-quantum environment: Vulnerabilities, attacks, and possible solutions,” Internet of Things, vol. 25, 2024, doi: 10.1016/j.iot.2024.101132.
Z. Alzamili, K. Danach, and M. Frikha, “Revolutionizing covid-19 diagnosis: Advancements in chest x-ray analysis through customized convolutional neural networks and image fusion data augmentation,” in BIO Web of Conferences, vol. 97, pp. 1–20, 2024, doi: 10.1051/bioconf/20249700014.
L. Soni, H. Chandra, and D. S. Gupta, “Post-quantum attack resilience blockchain-assisted data authentication protocol for smart healthcare system,” Software: Practice and Experience, vol. 54, no. 11, pp. 2170– 2190, 2024, doi: 10.1002/spe.3336.
Y.-S. Xu, B.-B. Cai, Z. Yuan, S.-J. Qin, F. Gao, and Q.-Y. Wen, “Quantum differential meet-in-the-middle attack and some applications to lightweight ciphers,” Advanced Quantum Technologies, vol. 7, no. 10, 2024, doi: 10.1002/qute.202400157.
J. Zhang, C. Chen, J. Cui, and K. Li, “Timing side-channel attacks and countermeasures in cpu microarchitectures,” ACM Computing Surveys, vol. 56, no. 7, pp. 1–40, 2024, doi: 10.1145/3645109.
S. Otoom, “Risk auditing for digital twins in cyber physical systems: A systematic review,” Journal of Cyber Security and Risk Auditing, vol. 2025, no. 1, pp. 22–35, 2025, doi: 10.63180/jcsra.thestap.2025.1.3.
M. Saare, A. Hussain, and W. S. Yue, “Investigating the effectiveness of mobile peer support to enhance the quality of life of older adults: A systematic literature review,” International Journal of Interactive Mobile Technologies, pp. 130–139, 2019, doi: 10.3991/ijim.v13i04.10525.
A. A. Ahmed et al., “Secure AI for 6G Mobile Devices: Deep Learning Optimization Against Side-Channel Attacks,” in IEEE Transactions on Consumer Electronics, vol. 70, no. 1, pp. 3951-3959, 2024, doi: 10.1109/TCE.2024.3372018.
N. U. Ain, S.-S. Ahmadpour, N. J. Navimipour, E. Diakina, and S. R. Kassa, “Secure quantum-based adder design for protecting machine learning systems against side-channel attacks,” Applied Soft Computing, vol. 169, 2025, doi: 10.1016/j.asoc.2024.112554.
A. Hussain, M. A. Saare, O. M. Jasim, and A. A. Mahdi, “A heuristic evaluation of iraq e-portal,” Journal of Telecommunication, Electronic and Computer Engineering (JTEC), vol. 10, no. 1-10, pp. 103–107, 2018.
F.-X. Standaert, “Introduction to side-channel attacks,” Secure integrated circuits and systems, pp. 27–42, 2010, doi: 10.1007/978-0-387-71829-3_2.
M. A. Al-Shareeda, M. A. Saare, and S. Manickam, “Unmanned aerial vehicle: a review and future directions,” Indonesian Journal of Electrical Engineering and Computer Science, vol. 30, no. 2, pp. 778–786, 2023, doi: 10.11591/ijeecs.v30.i2.pp778-786.
Z. Alzamli, K. Danach and M. Frikha, “Machine Learning Techniques in Service of COVID-19: Data Augmentation Based on Multi-Exposure Image FusionTowards Anomaly Prediction,” 2022 4th International Conference on Current Research in Engineering and Science Applications (ICCRESA), pp. 54-58, 2022, doi: 10.1109/ICCRESA57091.2022.10352482.
M. Tanveer and S. A. Aldossari, “Ram-men: Robust authentication mechanism for iot-enabled edge networks,” Alexandria Engineering Journal, vol. 112, pp. 436–447, 2025, doi: 10.1016/j.aej.2024.10.116.
A. Yadav, S. Kumar, and J. Singh, “A review of physical unclonable functions (pufs) and its applications in iot environment,” Ambient Communications and Computer Systems: Proceedings of RACCCS 2021, pp. 1–13, 2022, doi: 10.1007/978-981-16-7952-0_1.
O. Aljumaiah, W. Jiang, S. R. Addula, and M. A. Almaiah, “Analyzing cybersecurity risks and threats in it infrastructure based on nist framework,” Journal of Cyber Security and Risk Auditing, vol. 2025, no. 2, pp. 12–26, 2025, doi: 10.63180/jcsra.thestap.2025.2.2.
