{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T16:18:12Z","timestamp":1772122692695,"version":"3.50.1"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2021,2,26]],"date-time":"2021-02-26T00:00:00Z","timestamp":1614297600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,2,26]],"date-time":"2021-02-26T00:00:00Z","timestamp":1614297600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2021,7]]},"DOI":"10.1007\/s11277-021-08221-9","type":"journal-article","created":{"date-parts":[[2021,2,26]],"date-time":"2021-02-26T09:04:33Z","timestamp":1614330273000},"page":"489-508","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["A Matrix Translation and Elliptic Curve Based Cryptosystem for Secured Data Communications in WSNs"],"prefix":"10.1007","volume":"119","author":[{"given":"S.","family":"Pradeep","sequence":"first","affiliation":[]},{"given":"S.","family":"Muthurajkumar","sequence":"additional","affiliation":[]},{"given":"Sannasi","family":"Ganapathy","sequence":"additional","affiliation":[]},{"given":"A.","family":"Kannan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,2,26]]},"reference":[{"key":"8221_CR1","doi-asserted-by":"publisher","first-page":"6056","DOI":"10.1109\/JIOT.2019.2949708","volume":"7","author":"C Peng","year":"2020","unstructured":"Peng, C., Chen, J., Obaidat, M. S., Vijayakumar, P., & He, D. (2020). Efficient and provably secure multireceiver signcryption scheme for multicast communication in edge computing. IEEE Internet of Things Journal, 7, 6056\u20136068.","journal-title":"IEEE Internet of Things Journal"},{"issue":"1","key":"8221_CR2","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1016\/j.eswa.2011.06.013","volume":"39","author":"S Siva","year":"2012","unstructured":"Siva, S., Sindhu, S., Geetha, S., & Kannan, A. (2012). Decision tree based light weight intrusion detection using a wrapper approach. Expert Systems with Applcations, 39(1), 129\u2013141.","journal-title":"Expert Systems with Applcations"},{"issue":"2","key":"8221_CR3","doi-asserted-by":"publisher","first-page":"1107","DOI":"10.1007\/s11277-020-07613-7","volume":"115","author":"BP Kavin","year":"2020","unstructured":"Kavin, B. P., Ganapathy, S., Kanimozhi, U., & Kannan, A. (2020). An enhanced security framework for secured data storage and communications in cloud using ECC, access control and LDSA. Wireless Personal Communications, 115(2), 1107\u20131135.","journal-title":"Wireless Personal Communications"},{"key":"8221_CR4","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1016\/j.comnet.2019.01.024","volume":"151","author":"K Thangaramya","year":"2019","unstructured":"Thangaramya, K., Kulothungan, K., Logambigai, R., Selvi, M., Ganapathy, S., & Kannan, A. (2019). Energy aware cluster and neuro-fuzzy based routing algorithm for wireless sensor networks in IoT. Computer Networks, 151, 211\u2013223.","journal-title":"Computer Networks"},{"issue":"4","key":"8221_CR5","doi-asserted-by":"publisher","first-page":"1637","DOI":"10.1007\/s11277-019-06788-y","volume":"110","author":"T Kalidoss","year":"2020","unstructured":"Kalidoss, T., Rajasekaran, L., Kanagasabai, K., Sannasi, G., & Kannan, A. (2020). QoS aware trust based routing algorithm for wireless sensor networks. Wireless Personal Communications, 110(4), 1637\u20131658.","journal-title":"Wireless Personal Communications"},{"issue":"3","key":"8221_CR6","doi-asserted-by":"publisher","first-page":"993","DOI":"10.1007\/s11277-019-06132-4","volume":"105","author":"P Sethuraman","year":"2019","unstructured":"Sethuraman, P., Tamizharasan, P. S., & Kannan, A. (2019). Fuzzy genetic elliptic curve diffie hellman algorithm for secured communication in networks. Wireless Personal Communications, 105(3), 993\u20131007.","journal-title":"Wireless Personal Communications"},{"key":"8221_CR7","doi-asserted-by":"publisher","first-page":"4903","DOI":"10.1007\/s11276-019-02073-9","volume":"25","author":"S Viswanathan","year":"2019","unstructured":"Viswanathan, S., & Kannan, A. (2019). \u201cElliptic key cryptography with Beta Gamma functions for secure routing in wireless sensor networks.