This work is licensed under the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., & Cayirci, E. (2002). Wireless sensor networks: A survey. Computer Networks, 38(4), 393–422.AkyildizI. F.SuW.SankarasubramaniamY.CayirciE.2002Wireless sensor networks: A surveyComputer Networks384393422Search in Google Scholar
Othman, M. F., & Shazali, K. (2012). Wireless sensor network applications: A study in the environment monitoring system. Procedia Engineering, 41, 1204–1210.OthmanM. F.ShazaliK.2012Wireless sensor network applications: A study in the environment monitoring systemProcedia Engineering4112041210Search in Google Scholar
Mohamed, N., Al-Jaroodi, J., Jawhar, I., Idries, A., & Mohammed, F. (2020). Unmanned aerial vehicles applications in future smart cities. Technological forecasting and social change, 153, 119293.MohamedN.Al-JaroodiJ.JawharI.IdriesA.MohammedF.2020Unmanned aerial vehicles applications in future smart citiesTechnological forecasting and social change153119293Search in Google Scholar
Islam, K., Shen, W., & Wang, X. (2012). Wireless sensor network reliability and security in factory automation: A survey. IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews), 42(6), 1243–1256.IslamK.ShenW.WangX.2012Wireless sensor network reliability and security in factory automation: A surveyIEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews)42612431256Search in Google Scholar
Jain, K., Kumar, A., & Singh, A. (2023). Data transmission reduction techniques for improving network lifetime in wireless sensor networks: An up-to-date survey from 2017 to 2022. Transactions on Emerging Telecommunications Technologies, 34(1), e4674.JainK.KumarA.SinghA.2023Data transmission reduction techniques for improving network lifetime in wireless sensor networks: An up-to-date survey from 2017 to 2022Transactions on Emerging Telecommunications Technologies341e4674Search in Google Scholar
Jain, K., & Kumar, A. (2021). A lightweight data transmission reduction method based on a dual prediction technique for sensor networks. Transactions on Emerging Telecommunications Technologies, 32(11), e4345.JainK.KumarA.2021A lightweight data transmission reduction method based on a dual prediction technique for sensor networksTransactions on Emerging Telecommunications Technologies3211e4345Search in Google Scholar
Granjal, J., Monteiro, E., & Silva, J. S. (2015). Security in the integration of low-power Wireless Sensor Networks with the Internet: A survey. Ad Hoc Networks, 24, 264–287.GranjalJ.MonteiroE.SilvaJ. S.2015Security in the integration of low-power Wireless Sensor Networks with the Internet: A surveyAd Hoc Networks24264287Search in Google Scholar
He, Y., Zhou, Z., Pan, Y., Chong, F., Wu, B., Xiao, K., & Li, H. (2024). Review of data security within energy blockchain: A comprehensive analysis of storage, management, and utilization. High-Confidence Computing, 100233.HeY.ZhouZ.PanY.ChongF.WuB.XiaoK.LiH.2024Review of data security within energy blockchain: A comprehensive analysis of storage, management, and utilizationHigh-Confidence Computing100233Search in Google Scholar
Singh, A., & Jain, K. (2022). An efficient secure key establishment method in cluster-based sensor network. Telecommunication Systems, 79(1), 3–16.SinghA.JainK.2022An efficient secure key establishment method in cluster-based sensor networkTelecommunication Systems791316Search in Google Scholar
Gautam, A. K., & Kumar, R. (2021). A comprehensive study on key management, authentication and trust management techniques in wireless sensor networks. SN Applied Sciences, 3(1), 50.GautamA. K.KumarR.2021A comprehensive study on key management, authentication and trust management techniques in wireless sensor networksSN Applied Sciences3150Search in Google Scholar
Singh, P., Acharya, B., & Chaurasiya, R. K. (2021). Lightweight cryptographic algorithms for resource-constrained IoT devices and sensor networks. In Security and Privacy Issues in IoT Devices and Sensor Networks (pp. 153–185). Academic Press.SinghP.AcharyaB.ChaurasiyaR. K.2021Lightweight cryptographic algorithms for resource-constrained IoT devices and sensor networksInSecurity and Privacy Issues in IoT Devices and Sensor Networks153185Academic PressSearch in Google Scholar
