{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,5]],"date-time":"2025-04-05T04:03:04Z","timestamp":1743825784573,"version":"3.40.3"},"reference-count":50,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2025,4,1]],"date-time":"2025-04-01T00:00:00Z","timestamp":1743465600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,4,1]],"date-time":"2025-04-01T00:00:00Z","timestamp":1743465600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SN COMPUT. SCI."],"DOI":"10.1007\/s42979-025-03898-2","type":"journal-article","created":{"date-parts":[[2025,4,3]],"date-time":"2025-04-03T20:55:30Z","timestamp":1743713730000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Energy-Aware Framework for Assessing Cryptographic Algorithms in Wireless Sensor Networks"],"prefix":"10.1007","volume":"6","author":[{"family":"Pooja","sequence":"first","affiliation":[]},{"family":"Shalu","sequence":"additional","affiliation":[]},{"given":"Neha","family":"Saini","sequence":"additional","affiliation":[]},{"given":"Vishwadeepak Singh","family":"Baghela","sequence":"additional","affiliation":[]},{"given":"Mohd Anas","family":"Khan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,1]]},"reference":[{"key":"3898_CR1","doi-asserted-by":"publisher","unstructured":"Meulenaer G, Gosset F, Standaert F-X, Pereira O. On the Energy Cost of Communication and Cryptography in Wireless Sensor Networks, vol. 0. 2008, p. 585. https:\/\/doi.org\/10.1109\/WiMob.2008.16","DOI":"10.1109\/WiMob.2008.16"},{"key":"3898_CR2","unstructured":"A Survey on Comparisons of Cryptographic Algorithms. Using Certain Parameters in WSN | Pooja Singh - Academia.edu. Accessed: May 11, 2023. [Online]. Available: https:\/\/www.academia.edu\/61475989\/A_Survey_on_Comparisons_of_Cryptographic_Algorithms_Using_Certain_Parameters_in_WSN"},{"key":"3898_CR3","doi-asserted-by":"publisher","unstructured":"Tiwari A, Chakraborty S, Mishra M. Secure Data Aggregation Using Irreversible Watermarking in WSNs, vol. 2013. 2013. https:\/\/doi.org\/10.1049\/cp.2013.2337","DOI":"10.1049\/cp.2013.2337"},{"key":"3898_CR4","doi-asserted-by":"publisher","unstructured":"Fouchal H, Hunel P, Ramassamy C. Towards efficient deployment of wireless sensor networks. Secur Communication Networks. 2014;9(Jul). https:\/\/doi.org\/10.1002\/sec.1059.","DOI":"10.1002\/sec.1059"},{"key":"3898_CR5","unstructured":"An energy-efficient and security aware route selection protocol for wireless sensor networks. Accessed: May 11, 2023. [Online]. Available: https:\/\/www.researchgate.net\/publication\/260408434_An_energy-efficient_and_security_aware_route_selection_protocol_for_wireless_sensor_networks"},{"key":"3898_CR6","doi-asserted-by":"crossref","unstructured":"Lasla N, Derhab A, Ouadjaout A, Bagaa M, Challal Y. SMART: Secure Multi-pAths routing for wireless sensor networks, Lecture Notes in Computer Science, pp. 332\u201345, 2014.","DOI":"10.1007\/978-3-319-07425-2_25"},{"key":"3898_CR7","unstructured":"Improved, AODV Performance in DOS and Black Hole Attack Environment | Semantic Scholar. Accessed: May 11, 2023. [Online]. Available: https:\/\/www.semanticscholar.org\/paper\/Improved-AODV-Performance-in-DOS-and-Black-Hole-Gupta-Patel\/e1024363a546ae6a8c8c5796f31b8a16ed6ed5c5"},{"key":"3898_CR8","doi-asserted-by":"publisher","unstructured":"Anita EAM, Geetha R, Kannan E. A Novel Hybrid Key Management Scheme for Establishing Secure Communication in Wireless Sensor Networks, Wireless Pers Commun, vol. 82, no. 3, pp. 1419\u20131433, Jun. 