{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T15:21:33Z","timestamp":1772119293871,"version":"3.50.1"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2024,1,31]],"date-time":"2024-01-31T00:00:00Z","timestamp":1706659200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,31]],"date-time":"2024-01-31T00:00:00Z","timestamp":1706659200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2026,2]]},"DOI":"10.1007\/s00500-023-09601-y","type":"journal-article","created":{"date-parts":[[2024,1,31]],"date-time":"2024-01-31T10:03:07Z","timestamp":1706695387000},"page":"935-950","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Symmetric key and polynomial-based key generation mechanism for secured data communications in 5G networks"],"prefix":"10.1007","volume":"30","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5507-7273","authenticated-orcid":false,"given":"S.","family":"Pradeep","sequence":"first","affiliation":[]},{"given":"S.","family":"Muthurajkumar","sequence":"additional","affiliation":[]},{"given":"Sannasi","family":"Ganapathy","sequence":"additional","affiliation":[]},{"given":"A.","family":"Kannan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,1,31]]},"reference":[{"key":"9601_CR1","doi-asserted-by":"publisher","first-page":"893","DOI":"10.1016\/j.future.2019.05.053","volume":"100","author":"AA Abd El-Latif","year":"2019","unstructured":"Abd El-Latif AA, Abd-El-Atty B, Venegas-Andraca SE, Mazurczyk W (2019) Efficient quantum-based security protocols for information sharing and data protection in 5G networks. Future Gener Comput Syst 100:893\u2013906","journal-title":"Future Gener Comput Syst"},{"issue":"1","key":"9601_CR2","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1109\/TNSM.2020.2969863","volume":"17","author":"AA Abd El-Latif","year":"2020","unstructured":"Abd El-Latif AA, Abd-El-Atty B, Mazurczyk W, Fung C, Venegas-Andraca SE (2020) Secure data encryption based on quantum walks for 5G internet of things scenario. IEEE Trans Netw Serv Manag 17(1):118\u2013131","journal-title":"IEEE Trans Netw Serv Manag"},{"issue":"4","key":"9601_CR3","doi-asserted-by":"publisher","first-page":"102549","DOI":"10.1016\/j.ipm.2021.102549","volume":"58","author":"AA Abd El-Latif","year":"2021","unstructured":"Abd El-Latif AA, Abd-El-Atty B, Mehmood I, Muhammad K, Venegas-Andraca SE, Peng J (2021) Quantum-inspired blockchain-based cybersecurity: securing smart edge utilities in IoT-based smart cities. Inform Process Manag 58(4):102549\u2013102888","journal-title":"Inform Process Manag"},{"issue":"10","key":"9601_CR4","doi-asserted-by":"publisher","first-page":"819","DOI":"10.1364\/JOCN.9.000819","volume":"9","author":"A Aguado","year":"2017","unstructured":"Aguado A, Lopez V, Martinez-Mateo J, Szyrkowiec T, Autenrieth A, Peev M, Lopez D, Martin V (2017) Hybrid conventional and quantum security for software defined and virtualized networks. IEEE\/OSA J Opt Commun Netw 9(10):819\u2013825","journal-title":"IEEE\/OSA J Opt Commun Netw"},{"issue":"4","key":"9601_CR5","doi-asserted-by":"publisher","first-page":"421","DOI":"10.1364\/JOCN.10.000421","volume":"10","author":"A Aguado","year":"2018","unstructured":"Aguado A, Lopez V, Martinez-Mateo J, Peev M, Lopez D, Martin V (2018) Virtual network function deployment and service automation to provide end-to-end quantum encryption. IEEE\/OSA J Opt Commun Netw 10(4):421\u2013430","journal-title":"IEEE\/OSA J Opt Commun Netw"},{"issue":"15","key":"9601_CR6","first-page":"1199","volume":"2018","author":"A Aichhorn","year":"2018","unstructured":"Aichhorn A, Unterweger A, Mayrhofer R, Engel D (2018) Investigating the impact of network security on the line current differential protection system. J Eng 2018(15):1199\u20131203","journal-title":"J Eng"},{"issue":"5","key":"9601_CR7","doi-asserted-by":"publisher","first-page":"2801","DOI":"10.1109\/JSEN.2014","volume":"15","author":"K Biswas","year":"2015","unstructured":"Biswas K, Muthukkumarasamy V, Singh K (2015) An encryption scheme using chaotic map and genetic operations for wireless sensor networks. IEEE Sens J 15(5):2801\u20132809. https:\/\/doi.org\/10.1109\/JSEN.2014","journal-title":"IEEE Sens