Singh, S., Sharma, P. K., Moon, S. Y., & Park, J. H. (2024). Advanced lightweight encryption algorithms for IoT devices: survey, challenges and solutions. Journal of Ambient Intelligence and Humanized Computing, 1–18.SinghS.SharmaP. K.MoonS. Y.ParkJ. H.2024Advanced lightweight encryption algorithms for IoT devices: survey, challenges and solutionsJournal of Ambient Intelligence and Humanized Computing118Search in Google Scholar
Khan, M. N., Rao, A., & Camtepe, S. (2020). Lightweight cryptographic protocols for IoT-constrained devices: A survey. IEEE Internet of Things Journal, 8(6), 4132–4156.KhanM. N.RaoA.CamtepeS.2020Lightweight cryptographic protocols for IoT-constrained devices: A surveyIEEE Internet of Things Journal8641324156Search in Google Scholar
Pandey, S., & Bhushan, B. (2024). Recent Lightweight cryptography (LWC) based security advances for resource-constrained IoT networks. Wireless Networks, 30(4), 2987–3026.PandeyS.BhushanB.2024Recent Lightweight cryptography (LWC) based security advances for resource-constrained IoT networksWireless Networks30429873026Search in Google Scholar
Iqbal, S., & Sujatha, B. R. (2024). Secure authentication and key management based on hierarchical enhanced identity based digital signature in heterogeneous wireless sensor network. Wireless Networks, 1–21.IqbalS.SujathaB. R.2024Secure authentication and key management based on hierarchical enhanced identity based digital signature in heterogeneous wireless sensor networkWireless Networks121Search in Google Scholar
Gopalakrishnan, K. (2020). Security vulnerabilities and issues of traditional wireless sensors networks in IoT. Principles of internet of things (IoT) ecosystem: Insight paradigm, 519–549.GopalakrishnanK.2020Security vulnerabilities and issues of traditional wireless sensors networks in IoTPrinciples of internet of things (IoT) ecosystem: Insight paradigm519549Search in Google Scholar
Oztoprak, A., Hassanpour, R., Ozkan, A., & Oztoprak, K. (2024). Security Challenges, Mitigation Strategies, and Future Trends in Wireless Sensor Networks: A Review. ACM Computing Surveys.OztoprakA.HassanpourR.OzkanA.OztoprakK.2024Security Challenges, Mitigation Strategies, and Future Trends in Wireless Sensor Networks: A ReviewACM Computing SurveysSearch in Google Scholar
Kampourakis, V., Gkioulos, V., & Katsikas, S. (2023). A systematic literature review on wireless security testbeds in the cyber-physical realm. Computers & Security, 103383.KampourakisV.GkioulosV.KatsikasS.2023A systematic literature review on wireless security testbeds in the cyber-physical realmComputers & Security103383Search in Google Scholar
Saeed, M. M., Ali, E. S., & Saeed, R. A. (2023). Data-driven techniques and security issues in wireless networks. In Data-Driven Intelligence in Wireless Networks (pp. 107–154). CRC Press.SaeedM. M.AliE. S.SaeedR. A.2023Data-driven techniques and security issues in wireless networksInData-Driven Intelligence in Wireless Networks107154CRC PressSearch in Google Scholar
Alghamdi, A., Al Shahrani, A. M., AlYami, S. S., Khan, I. R., Sri, P. A., Dutta, P., ... & Venkatareddy, P. (2024). Security and energy efficient cyber-physical systems using predictive modeling approaches in wireless sensor network. Wireless Networks, 30(6), 5851–5866.AlghamdiA.Al ShahraniA. M.AlYamiS. S.KhanI. R.SriP. A.DuttaP.VenkatareddyP.2024Security and energy efficient cyber-physical systems using predictive modeling approaches in wireless sensor networkWireless Networks30658515866Search in Google Scholar
Jain, K., & Kumar, A. (2020). Energy-efficient data-aggregation technique for correlated spatial and temporal data in cluster-based sensor networks. International Journal of Business Data Communications and Networking (IJBDCN), 16(2), 53–68.JainK.KumarA.2020Energy-efficient data-aggregation technique for correlated spatial and temporal data in cluster-based sensor networksInternational Journal of Business Data Communications and Networking (IJBDCN)1625368Search in Google Scholar