\u201d Wireless Networks, 25, 4903\u20134914. https:\/\/doi.org\/10.1007\/s11276-019-02073-9.","journal-title":"Wireless Networks"},{"issue":"5","key":"8221_CR8","doi-asserted-by":"publisher","first-page":"672","DOI":"10.1109\/TC.2007.70832","volume":"57","author":"S Bartolini","year":"2008","unstructured":"Bartolini, S., & Giorgi, R. (2008). Effecticve of instruction-set extension on an embedded processor; A case study on elliptic curve cryptography over GF(2m). IEEE Transactions on Computers, 57(5), 672\u2013685.","journal-title":"IEEE Transactions on Computers"},{"issue":"177","key":"8221_CR9","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1090\/S0025-5718-1987-0866109-5","volume":"48","author":"N Koblitz","year":"1987","unstructured":"Koblitz, N. (1987). Elliptic curve cryptosystems. Mathematics of Computation, 48(177), 203\u2013209.","journal-title":"Mathematics of Computation"},{"issue":"1","key":"8221_CR10","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1109\/MWC.2004.1269719","volume":"11","author":"K Lauter","year":"2004","unstructured":"Lauter, K. (2004). The advantages of elliptic curve cryptography for wireless security. IEEE Wireless Communications, 11(1), 62\u201367.","journal-title":"IEEE Wireless Communications"},{"issue":"3","key":"8221_CR11","first-page":"237","volume":"14","author":"Z Liu","year":"2017","unstructured":"Liu, Z., Huang, X., Hu, Z., Khan, M. K., Seo, H., & Zhou, L. (2017). On emerging family of elliptic curves to secure internet of things: ECC comes of age. IEEE Transactions on Dependable and Secure Computing, 14(3), 237\u2013248.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"issue":"2\u20133","key":"8221_CR12","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1016\/j.sysarc.2006.09.002","volume":"53","author":"GM de Dormale","year":"2007","unstructured":"de Dormale, G. M., & Quisquater, J. J. (2007). High-speed hardware implementations of elliptic curve cryptography: A survey. Journal of Systems Architecture, 53(2\u20133), 72\u201384.","journal-title":"Journal of Systems Architecture"},{"key":"8221_CR13","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1016\/j.jcss.2016.12.004","volume":"89","author":"T Li","year":"2017","unstructured":"Li, T., Liu, Z., Li, J., Jia, C., & Li, K. (2017). CDPS: Acryptographic data publishing system. Journal of Computer and System Sciences, 89, 80\u201391.","journal-title":"Journal of Computer and System Sciences"},{"key":"8221_CR14","doi-asserted-by":"publisher","first-page":"262","DOI":"10.1016\/j.jksuci.2015.11.001","volume":"28","author":"M Elhoseny","year":"2016","unstructured":"Elhoseny, M., Elminir, H., Riad, A., & Yuan, X. (2016). A secure data routing schema for WSN using elliptic curve cryptography and homomorphic encryption. Journal of King Saud University Computer and Information Sciences, 28, 262\u2013275.","journal-title":"Journal of King Saud University Computer and Information Sciences"},{"key":"8221_CR15","doi-asserted-by":"crossref","unstructured":"Heinzelman, W. R., Chandrakasan, A. P., & Balakrishnan, H. (2000), \u2018Energy-efficient communication protocol for wireless microsensor networks\u2019. Proceedings of IEEE 33rd annual Hawaii international conference on system sciences, vol. 2, pp. 1\u201310.","DOI":"10.1109\/HICSS.2000.926982"},{"issue":"4","key":"8221_CR16","doi-asserted-by":"publisher","first-page":"660","DOI":"10.1109\/TWC.2002.804190","volume":"1","author":"WR Heinzelman","year":"2002","unstructured":"Heinzelman, W. R., & ChandrakasanBalakrishnan, A. P. H. (2002). An application specific protocol architecture for wireless sensor network. IEEE Transaction on Wireless Communication, 1(4), 660\u2013670.","journal-title":"IEEE Transaction on Wireless Communication"},{"issue":"4","key":"8221_CR17","doi-asserted-by":"publisher","first-page":"366","DOI":"10.1109\/TMC.2004.41","volume":"3","author":"O