2015, https:\/\/doi.org\/10.1007\/s11277-015-2290-9","DOI":"10.1007\/s11277-015-2290-9"},{"key":"3898_CR9","doi-asserted-by":"publisher","unstructured":"Srivastava M. An introduction to network security attacks, 2021, pp. 505\u201315. https:\/\/doi.org\/10.1007\/978-981-16-1395-1_37","DOI":"10.1007\/978-981-16-1395-1_37"},{"key":"3898_CR10","doi-asserted-by":"publisher","first-page":"40488","DOI":"10.1109\/ACCESS.2023.3247003","volume":"11","author":"B Kumar","year":"2023","unstructured":"Kumar B, et al. A static machine learning based evaluation method for usability and security analysis in E-Commerce website. IEEE Access. 2023;11:40488\u2013510. https:\/\/doi.org\/10.1109\/ACCESS.2023.3247003.","journal-title":"IEEE Access"},{"key":"3898_CR11","first-page":"1","volume":"15","author":"Mohammed Faris1","year":"2023","unstructured":"Mohammed Faris1. Mohd Nazri Mahmud1, Mohd Fadzli Mohd Salleh1, and Alhamzah Alnoor2, analysis survey and comparison of cryptography algorithms in Wsn. Int J Eng Bus Manage. 2023;15:1\u201329.","journal-title":"Int J Eng Bus Manage"},{"key":"3898_CR12","doi-asserted-by":"publisher","unstructured":"Khan MA, Shalu QN, Naveed A, Lasisi S, Kaushik, Kumar S. A Multi-Layered assessment system for trustworthiness enhancement and reliability for industrial wireless sensor networks. Wirel Pers Commun Jul. 2024. https:\/\/doi.org\/10.1007\/s11277-024-11391-x.","DOI":"10.1007\/s11277-024-11391-x"},{"key":"3898_CR13","doi-asserted-by":"publisher","unstructured":"Rizk R, Alkady Y. Two-phase hybrid cryptography algorithm for wireless sensor networks, Journal of Electrical Systems and Information Technology, vol. 2, no. 3, pp. 296\u2013313, Dec. 2015, https:\/\/doi.org\/10.1016\/j.jesit.2015.11.005","DOI":"10.1016\/j.jesit.2015.11.005"},{"key":"3898_CR14","unstructured":"Faye S, Myoupo J. Secure and Energy-efficient geocast protocol for wireless sensor networks based on a hierarchical clustered structure. Int J Netw Secur. May 2013;15:151\u201360."},{"key":"3898_CR15","doi-asserted-by":"publisher","unstructured":"Artificial neural network-based virtual machine allocation in cloud computing: Journal of Discrete Mathematical Sciences and Cryptography: Vol 24, No 6. Accessed: Jul. 25, 2023. [Online]. Available: https:\/\/www.tandfonline.com\/doi\/abs\/https:\/\/doi.org\/10.1080\/09720529.2021.1878626","DOI":"10.1080\/09720529.2021.1878626"},{"key":"3898_CR16","doi-asserted-by":"publisher","unstructured":"Singh G, Kinger S. A Study of Encryption Algorithms (RSA, DES, 3DES and AES) for Information Security, International Journal of Computer Applications, vol. 67, pp. 33\u201338, Apr. 2013, https:\/\/doi.org\/10.5120\/11507-7224","DOI":"10.5120\/11507-7224"},{"key":"3898_CR17","doi-asserted-by":"publisher","first-page":"471","DOI":"10.1007\/978-81-322-1157-0_48","volume-title":"Emerging research in electronics, computer science and technology","author":"RK Kodali","year":"2014","unstructured":"Kodali RK, Narasimha Sarma NVS. Energy efficient ECC encryption using ECDH. In: Sridhar V, Sheshadri HS, Padma MC, editors. in Emerging research in electronics, computer science and technology. Lecture Notes in Electrical Engineering. New Delhi: Springer India; 2014. pp. 471\u20138. https:\/\/doi.org\/10.1007\/978-81-322-1157-0_48."