Agarwal, A., Dev, A., & Jain, K. (2020). Prolonging sensor network lifetime by using energy-efficient cluster-based scheduling. Int J Sci Technol Res, 9(4), 3410–3415.AgarwalA.DevA.JainK.2020Prolonging sensor network lifetime by using energy-efficient cluster-based schedulingInt J Sci Technol Res9434103415Search in Google Scholar
L. Eschenauer and V. D. Gligor, “A key-management scheme for distributed sensor networks”, Proc. ACM Conf. Comput. Commun. Securit, pp. 41–47, 2002-Nov.EschenauerL.GligorV. D.“A key-management scheme for distributed sensor networks”Proc. ACM Conf. Comput. Commun. Securit41472002-NovSearch in Google Scholar
Albrecht, M., Gentry, C., Halevi, S., & Katz, J. (2009, November). Attacking cryptographic schemes based on “perturbation polynomials”. In Proceedings of the 16th ACM conference on Computer and communications security (pp. 1–10).AlbrechtM.GentryC.HaleviS.KatzJ.2009, NovemberAttacking cryptographic schemes based on “perturbation polynomials”InProceedings of the 16th ACM conference on Computer and communications security110Search in Google Scholar
Saha, R., Geetha, G., Kumar, G., & Kim, T. H. (2018). RK-AES: An Improved Version of AES Using a New Key Generation Process with Random Keys. Security and Communication Networks, 2018(1), 9802475.SahaR.GeethaG.KumarG.KimT. H.2018RK-AES: An Improved Version of AES Using a New Key Generation Process with Random KeysSecurity and Communication Networks201819802475Search in Google Scholar
Masaeli, N., Javadi, H. H. S., & Erfani, S. H. (2020). Key pre-distribution scheme based on transversal design in large mobile fog networks with multi-clouds. Journal of Information Security and Applications, 54, 102519.MasaeliN.JavadiH. H. S.ErfaniS. H.2020Key pre-distribution scheme based on transversal design in large mobile fog networks with multi-cloudsJournal of Information Security and Applications54102519Search in Google Scholar
Kandi, M. A., Kouicem, D. E., Doudou, M., Lakhlef, H., Bouabdallah, A., & Challal, Y. (2022). A decentralized blockchain-based key management protocol for heterogeneous and dynamic IoT devices. Computer Communications, 191, 11–25.KandiM. A.KouicemD. E.DoudouM.LakhlefH.BouabdallahA.ChallalY.2022A decentralized blockchain-based key management protocol for heterogeneous and dynamic IoT devicesComputer Communications1911125Search in Google Scholar
Verma, R. M., & Basile, B. E. (2013, June). Modeling and analysis of LEAP, a key management protocol for wireless sensor networks. In 2013 IEEE International Workshop on Security and Privacy of Mobile, Wireless, and Sensor Networks (MWSN) (pp. 23–25). IEEE.VermaR. M.BasileB. E.2013, JuneModeling and analysis of LEAP, a key management protocol for wireless sensor networksIn2013 IEEE International Workshop on Security and Privacy of Mobile, Wireless, and Sensor Networks (MWSN)2325IEEESearch in Google Scholar
Yu, X., Fang, J., & Zhang, Z. (2013). A Security Mechanism Based on Authenticated Diffie-Hellman for WSN. TELKOMNIKA Indonesian Journal of Electrical Engineering, 11(6), 3349–3354.YuX.FangJ.ZhangZ.2013A Security Mechanism Based on Authenticated Diffie-Hellman for WSNTELKOMNIKA Indonesian Journal of Electrical Engineering11633493354Search in Google Scholar
Mehra, P. S., Doja, M. N., & Alam, B. (2019). Codeword Authenticated Key Exchange (CAKE) light weight secure routing protocol for WSN. International Journal of Communication Systems, 32(3), e3879.MehraP. S.DojaM. N.AlamB.2019Codeword Authenticated Key Exchange (CAKE) light weight secure routing protocol for WSNInternational Journal of Communication Systems323e3879Search in Google Scholar
Chen, C. M., Deng, X., Gan, W., Chen, J., & Islam, S. H. (2021). A secure blockchain-based group key agreement protocol for IoT. The Journal of Supercomputing, 77, 9046–9068.ChenC. M.DengX.GanW.ChenJ.IslamS. H.2021A secure blockchain-based group key agreement protocol for IoTThe Journal of Supercomputing7790469068Search in Google Scholar