J"},{"key":"9601_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jnca.2017.11.009","volume":"102","author":"J Caoa","year":"2018","unstructured":"Caoa J, Ma M, Li H, Yulong Fu, Liu X (2018) EGHR: efficient group-based handover authentication protocols for mMTC in 5G wireless networks. J Netw Comput Appl 102:1\u201316","journal-title":"J Netw Comput Appl"},{"key":"9601_CR9","doi-asserted-by":"publisher","first-page":"1228","DOI":"10.1016\/j.procs.2015.07.420","volume":"57","author":"S Chandra","year":"2015","unstructured":"Chandra S, Mandal B, Alam SS, Bhattacharyya S (2015) Content based double encryption algorithm using symmetric key cryptography. Procedia Comput Sci 57:1228\u20131234","journal-title":"Procedia Comput Sci"},{"key":"9601_CR10","doi-asserted-by":"publisher","first-page":"59200","DOI":"10.1109\/ACCESS.2019.2914359","volume":"7","author":"M De Ree","year":"2019","unstructured":"De Ree M, Mantas G, Radwan A, Mumtaz S, Rodriguez J, Otung IE (2019) Key management for beyond 5G mobile small cells: a survey. IEEE Access 7:59200\u201359236","journal-title":"IEEE Access"},{"key":"9601_CR11","doi-asserted-by":"publisher","first-page":"4850","DOI":"10.1109\/ACCESS.2017.2779146","volume":"6","author":"D Fang","year":"2018","unstructured":"Fang D, Qian Y, Hu RQ (2018) Security for 5G mobile wireless networks. IEEE Access 6:4850\u20134874","journal-title":"IEEE Access"},{"key":"9601_CR12","doi-asserted-by":"publisher","first-page":"55139","DOI":"10.1109\/ACCESS.2018.2872789","volume":"6","author":"X Feng","year":"2018","unstructured":"Feng X, Wang L (2018) S2PD: a selective sharing scheme for privacy data in vehicular social networks. IEEE Access 6:55139\u201355148","journal-title":"IEEE Access"},{"issue":"1","key":"9601_CR13","first-page":"1","volume":"271","author":"S Ganapathy","year":"2013","unstructured":"Ganapathy S, Kulothungan K, Muthurajkumar S, Vijayalakshmi M, Yogesh P, Kannan A (2013) Intelligent feature selection and classification techniques for intrusion detection in networks: a survey. EURASIP J Wirel Commun Netw 271(1):1\u201316","journal-title":"EURASIP J Wirel Commun Netw"},{"issue":"12","key":"9601_CR14","doi-asserted-by":"publisher","first-page":"1184","DOI":"10.1364\/JOCN.9.001184","volume":"9","author":"HS Gill","year":"2017","unstructured":"Gill HS, Gill SS, Bhatia KS (2017) A novel chaos-based encryption approach for future-generation passive optical networks using SHA-2. IEEE\/OSA J Opt Commun Netw 9(12):1184\u20131190","journal-title":"IEEE\/OSA J Opt Commun Netw"},{"key":"9601_CR15","doi-asserted-by":"publisher","first-page":"1209","DOI":"10.1016\/j.future.2017.07.025","volume":"86","author":"MA Hamid","year":"2018","unstructured":"Hamid MA, Abdullah-Al-Wadud M, Hassan MM, Almogren A, Alamri A, Kamal AR, Mamun-Or-Rashid M (2018) A key distribution scheme for secure communication in acoustic sensor networks. Future Gener Comput Syst 86:1209\u20131217","journal-title":"Future Gener Comput Syst"},{"issue":"1","key":"9601_CR16","doi-asserted-by":"publisher","first-page":"188","DOI":"10.1109\/69.273037","volume":"6","author":"L Harn","year":"1994","unstructured":"Harn L, Huang D (1994) A protocol for establishing secure communication channels in a large network. IEEE Trans Knowl Data Eng 6(1):188\u2013191","journal-title":"IEEE Trans Knowl Data Eng"},{"issue":"16","key":"9601_CR17","doi-asserted-by":"publisher","first-page":"1455","DOI":"10.1109\/LPT.2018.2853155","volume":"30","author":"Z Hu","year":"2018","unstructured":"Hu Z, Chan C (2018) A real-valued chaotic orthogonal matrix transform-based encryption for OFDM-PON. IEEE Photon Technol Lett 30(16):1455\u20131458","journal-title":"IEEE Photon Technol Lett"},{"key":"9601_CR18","doi-asserted-by":"crossref","unstructured":"Kouzehzar H, Moghadam MN, Torkzadeh P (2018) A high data rate pipelined architecture of AES encryption\/decryption in storage area networks. Iranian Conference on Electrical Engineering (ICEE). 