},{"key":"3898_CR18","unstructured":"Performance Comparison of ECDH and ECDSA | IEEE Conference Publication. | IEEE Xplore. Accessed: May 12, 2023. [Online]. Available: https:\/\/ieeexplore.ieee.org\/document\/9742212"},{"key":"3898_CR19","doi-asserted-by":"publisher","unstructured":"Kumari KA, Sadasivam GS, Rohini L. An Efficient 3D Elliptic Curve Diffie\u2013Hellman (ECDH) Based Two-Server Password-Only Authenticated Key Exchange Protocol with Provable Security, IETE Journal of Research, vol. 62, no. 6, pp. 762\u2013773, Nov. 2016, https:\/\/doi.org\/10.1080\/03772063.2016.1176539","DOI":"10.1080\/03772063.2016.1176539"},{"key":"3898_CR20","unstructured":"Analysis of Public-Key Cryptography for Wireless Sensor Networks Security. | Amir hossein jahangir - Academia.edu. Accessed: May 12, 2023. [Online]. Available: https:\/\/www.academia.edu\/64557518\/Analysis_of_Public_Key_Cryptography_for_Wireless_Sensor_Networks_Security"},{"key":"3898_CR21","doi-asserted-by":"publisher","unstructured":"Soares PH, Monteiro JP, Freitas HF, Zenko Sakiyama R, Andrade CM. Platform for monitoring and analysis of air quality in environments with large circulation of people, Env Prog and Sustain Energy, vol. 37, no. 6, pp. 2050\u20132057, Nov. 2018, https:\/\/doi.org\/10.1002\/ep.12895","DOI":"10.1002\/ep.12895"},{"key":"3898_CR22","doi-asserted-by":"publisher","unstructured":"An efficient cryptographic technique using modified Diffie\u2013Hellman in wireless sensor networks - Shahwar Ali, A Humaria, M Sher Ramzan, Imran Khan, Syed M Saqlain, Anwar Ghani, J Zakia, Bander A Alzahrani. 2020. Accessed: May 28, 2023. [Online]. Available: https:\/\/journals.sagepub.com\/doi\/https:\/\/doi.org\/10.1177\/1550147720925772","DOI":"10.1177\/1550147720925772"},{"key":"3898_CR23","doi-asserted-by":"publisher","DOI":"10.32604\/iasc.2021.012806","author":"A Singh","year":"2021","unstructured":"Singh A, Alshehri M, Bhushan S, Kumar M, Alfarraj O, Pardarshani K. IASC. 2021;27(3):761\u20139. https:\/\/doi.org\/10.32604\/iasc.2021.012806. Secure and Energy Efficient Data Transmission Model for WSN."},{"key":"3898_CR24","doi-asserted-by":"publisher","unstructured":"Singh S, Singh D. A Bio-inspired VM migration using Re-initialization and decomposition Based-Whale optimization. ICT Express. Feb. 2023;9(1):92\u20139. https:\/\/doi.org\/10.1016\/j.icte.2022.02.003.","DOI":"10.1016\/j.icte.2022.02.003"},{"key":"3898_CR25","doi-asserted-by":"publisher","unstructured":"Senthil Kumar S, Arockia Panimalar S, Krishnakumar A, Prakash M. Investigation of cybersecurity attacks and threats on cloud using black widow algorithm with recurrent neural network. SN COMPUT SCI. Aug. 2022;3(6):451. https:\/\/doi.org\/10.1007\/s42979-022-01304-9.","DOI":"10.1007\/s42979-022-01304-9"},{"key":"3898_CR26","doi-asserted-by":"publisher","unstructured":"Pujari M, Pacheco Y, Cherukuri B, Sun W. A comparative study on the impact of adversarial machine learning attacks on contemporary intrusion detection datasets. SN COMPUT SCI. Aug. 2022;3(5):412. https:\/\/doi.org\/10.1007\/s42979-022-01321-8.","DOI":"10.1007\/s42979-022-01321-8"},{"key":"3898_CR27","doi-asserted-by":"publisher","unstructured":"Jha SK, Gupta A, Panigrahi N. Security threat analysis and countermeasures on Consensus-Based time synchronization algorithms for wireless sensor network. SN Comput Sci. Aug. 2021;2(5). https:\/\/doi.org\/10.1007\/s42979-021-00796-1.","DOI":"10.1007\/s42979-021-00796-1"},{"key":"3898_CR28","doi-asserted-by":"publisher","unstructured":"Kaur B, Rakhra M, Singh D, Singh A, Shruti. Advancements in Lightweight Cryptography: Secure Solutions for Resource-Constrained Environments in IoT, WSNs, and CPS, in 2024 11th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO), Mar. 2024, pp. 1\u20137. https:\/\/doi.org\/10.1109\/ICRITO61523.2024.10522297","DOI":"10.1109\/ICRITO61523.2024.10522297"},{"key":"3898_CR29","doi-asserted-by":"publisher","unstructured":"Anusha