M. A. Saare, A. Hussain, and W. S. Yue, “Relationships between the older adult’s cognitive decline and quality of life: The mediating role of the assistive mobile health applications,” Internatioanl Journal of Interactive Mobile Technologies, vol. 13, pp. 42–55, 2019, doi: 10.3991/ijim.v13i10.11288.
R. Almanasir, D. Al-solomon, S. Indrawes, M. A. Almaiah, U. Islam, and M. Alshar’e, “Classification of threats and countermeasures of cloud computing,” Journal of Cyber Security and Risk Auditing, vol. 2025, no. 2, pp. 27–42, 2025, doi: 10.63180/jcsra.thestap.2025.2.3.
M. A. Al-Shareeda, M. A. Saare, and S. Manickam, “The blockchain internet of things: review, opportunities, challenges, and recommendations,” Indonesian Journal of Electrical Engineering and Computer Science, pp. 1673–1683, 2023.
R. Chataut, M. Nankya, and R. Akl, “6g networks and the ai revolution—exploring technologies, applications, and emerging challenges,” Sensors, vol. 24, no. 6, 2024, doi: 10.3390/s24061888.
M. A. Al-Shareeda, M. A. Saare, and S. Manickam, “Unmanned aerial vehicle: a review and future directions,” Indonesian Journal of Electrical Engineering and Computer Science (IJEECS), vol. 30, no. 2, pp. 778–786, 2023, doi: 10.11591/ijeecs.v30.i2.pp778-786.
R. Mitra and B. Rong, “Integration of MTC and Satellites for IoT toward 6G Era,” in IEEE Wireless Communications, vol. 32, no. 1, pp. 16-17, 2025, doi: 10.1109/MWC.2025.10872847.
L. Rui, L. Zhao, J. Yan, X. Qiu and S. Guo, “Trusted Authentication Mechanism of IoT Terminal Based on Authorization Consensus and Reputation Evaluation,” in IEEE Internet of Things Journal, vol. 11, no. 13, pp. 23961-23976, 2024, doi: 10.1109/JIOT.2024.3387448.
A. A. Almazroi, E. A. Aldhahri, M. A. Al-Shareeda, and S. Manickam, “Eca-vfog: An efficient certificateless authentication scheme for 5gassisted vehicular fog computing,” Plos one, vol. 18, no. 6, 2023, doi: 10.1371/journal.pone.0287291.
A. Munir, I. A. Sumra, R. Naveed, and M. A. Javed, “Techniques for authentication and defense strategies to mitigate iot security risks,” Journal of Computing & Biomedical Informatics, vol. 7, no. 01, 2024.
A. Pathak, I. Al-Anbagi and H. J. Hamilton, “Blockchain-Enhanced Zero Knowledge Proof-Based Privacy-Preserving Mutual Authentication for IoT Networks,” in IEEE Access, vol. 12, pp. 118618-118636, 2024, doi: 10.1109/ACCESS.2024.3450313.
P. Infant Vinoth, D. Nagendra Kumar, M. Guhan, M. Archana, and S. Santhana Hari, “A secure authentication mechanism for iot devices using hyperledger fabric,” in International Conference on Advances in Distributed Computing and Machine Learning, pp. 357–372, 2024, doi: 10.1007/978-981-97-1841-2_27.
M. Zhao, C. Shi, and Y. Yuan, “Blockchain-based lightweight authentication mechanisms for industrial internet of things and information systems,” International Journal on Semantic Web and Information Systems (IJSWIS), vol. 20, no. 1, pp. 1–30, 2024, doi: 10.4018/IJSWIS.334704.
O. Alruwaili, F. Mohammed Alotaibi, M. Tanveer, S. Chaoui and A. Armghan, “PSAF-IoT: Physically Secure Authentication Framework for the Internet of Things,” in IEEE Access, vol. 12, pp. 78549-78561, 2024, doi: 10.1109/ACCESS.2024.3407353.
M. R. Alboalebrah and S. Al-augby, “Unveiling the causes of fatal road accidents in iraq: An association rule mining approach using the apriori algorithm,” Journal of Cyber Security and Risk Auditing, vol. 2025, no. 2, pp. 1–11, 2025, doi: 10.63180/jcsra.thestap.2025.2.1.
M. Kokila and S. Reddy, “Authentication, access control and scalability models in internet of things security-a review,” Cyber Security and Applications, vol. 3, 2024, doi: 10.1016/j.csa.2024.100057.