Singh, A., & Jain, K. (2022). An automated lightweight key establishment method for secure communication in WSN. Wireless Personal Communications, 124(4), 2831–2851.SinghA.JainK.2022An automated lightweight key establishment method for secure communication in WSNWireless Personal Communications124428312851Search in Google Scholar
Msolli, A., Ajmi, N., Helali, A., Gassoumi, A., Maaref, H., & Mghaieth, R. (2023). New key management scheme based on pool-hash for WSN and IoT. Journal of Information Security and Applications, 73, 103415.MsolliA.AjmiN.HelaliA.GassoumiA.MaarefH.MghaiethR.2023New key management scheme based on pool-hash for WSN and IoTJournal of Information Security and Applications73103415Search in Google Scholar
Jain, K., & Singh, A. (2024). IHKM: an improved hierarchical key management scheme for wireless sensor network. Telecommunication Systems, 1–16.JainK.SinghA.2024IHKM: an improved hierarchical key management scheme for wireless sensor networkTelecommunication Systems116Search in Google Scholar
Di Pietro, R., Mancini, L. V., & Mei, A. (2010). Hierarchies of keys in secure multicast communications. Journal of Computer Security, 18(5), 839–860.Di PietroR.ManciniL. V.MeiA.2010Hierarchies of keys in secure multicast communicationsJournal of Computer Security185839860Search in Google Scholar
Doraipandian, M., & Neelamegam, P. (2015). An Efficient Key Management Scheme in Multi-Tier and Multi-Cluster Wireless Sensor Networks. Int. J. Netw. Secur., 17(6), 651–660.DoraipandianM.NeelamegamP.2015An Efficient Key Management Scheme in Multi-Tier and Multi-Cluster Wireless Sensor NetworksInt. J. Netw. Secur.176651660Search in Google Scholar
Li, Z., Wang, H., & Fang, H. (2017). Group-based cooperation on symmetric key generation for wireless body area networks. IEEE Internet of Things Journal, 4(6), 1955–1963.LiZ.WangH.FangH.2017Group-based cooperation on symmetric key generation for wireless body area networksIEEE Internet of Things Journal4619551963Search in Google Scholar
Amutha, J., Sharma, S., & Sharma, S. K. (2022). An energy efficient cluster based hybrid optimization algorithm with static sink and mobile sink node for Wireless Sensor Networks. Expert Systems with Applications, 203, 117334.AmuthaJ.SharmaS.SharmaS. K.2022An energy efficient cluster based hybrid optimization algorithm with static sink and mobile sink node for Wireless Sensor NetworksExpert Systems with Applications203117334Search in Google Scholar
Ruj, S., Nayak, A., & Stojmenovic, I. (2012). Pairwise and triple key distribution in wireless sensor networks with applications. IEEE Transactions on Computers, 62(11), 2224–2237.RujS.NayakA.StojmenovicI.2012Pairwise and triple key distribution in wireless sensor networks with applicationsIEEE Transactions on Computers621122242237Search in Google Scholar
Baburaj, E. (2017). Polynomial and multivariate mapping-based triple-key approach for secure key distribution in wireless sensor networks. Computers & Electrical Engineering, 59, 274–290.BaburajE.2017Polynomial and multivariate mapping-based triple-key approach for secure key distribution in wireless sensor networksComputers & Electrical Engineering59274290Search in Google Scholar
Das, A. K., Wazid, M., Yannam, A. R., Rodrigues, J. J., & Park, Y. (2019). Provably secure ECC-based device access control and key agreement protocol for IoT environment. IEEE Access, 7, 55382–55397.DasA. K.WazidM.YannamA. R.RodriguesJ. J.ParkY.2019Provably secure ECC-based device access control and key agreement protocol for IoT environmentIEEE Access75538255397Search in Google Scholar
Yu, B., & Li, H. (2019). Anonymous authentication key agreement scheme with pairing-based cryptography for home-based multi-sensor Internet of Things. International Journal of Distributed Sensor Networks, 15(9), 1550147719879379.YuB.LiH.2019Anonymous authentication key agreement scheme with pairing-based cryptography for home-based multi-sensor Internet of ThingsInternational Journal of Distributed Sensor Networks1591550147719879379Search in Google Scholar