23\u201328","DOI":"10.1109\/ICEE.2018.8472499"},{"key":"9601_CR19","doi-asserted-by":"publisher","first-page":"50468","DOI":"10.1109\/ACCESS.2018.2869174","volume":"6","author":"B Li","year":"2018","unstructured":"Li B, Zhou Q, Si X, Fu J (2018) Mimic encryption system for network security. IEEE Access 6:50468\u201350487","journal-title":"IEEE Access"},{"issue":"6","key":"9601_CR20","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1109\/CC.2015.7122470","volume":"12","author":"G Liu","year":"2015","unstructured":"Liu G, Liu B, Liu X, Li F, Guo W (2015) Low-complexity secure network coding against wiretapping using intra\/inter-generation coding. China Commun 12(6):116\u2013125","journal-title":"China Commun"},{"key":"9601_CR21","doi-asserted-by":"publisher","first-page":"15682","DOI":"10.1109\/ACCESS.2017.2713440","volume":"5","author":"T Liu","year":"2017","unstructured":"Liu T, Tian J, Gui Y, Liu Y, Liu P (2017) SEDEA: state estimation-based dynamic encryption and authentication in smart grid. IEEE Access 5:15682\u201315693","journal-title":"IEEE Access"},{"key":"9601_CR22","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1016\/j.compeleceng.2018.03.036","volume":"68","author":"R Logambigai","year":"2018","unstructured":"Logambigai R, Ganapathy S, Kannan A (2018) Energy\u2013efficient grid-based routing algorithm using intelligent fuzzy rules for wireless sensor networks. Comput Electr Eng 68:62\u201375","journal-title":"Comput Electr Eng"},{"issue":"3","key":"9601_CR23","doi-asserted-by":"publisher","first-page":"830","DOI":"10.1109\/TII.2015.2425142","volume":"11","author":"R Muradore","year":"2015","unstructured":"Muradore R, Quaglia D (2015) Energy-efficient intrusion detection and mitigation for networked control systems security. IEEE Trans Industr Inf 11(3):830\u2013840","journal-title":"IEEE Trans Industr Inf"},{"issue":"3","key":"9601_CR24","doi-asserted-by":"publisher","first-page":"558","DOI":"10.1109\/TBCAS.2017.2665659","volume":"11","author":"H Peng","year":"2017","unstructured":"Peng H, Tian Y, Kurths J, Li L, Yang Y, Wang D (2017) Secure and energy-efficient data transmission system based on chaotic compressive sensing in body-to-body networks. IEEE Trans Biomed Circuits Syst 11(3):558\u2013573","journal-title":"IEEE Trans Biomed Circuits Syst"},{"key":"9601_CR25","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-021-08221-9","author":"S Pradeep","year":"2021","unstructured":"Pradeep S, Muthurajkumar S, Ganapathy S, Kannan A (2021) A matrix translation and elliptic curve based cryptosystem for secured data communications in WSNs. Wirel Person Commun. https:\/\/doi.org\/10.1007\/s11277-021-08221-9","journal-title":"Wirel Person Commun"},{"issue":"4","key":"9601_CR26","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1109\/MCAS.2017.2757080","volume":"17","author":"D Schinianakis","year":"2017","unstructured":"Schinianakis D (2017) Alternative security options in the 5G and IoT era. IEEE Circuits Syst Mag 17(4):6\u201328","journal-title":"IEEE Circuits Syst Mag"},{"key":"9601_CR27","doi-asserted-by":"publisher","first-page":"11229","DOI":"10.1109\/ACCESS.2018.2796539","volume":"6","author":"S Shin","year":"2018","unstructured":"Shin S, Kwon T (2018) Two-factor authenticated key agreement supporting unlinkability in 5G-integrated wireless sensor networks. IEEE Access 6:11229\u201311241","journal-title":"IEEE Access"},{"issue":"1","key":"9601_CR28","first-page":"56","volume":"18","author":"P Suthanthiramani","year":"2021","unstructured":"Suthanthiramani P, Muthurajkumar S, Sannasi G, Arputharaj K (2021) Secured data storage and retrieval using elliptic curve cryptography in cloud. Int Arab J Inform Technol 18(1):56\u201366","journal-title":"Int Arab J Inform Technol"},{"issue":"4","key":"9601_CR29","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1364\/JOCN.10.000289","volume":"10","author":"T Szyrkowiec","year":"2018","unstructured":"Szyrkowiec T et al (2018) Automatic intent-based secure service creation through a multilayer SDN network orchestration. IEEE\/OSA J Opt Commun Netw 10(4):289\u2013297","journal-title":"IEEE\/OSA J Opt Commun Netw"},{"issue":"2","key":"9601_CR30","doi-asserted-by":"publisher","first-page":"376","DOI":"10.1109\/LCOMM.2015.2505312","volume":"20","author":"S Tan","year":"2016","unstructured":"Tan S, Li X, Dong Q (2016) TrustR: an integrated router security framework for protecting computer networks. IEEE Commun Lett 20(2):376\u2013379","journal-title":"IEEE Commun