A. A. Almazroi, M. A. Alqarni, M. A. Al-Shareeda, and S. Manickam, “Lcppa: Lattice-based conditional privacy-preserving authentication scheme for fog computing with 5g-enabled vehicular system,” Plos one, vol. 18, no. 10, 2023, doi: 10.1371/journal.pone.0292690.
K. Srinivas, K. Sagar, and V. Thirupathi, “An investigation of authentication mechanisms used in the internet of things,” in AIP Conference Proceedings, vol. 2971, no. 1, 2024, doi: 10.1063/5.0195862.
G. Cheng, Y. Chen, S. Deng, H. Gao and J. Yin, “A Blockchain-Based Mutual Authentication Scheme for Collaborative Edge Computing,” in IEEE Transactions on Computational Social Systems, vol. 9, no. 1, pp. 146-158, 2022, doi: 10.1109/TCSS.2021.3056540.
A. A. Almazroi, M. A. Alqarni, M. A. Al-Shareeda, M. H. Alkinani, A. A. Almazroey, and T. Gaber, “Fca-vbn: Fog computing-based authentication scheme for 5g-assisted vehicular blockchain network,” Internet of Things, vol. 25, 2024, doi: 10.1016/j.iot.2024.101096.
E. S. Babu, A. Barthwal, and R. Kaluri, “Sec-edge: Trusted blockchain system for enabling the identification and authentication of edge based 5g networks,” Computer Communications, vol. 199, pp. 10–29, 2023, doi: 10.1016/j.comcom.2022.12.001.
A. Almaini, A. Al-Dubai, I. Romdhani, M. Schramm, and A. Alsarhan, “Lightweight edge authentication for software defined networks,” Computing, vol. 103, no. 2, pp. 291–311, 2021, doi: 10.1007/s00607-020- 00835-4.
Y. Zhang, K. Cheng, F. Khan, R. Alturki, R. Khan, and A. U. Rehman, “A mutual authentication scheme for establishing secure deviceto-device communication sessions in the edge-enabled smart cities,” Journal of Information Security and Applications, vol. 58, 2021, doi: 10.1016/j.jisa.2020.102683.
F. Xie, Z. Pang, H. Wen, W. Lei and X. Xu, “Weighted Voting in Physical Layer Authentication for Industrial Wireless Edge Networks,” in IEEE Transactions on Industrial Informatics, vol. 18, no. 4, pp. 2796-2806, 2022, doi: 10.1109/TII.2021.3103780.
M. Al Shareeda, A. Khalil and W. Fahs, “Towards the Optimization of Road Side Unit Placement Using Genetic Algorithm,” 2018 International Arab Conference on Information Technology (ACIT), pp. 1-5, 2018, doi: 10.1109/ACIT.2018.8672687.
Y. Lu, D. Wang, M. S. Obaidat and P. Vijayakumar, “Edge-Assisted Intelligent Device Authentication in Cyber–Physical Systems,” in IEEE Internet of Things Journal, vol. 10, no. 4, pp. 3057-3070, 2023, doi: 10.1109/JIOT.2022.3151828.
A. Shahidinejad, M. Ghobaei-Arani, A. Souri, M. Shojafar and S. Kumari, “Light-Edge: A Lightweight Authentication Protocol for IoT Devices in an Edge-Cloud Environment,” in IEEE Consumer Electronics Magazine, vol. 11, no. 2, pp. 57-63, 2022, doi: 10.1109/MCE.2021.3053543.
G. Cheng et al., “A Lightweight Authentication-Driven Trusted Management Framework for IoT Collaboration,” in IEEE Transactions on Services Computing, vol. 17, no. 3, pp. 747-760, 2024, doi: 10.1109/TSC.2023.3349305.
O. Alruwaili, M. Tanveer, F. M. Alotaibi, W. Abdelfattah, A. Armghan, and F. M. Alserhani, “Securing the iot-enabled smart healthcare system: A puf-based resource-efficient authentication mechanism,” Heliyon, vol. 10, no. 18, 2024.
A. K. Maurya, A. K. Das, S. S. Jamal, and D. Giri, “Secure user authentication mechanism for iot-enabled wireless sensor networks based on multiple bloom filters,” Journal of Systems Architecture, vol. 120, 2021, doi: 10.1016/j.sysarc.2021.102296.