Zhao, G., Yang, X., Zhou, B., & Wei, W. (2010, July). RSA-based digital image encryption algorithm in wireless sensor networks. In 2010 2nd International conference on signal processing systems (Vol. 2, pp. V2-640). IEEE.ZhaoG.YangX.ZhouB.WeiW.2010, JulyRSA-based digital image encryption algorithm in wireless sensor networksIn2010 2nd International conference on signal processing systems2V2640IEEESearch in Google Scholar
Chatterjee, S., & Das, A. K. (2015). An effective ECC-based user access control scheme with attribute-based encryption for wireless sensor networks. Security and Communication Networks, 8(9), 1752–1771.ChatterjeeS.DasA. K.2015An effective ECC-based user access control scheme with attribute-based encryption for wireless sensor networksSecurity and Communication Networks8917521771Search in Google Scholar
Ali, I., Hassan, A., & Li, F. (2019). Authentication and privacy schemes for vehicular ad hoc networks (VANETs): A survey. Vehicular Communications, 16, 45–61.AliI.HassanA.LiF.2019Authentication and privacy schemes for vehicular ad hoc networks (VANETs): A surveyVehicular Communications164561Search in Google Scholar
Dhanda, S. S., Singh, B., & Jindal, P. (2020). Lightweight cryptography: a solution to secure IoT. Wireless Personal Communications, 112(3), 1947–1980.DhandaS. S.SinghB.JindalP.2020Lightweight cryptography: a solution to secure IoTWireless Personal Communications112319471980Search in Google Scholar
Twardokus, G., Bindel, N., Rahbari, H., & McCarthy, S. (2022). When cryptography needs a hand: Practical post-quantum authentication for V2V communications. Cryptology ePrint Archive.TwardokusG.BindelN.RahbariH.McCarthyS.2022When cryptography needs a hand: Practical post-quantum authentication for V2V communicationsCryptology ePrint ArchiveSearch in Google Scholar
Ganeshan, A., Jayagopalan, S., Perumal, B., & Sarveshwaran, V. (2023). Secure identity key and blockchain-based authentication approach for secure data communication in multi-WSN. Concurrency and Computation: Practice and Experience, 35(28), e7861.GaneshanA.JayagopalanS.PerumalB.SarveshwaranV.2023Secure identity key and blockchain-based authentication approach for secure data communication in multi-WSNConcurrency and Computation: Practice and Experience3528e7861Search in Google Scholar
Almuseelem, W. (2023). Energy-efficient and security-aware task offloading for multi-tier edge-cloud computing systems. IEEE Access.AlmuseelemW.2023Energy-efficient and security-aware task offloading for multi-tier edge-cloud computing systemsIEEE AccessSearch in Google Scholar
Aydeger, A., Zeydan, E., Yadav, A. K., Hemachandra, K. T., & Liyanage, M. (2024, October). Towards a quantum-resilient future: Strategies for transitioning to post-quantum cryptography. In 2024 15th International Conference on Network of the Future (NoF) (pp. 195–203). IEEE.AydegerA.ZeydanE.YadavA. K.HemachandraK. T.LiyanageM.2024, OctoberTowards a quantum-resilient future: Strategies for transitioning to post-quantum cryptographyIn2024 15th International Conference on Network of the Future (NoF)195203IEEESearch in Google Scholar
Ahlawat, P., & Dave, M. (2018). A cost-effective attack matrix based key management scheme with dominance key set for wireless sensor network security. International Journal of Communication Systems, 31(12), e3713.AhlawatP.DaveM.2018A cost-effective attack matrix based key management scheme with dominance key set for wireless sensor network securityInternational Journal of Communication Systems3112e3713Search in Google Scholar
Dinker, A. G., & Sharma, V. (2019). Polynomial and matrix based key management security scheme in wireless sensor networks. Journal of Discrete Mathematical Sciences and Cryptography, 22(8), 1563–1575.DinkerA. G.SharmaV.2019Polynomial and matrix based key management security scheme in wireless sensor networksJournal of Discrete Mathematical Sciences and Cryptography22815631575Search in Google Scholar