Younis","year":"2004","unstructured":"Younis, O., & Fahmy, S. (2004). HEED: A hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks. IEEE Transactions on Mobile Computing, 3(4), 366\u2013379.","journal-title":"IEEE Transactions on Mobile Computing"},{"issue":"1","key":"8221_CR18","first-page":"27","volume":"19","author":"H Abdalla","year":"2017","unstructured":"Abdalla, H., Hu, X., Wahaballa, A., Ali, A. A., Ramadan, M., & Qin, Z. (2017). Integrating the functional encryption and proxy re-cryptography to secure DRM scheme. Internation Journal of Network Security, 19(1), 27\u201338.","journal-title":"Internation Journal of Network Security"},{"key":"8221_CR19","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1016\/j.comcom.2017.07.006","volume":"111","author":"N Kaaniche","year":"2017","unstructured":"Kaaniche, N., & Laurent, M. (2017). Data security and privacy preservation in cloud storage environments based on cryptographic mechanisms. Computer Communications, 111, 120\u2013141.","journal-title":"Computer Communications"},{"key":"8221_CR20","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1016\/j.jisa.2018.10.011","volume":"43","author":"S Kumar","year":"2018","unstructured":"Kumar, S., Kumar, M., Budhiraja, R., Das, M. K., & Singh, S. (2018). A cryptographic model for better information security. Journal of Information Security and Applications, 43, 123\u2013138.","journal-title":"Journal of Information Security and Applications"},{"issue":"4","key":"8221_CR21","doi-asserted-by":"publisher","first-page":"6701","DOI":"10.3390\/s140406701","volume":"14","author":"Q Zhou","year":"2014","unstructured":"Zhou, Q., Yang, G., & He, L. (2014). A secure enhanced data aggregation based on ECC in wireless sensor network. Sensor Journal, 14(4), 6701\u20136721.","journal-title":"Sensor Journal"},{"key":"8221_CR22","doi-asserted-by":"crossref","unstructured":"Mykletun, E., Girao, J., Westhoff, D. (2006). \u201cPublic key based crypto schemes for data concealment in wireless sensor networks\u201d, In: The IEEE international conference on communications, IEEE, Istanbul, pp. 2288\u20132295.","DOI":"10.1109\/ICC.2006.255111"},{"key":"8221_CR23","doi-asserted-by":"publisher","first-page":"296","DOI":"10.1016\/j.jesit.2015.11.005","volume":"2","author":"R Rizk","year":"2015","unstructured":"Rizk, R., & Alkady, Y. (2015). Two-phase hybrid cryptography algorithm for wireless sensor networks. Journal of Electrical Systems and Information Technology, 2, 296\u2013313.","journal-title":"Journal of Electrical Systems and Information Technology"},{"key":"8221_CR24","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1016\/j.ins.2018.11.031","volume":"479","author":"Xu Shengmin","year":"2019","unstructured":"Shengmin, Xu., Yang, G., & Yi, Mu. (2019). Revocable attribute-based encryption with decryption key exposure resistance and ciphertext delegation. Information Sciences, 479, 116\u2013134.","journal-title":"Information Sciences"},{"key":"8221_CR25","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1016\/j.ins.2012.04.038","volume":"210","author":"Bo Qin","year":"2012","unstructured":"Qin, Bo., Qianhong, Wu., Zhang, L., Farr\u00e0s, O., & Domingo-Ferrer, J. (2012). Provably secure threshold public-key encryption with adaptive security and short ciphertexts. Information Sciences, 210, 67\u201380.","journal-title":"Information Sciences"},{"key":"8221_CR26","doi-asserted-by":"publisher","first-page":"561","DOI":"10.1016\/j.ins.2019.07.041","volume":"504","author":"Wu Ge","year":"2019","unstructured":"Ge, Wu., Guo, F., & Susilo, W. (2019). Generalized public-key cryptography with tight security. Information Sciences, 504, 561\u2013577.","journal-title":"Information Sciences"},{"key":"8221_CR27","doi-asserted-by":"publisher","first-page":"689","DOI":"10.1016\/j.csi.2013.12.004","volume":"36","author":"M Beiter","year":"2014","unstructured":"Beiter, M., Mont, M. C., Chen, L., & Pearson, S. (2014). End-to-end policy based encryption techniques for multi-party