B. A. Mohammed, M. A. Al-Shareeda, Z. G. Al-Mekhlafi, J. S. Alshudukhi and K. A. Al-Dhlan, “HAFC: Handover Authentication Scheme Based on Fog Computing for 5G-Assisted Vehicular Blockchain Networks,” in IEEE Access, vol. 12, pp. 6251-6261, 2024, doi: 10.1109/ACCESS.2024.3351278.
K. Mahmood, S. A. Chaudhry, H. Naqvi, S. Kumari, X. Li, and A. K. Sangaiah, “An elliptic curve cryptography based lightweight authentication scheme for smart grid communication,” Future Generation Computer Systems, vol. 81, pp. 557–565, 2018, doi: 10.1016/j.future.2017.05.002.
M. A. Al-Shareeda, A. M. Ali, M. A. Hammoud, Z. H. M. Kazem, and M. A. Hussein, “Secure iot-based real-time water level monitoring system using esp32 for critical infrastructure,” Journal of Cyber Security and Risk Auditing, vol. 2025, no. 2, pp. 44–52, 2025, doi: 10.63180/jcsra.thestap.2025.2.4.
D. Abbasinezhad-Mood and M. Nikooghadam, “Design and hardware implementation of a security-enhanced elliptic curve cryptography based lightweight authentication scheme for smart grid communications,” Future Generation Computer Systems, vol. 84, pp. 47–57, 2018, doi: 10.1016/j.future.2018.02.034.
B. N. Alhasnawi and B. H. Jasim, “SCADA controlled smart home using Raspberry Pi3,” 2018 International Conference on Advance of Sustainable Engineering and its Application (ICASEA), pp. 1-6, 2018, doi: 10.1109/ICASEA.2018.8370946.
Y. Chen, J. -F. Mart´ınez, P. Castillejo and L. Lopez, “A Bilinear Map Pairing Based Authentication Scheme for Smart Grid Communications: PAuth,” in IEEE Access, vol. 7, pp. 22633-22643, 2019, doi: 10.1109/ACCESS.2019.2898376.
B. N. Alhasnawi, M. Zanker, and V. Bures, “A new smart charging electric vehicle and optimal dg placement in active distribution networks with optimal operation of batteries,” Results in Engineering, vol. 25, 2025, doi: 10.1016/j.rineng.2025.104521.
D. Kumari and K. Singh, “Lightweight secure authentication and key agreement technique for smart grid,” Peer-to-Peer Networking and Applications, vol. 17, no. 1, pp. 451–478, 2024, doi: 10.1007/s12083-023-01585-8.
B. N. Alhasnawi, B. H. Jasim, A. N. Alhasnawi, F. F. K. Hussain, R. Z. Homod, H. A. Hasan, O. I. Khalaf, R. Abbassi, B. Bazooyar, M. Zanker et al., “A novel efficient energy optimization in smart urban buildings based on optimal demand side management,” Energy Strategy Reviews, vol. 54, 2024, doi: 10.1016/j.esr.2024.101461.
B. N. Alhasnawi, S. M. M. Almutoki, F. F. K. Hussain, A. Harrison, B. Bazooyar, M. Zanker, and V. Bures, “A new methodology for reducing carbon emissions using multi-renewable energy systems and artificial intelligence,” Sustainable Cities and Society, vol. 114, 2024, doi: 10.1016/j.scs.2024.105721.
M. A. AbouElaz, B. N. Alhasnawi, B. E. Sedhom, and V. Bures, “Anfis-optimized control for resilient and efficient supply chain performance in smart manufacturing,” Results in Engineering, vol. 25, 2025, doi: 10.1016/j.rineng.2025.104262.
B. N. Alhasnawi, M. Zanker, and V. Bures, “A smart electricity markets for a decarbonized microgrid system,” Electrical Engineering, pp. 1–21, 2024, doi: 10.1007/s00202-024-02699-9.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 May Adnan Faleh, Ali M. Abdulsada, Ali A. Alaidany, Mahmood A. Al-Shareeda, Mohammed Amin Almaiah, Rami Shehab

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
This journal is based on the work at https://journal.umy.ac.id/index.php/jrc under license from Creative Commons Attribution-ShareAlike 4.0 International License. You are free to:
- Share – copy and redistribute the material in any medium or format.
- Adapt – remix, transform, and build upon the material for any purpose, even comercially.
The licensor cannot revoke these freedoms as long as you follow the license terms, which include the following:
- Attribution. You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- ShareAlike. If you remix, transform, or build upon the material, you must distribute your contributions under the same license as the original.
- No additional restrictions. You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
• Creative Commons Attribution-ShareAlike (CC BY-SA)
JRC is licensed under an International License