Roy, K. S., Deb, S., & Kalita, H. K. (2024). A novel hybrid authentication protocol utilizing lattice-based cryptography for IoT devices in fog networks. Digital Communications and Networks, 10(4), 989–1000.RoyK. S.DebS.KalitaH. K.2024A novel hybrid authentication protocol utilizing lattice-based cryptography for IoT devices in fog networksDigital Communications and Networks1049891000Search in Google Scholar
Kumar, V., Malik, N., Dhiman, G., & Lohani, T. K. (2021). Scalable and storage efficient dynamic key management scheme for wireless sensor network. Wireless Communications and Mobile Computing, 2021(1), 5512879.KumarV.MalikN.DhimanG.LohaniT. K.2021Scalable and storage efficient dynamic key management scheme for wireless sensor networkWireless Communications and Mobile Computing202115512879Search in Google Scholar
Xu, C., & Liu, W. (2014). Key updating methods for combinatorial design based key management schemes. Journal of Sensors, 2014(1), 134357.XuC.LiuW.2014Key updating methods for combinatorial design based key management schemesJournal of Sensors20141134357Search in Google Scholar
Kumar, A., & Pais, A. R. (2019). A new combinatorial design based key pre-distribution scheme for wireless sensor networks. Journal of Ambient Intelligence and Humanized Computing, 10, 2401–2416.KumarA.PaisA. R.2019A new combinatorial design based key pre-distribution scheme for wireless sensor networksJournal of Ambient Intelligence and Humanized Computing1024012416Search in Google Scholar
Solari Esfehani, N., & Haj Seyyed Javadi, H. (2021). A survey of key pre-distribution schemes based on combinatorial designs for resource-constrained devices in the IoT network. Wireless Networks, 27(4), 3025–3052.Solari EsfehaniN.Haj Seyyed JavadiH.2021A survey of key pre-distribution schemes based on combinatorial designs for resource-constrained devices in the IoT networkWireless Networks27430253052Search in Google Scholar
Mahamat, M., Jaber, G., & Bouabdallah, A. (2023). Achieving efficient energy-aware security in IoT networks: a survey of recent solutions and research challenges. Wireless Networks, 29(2), 787–808.MahamatM.JaberG.BouabdallahA.2023Achieving efficient energy-aware security in IoT networks: a survey of recent solutions and research challengesWireless Networks292787808Search in Google Scholar
Poornima, M. R., Vimala, H. S., & Shreyas, J. (2023). Holistic survey on energy aware routing techniques for IoT applications. Journal of Network and Computer Applications, 213, 103584.PoornimaM. R.VimalaH. S.ShreyasJ.2023Holistic survey on energy aware routing techniques for IoT applicationsJournal of Network and Computer Applications213103584Search in Google Scholar
Jain, K., Agarwal, A., & Abraham, A. (2022). A combinational data prediction model for data transmission reduction in wireless sensor networks. IEEE Access, 10, 53468–53480.JainK.AgarwalA.AbrahamA.2022A combinational data prediction model for data transmission reduction in wireless sensor networksIEEE Access105346853480Search in Google Scholar
Rao, P. M., & Deebak, B. D. (2023). A comprehensive survey on authentication and secure key management in internet of things: Challenges, countermeasures, and future directions. Ad Hoc Networks, 146, 103159.RaoP. M.DeebakB. D.2023A comprehensive survey on authentication and secure key management in internet of things: Challenges, countermeasures, and future directionsAd Hoc Networks146103159Search in Google Scholar
Sen, J. (2023). A survey of cryptography and key management schemes for wireless sensor networks. In Wireless Sensor Networks-Design, Applications and Challenges. IntechOpen.SenJ.2023A survey of cryptography and key management schemes for wireless sensor networksInWireless Sensor Networks-Design, Applications and ChallengesIntechOpenSearch in Google Scholar