data management. Computer Standards & Interfaces, 36, 689\u2013703.","journal-title":"Computer Standards & Interfaces"},{"key":"8221_CR28","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1016\/j.ins.2017.05.004","volume":"409\u2013410","author":"W Ding","year":"2017","unstructured":"Ding, W., Yan, Z., & Deng, R. H. (2017). Encrypted data processing with Homomorphic Re-Encryption. Information Sciences, 409\u2013410, 35\u201355.","journal-title":"Information Sciences"},{"key":"8221_CR29","doi-asserted-by":"publisher","first-page":"871","DOI":"10.1016\/j.compeleceng.2016.05.012","volume":"56","author":"XA Wang","year":"2016","unstructured":"Wang, X. A., Xhafa, F., Cai, W., Ma, J., & Wei, F. (2016). \u201cEfficient privacy preserving predicate encryption with fine-grained searchable capability for Cloud storage.\u201d Computers and Electrical Engineering, 56, 871\u2013883.","journal-title":"Computers and Electrical Engineering"},{"key":"8221_CR30","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1016\/j.comnet.2019.01.032","volume":"151","author":"BP Kavin","year":"2019","unstructured":"Kavin, B. P., & Ganapathy, S. (2019). A secured storage and privacy- preserving model using CRT for providing security on cloud and IoT-based applications. Computer Networks, 151, 181\u2013190.","journal-title":"Computer Networks"},{"key":"8221_CR31","doi-asserted-by":"publisher","first-page":"216","DOI":"10.1016\/j.comcom.2019.11.030","volume":"150","author":"F Alqahtani","year":"2020","unstructured":"Alqahtani, F., Al-Makhadmeh, Z., Tolba, A., & Said, O. (2020). TBM: A trust-based monitoring security scheme to improve the service authentication in the Internet of Things communications. Computer Communications, 150, 216\u2013225.","journal-title":"Computer Communications"},{"issue":"5","key":"8221_CR32","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1049\/iet-net.2019.0004","volume":"8","author":"T Maitra","year":"2019","unstructured":"Maitra, T., Obaidat, M. S., Giri, D., Dutta, S., & Dahal, K. (2019). \u201cElGamal cryptosystem-based secure authentication system for cloud-based IoT applications.\u201d IET Networks, 8(5), 289\u2013298.","journal-title":"IET Networks"},{"issue":"2","key":"8221_CR33","doi-asserted-by":"publisher","first-page":"1998","DOI":"10.1109\/JIOT.2018.2871607","volume":"6","author":"M Shen","year":"2019","unstructured":"Shen, M., Ma, B., Zhu, L., Du, X., & Xu, K. (2019). Secure phrase search for intelligent processing of encrypted data in cloud-based IoT. IEEE Internet of Things Journal, 6(2), 1998\u20132008.","journal-title":"IEEE Internet of Things Journal"},{"key":"8221_CR34","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jisa.2019.102429","volume":"50","author":"M Ma","year":"2020","unstructured":"Ma, M., He, D., Fan, S., & Feng, D. (2020). Certificateless searchable public key encryption scheme secure against keyword guessing attacks for smart healthcare. Journal of Information Security and Applications, 50, 1\u20139.","journal-title":"Journal of Information Security and Applications"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-021-08221-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-021-08221-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-021-08221-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,16]],"date-time":"2021-06-16T10:28:55Z","timestamp":1623839335000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-021-08221-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,2,26]]},"references-count":34,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,7]]}},"alternative-id":["8221"],"URL":"https:\/\/doi.org\/10.1007\/s11277-021-08221-9","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,2,26]]},"assertion":[{"value":"3 February 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 February 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with Ethical Standards"}},{"value":"There is no conflict of Interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}