Lett"},{"key":"9601_CR31","doi-asserted-by":"publisher","first-page":"26059","DOI":"10.1109\/ACCESS.2018.2832854","volume":"6","author":"H Tang","year":"2018","unstructured":"Tang H, Sun QT, Yang X, Long K (2018) A network coding and des based dynamic encryption scheme for moving target defense. IEEE Access 6:26059\u201326068","journal-title":"IEEE Access"},{"issue":"1","key":"9601_CR32","doi-asserted-by":"publisher","first-page":"566","DOI":"10.1109\/COMST.2017.2749508","volume":"20","author":"R Tourani","year":"2018","unstructured":"Tourani R, Misra S, Mick T, Panwar G (2018) Security, privacy, and access control in information-centric networking: a survey. IEEE Commun Surv Tutorials 20(1):566\u2013600","journal-title":"IEEE Commun Surv Tutorials"},{"issue":"9","key":"9601_CR33","doi-asserted-by":"publisher","first-page":"1360","DOI":"10.1016\/j.camwa.2012.01.038","volume":"65","author":"P Vijayakumar","year":"2013","unstructured":"Vijayakumar P, Bose S, Kannan A (2013) Centralized key distribution protocol using the greatest common divisor method. Comput Math Appl 65(9):1360\u20131368","journal-title":"Comput Math Appl"},{"issue":"3","key":"9601_CR34","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1049\/iet-ifs.2012.0352","volume":"8","author":"P Vijayakumar","year":"2014","unstructured":"Vijayakumar P, Bose S, Kannan A (2014) Chinese remainder theorem based centralised group key management for secure multicast communication. IET Inform Secur 8(3):179\u2013187","journal-title":"IET Inform Secur"},{"issue":"4","key":"9601_CR35","doi-asserted-by":"publisher","first-page":"1015","DOI":"10.1109\/TITS.2015.2492981","volume":"17","author":"P Vijayakumar","year":"2016","unstructured":"Vijayakumar P, Azees M, Kannan A, Jegatha Deborah L (2016) Dual authentication and key management techniques for secure data transmission in vehicular ad hoc networks. IEEE Trans Intell Transp Syst 17(4):1015\u20131028","journal-title":"IEEE Trans Intell Transp Syst"},{"issue":"3","key":"9601_CR36","doi-asserted-by":"publisher","first-page":"736","DOI":"10.1109\/TCSS.2018.2855047","volume":"5","author":"W Wei","year":"2018","unstructured":"Wei W, Liu S, Li W, Du D (2018) Fractal intelligent privacy protection in online social network using attribute-based encryption schemes. IEEE Trans Comput Soc Syst 5(3):736\u2013747","journal-title":"IEEE Trans Comput Soc Syst"},{"issue":"2","key":"9601_CR37","doi-asserted-by":"publisher","first-page":"466","DOI":"10.1109\/TC.2015.2419662","volume":"65","author":"Q Wu","year":"2016","unstructured":"Wu Q, Qin B, Zhang L, Domingo-Ferrer J, Farr\u00e0s O, Manj\u00f3n JA (2016) Contributory broadcast encryption with efficient encryption and short ciphertexts. IEEE Trans Comput 65(2):466\u2013479","journal-title":"IEEE Trans Comput"},{"key":"9601_CR38","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1016\/j.jnca.2019.01.017","volume":"131","author":"B Ying","year":"2019","unstructured":"Ying B, Nayak A (2019) Lightweight remote user authentication protocol for multi- server 5G networks using self-certified public key cryptography. J Netw Comput Appl 131:66\u201374","journal-title":"J Netw Comput Appl"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-023-09601-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00500-023-09601-y","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-023-09601-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T07:29:55Z","timestamp":1772090995000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00500-023-09601-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1,31]]},"references-count":38,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2026,2]]}},"alternative-id":["9601"],"URL":"https:\/\/doi.org\/10.1007\/s00500-023-09601-y","relation":{"has-preprint":[{"id-type":"doi","id":"10.21203\/rs.3.rs-565284\/v1","asserted-by":"object"}]},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"value":"1432-7643","type":"print"},{"value":"1433-7479","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,1,31]]},"assertion":[{"value":"17 December 2023","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 January 2024","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have not disclosed any competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}