Gupta, M., & Jain, K. (2024). A Comprehensive Survey of Aerial Mesh Networks (AMN): Characteristics, Application, Open Issues, Challenges, and Research Directions. Wireless Personal Communications, 138(1), 333–368.GuptaM.JainK.2024A Comprehensive Survey of Aerial Mesh Networks (AMN): Characteristics, Application, Open Issues, Challenges, and Research DirectionsWireless Personal Communications1381333368Search in Google Scholar
Fathalla, E., & Azab, M. (2024). Beyond Classical Cryptography: A Systematic Review of Post-Quantum Hash-Based Signature Schemes, Security, and Optimizations. IEEE Access.FathallaE.AzabM.2024Beyond Classical Cryptography: A Systematic Review of Post-Quantum Hash-Based Signature Schemes, Security, and OptimizationsIEEE AccessSearch in Google Scholar
Shim, K. A. (2021). A survey on post-quantum public-key signature schemes for secure vehicular communications. IEEE Transactions on Intelligent Transportation Systems, 23(9), 14025–14042.ShimK. A.2021A survey on post-quantum public-key signature schemes for secure vehicular communicationsIEEE Transactions on Intelligent Transportation Systems2391402514042Search in Google Scholar
Surla, G., & Lakshmi, R. (2023). Design and evaluation of novel hybrid quantum resistant cryptographic system for enhancing security in wireless body sensor networks. Optical and Quantum Electronics, 55(14), 1252.SurlaG.LakshmiR.2023Design and evaluation of novel hybrid quantum resistant cryptographic system for enhancing security in wireless body sensor networksOptical and Quantum Electronics55141252Search in Google Scholar
Al-Mekhlafi, Z. G., Al-Janabi, H. D. K., Khalil, A., Al-Shareeda, M. A., Mohammed, B. A., Alsadhan, A. A., ... & Almekhlafi, K. (2024). Lattice-Based Cryptography and Fog Computing Based Efficient Anonymous Authentication Scheme for 5G-Assisted Vehicular Communications. IEEE Access.Al-MekhlafiZ. G.Al-JanabiH. D. K.KhalilA.Al-ShareedaM. A.MohammedB. A.AlsadhanA. A.AlmekhlafiK.2024Lattice-Based Cryptography and Fog Computing Based Efficient Anonymous Authentication Scheme for 5G-Assisted Vehicular CommunicationsIEEE AccessSearch in Google Scholar
Sharma, P., & BR, P. (2024). A lightweight group key management scheme with constant rekeying cost and public bulletin size. Information Security Journal: A Global Perspective, 33(2), 97–120.SharmaP.BRP.2024A lightweight group key management scheme with constant rekeying cost and public bulletin sizeInformation Security Journal: A Global Perspective33297120Search in Google Scholar
Logeshwaran, J., Shanmugasundaram, R. N., & Lloret, J. (2024). Load based dynamic channel allocation model to enhance the performance of device-to-device communication in WPAN. Wireless Networks, 1–33.LogeshwaranJ.ShanmugasundaramR. N.LloretJ.2024Load based dynamic channel allocation model to enhance the performance of device-to-device communication in WPANWireless Networks133Search in Google Scholar
Sapra, V., Sapra, L., Bhardwaj, A., Almogren, A., Bharany, S., Ur Rehman, A., & Ouahada, K. (2024). Diabetic Retinopathy Detection Using Deep Learning with Optimized Feature Selection. Traitement du Signal, 41(2).SapraV.SapraL.BhardwajA.AlmogrenA.BharanyS.Ur RehmanA.OuahadaK.2024Diabetic Retinopathy Detection Using Deep Learning with Optimized Feature SelectionTraitement du Signal412Search in Google Scholar
Khashan, O. A., Khafajah, N. M., Alomoush, W., Alshinwan, M., & Alomari, E. (2024). Smart energy-efficient encryption for wireless multimedia sensor networks using deep learning. IEEE Open Journal of the Communications Society.KhashanO. A.KhafajahN. M.AlomoushW.AlshinwanM.AlomariE.2024Smart energy-efficient encryption for wireless multimedia sensor networks using deep learningIEEE Open Journal of the Communications SocietySearch in Google Scholar
Logeshwaran, J., Shanmugasundaram, R. N., & Lloret, J. (2024). Load based dynamic channel allocation model to enhance the performance of device-to-device communication in WPAN. Wireless Networks, 1–33.LogeshwaranJ.ShanmugasundaramR. N.LloretJ.2024Load based dynamic channel allocation model to enhance the performance of device-to-device communication in WPANWireless Networks133Search in Google Scholar