R, N S, Shetty VS, K SB, Analysis and Comparison of Symmetric Key Cryptographic Algorithms on FPGA, in. 2022 4th International Conference on Smart Systems and Inventive Technology (ICSSIT), Jan. 2022, pp. 293\u2013300. https:\/\/doi.org\/10.1109\/ICSSIT53264.2022.9716416","DOI":"10.1109\/ICSSIT53264.2022.9716416"},{"key":"3898_CR30","unstructured":"Asymmetric Encryption in. Wireless Sensor Networks | IntechOpen. Accessed: May 12, 2023. [Online]. Available: https:\/\/www.intechopen.com\/chapters\/38790"},{"key":"3898_CR31","doi-asserted-by":"publisher","unstructured":"Rehman SU, Bilal M, Ahmad B, Yahya KM, Ullah A, Rehman OU. Comparison Based Analysis of Different Cryptographic and Encryption Techniques Using Message Authentication Code (MAC) in Wireless Sensor Networks (WSN), Mar. 14, 2012, arXiv: arXiv:1203.3103. https:\/\/doi.org\/10.48550\/arXiv.1203.3103","DOI":"10.48550\/arXiv.1203.3103"},{"key":"3898_CR32","unstructured":"Jirwan N, Singh A, Vijay S. Review and Analysis of Cryptography Techniques, International Journal of Scientific and Engineering Research, vol. 4, pp. 1\u20136, Mar. 2013."},{"key":"3898_CR33","doi-asserted-by":"publisher","unstructured":"Bhanot R, Hans R, Review A, Comparative Analysis of Various Encryption Algorithms,. IJSIA. Apr. 2015;9(4):289\u2013306. https:\/\/doi.org\/10.14257\/ijsia.2015.9.4.27.","DOI":"10.14257\/ijsia.2015.9.4.27"},{"key":"3898_CR34","unstructured":"Hybrid Encryption Method for Health Monitoring Systems Based on Machine Learning. Accessed: May 28, 2023. [Online]. Available: https:\/\/www.hindawi.com\/journals\/cin\/2022\/7348488\/"},{"key":"3898_CR35","doi-asserted-by":"publisher","first-page":"113226","DOI":"10.1109\/ACCESS.2021.3104148","volume":"9","author":"MA Al-Shareeda","year":"2021","unstructured":"Al-Shareeda MA, Anbar M, Manickam S, Hasbullah IH. Towards Identity-Based conditional Privacy-Preserving authentication scheme for vehicular ad hoc networks. IEEE Access. 2021;9:113226\u201338. https:\/\/doi.org\/10.1109\/ACCESS.2021.3104148.","journal-title":"IEEE Access"},{"key":"3898_CR36","doi-asserted-by":"publisher","first-page":"120606","DOI":"10.1109\/ACCESS.2022.3222488","volume":"10","author":"MA Al-Shareeda","year":"2022","unstructured":"Al-Shareeda MA, Manickam S. Modular square Root-Based scheme to resist denial of service (DoS) attacks in 5G-Enabled vehicular networks. IEEE Access. 2022;10:120606\u201315. https:\/\/doi.org\/10.1109\/ACCESS.2022.3222488.","journal-title":"IEEE Access"},{"key":"3898_CR37","doi-asserted-by":"publisher","unstructured":"Faquih A, Kadam P, Saquib Z. Cryptographic techniques for wireless sensor networks: A survey, in 2015 IEEE Bombay Section Symposium (IBSS), Sep. 2015, pp. 1\u20136. https:\/\/doi.org\/10.1109\/IBSS.2015.7456652","DOI":"10.1109\/IBSS.2015.7456652"},{"key":"3898_CR38","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2022.028520","author":"M Aldaseen","year":"2022","unstructured":"Aldaseen M, Matrouk K, Almazaydeh L, Elleithy K. CMC. 2022;73(2):3969\u201381. https:\/\/doi.org\/10.32604\/cmc.2022.028520. ESSD: Energy Saving and Securing Data Algorithm for WSNs Security."},{"key":"3898_CR39","doi-asserted-by":"publisher","unstructured":"Asare BT, Quist-Aphetsi K, Nana L, A Hybrid Lightweight Cryptographic Scheme For Securing Node Data Based On The Feistel Cipher. And MD5 Hash Algorithm In A Local IoT Network, in, 2019 International Conference on Mechatronics, Remote Sensing, Information Systems and Industrial Information Technologies (ICMRSISIIT), Dec. 2019, pp. 1\u20135. https:\/\/doi.org\/10.1109\/ICMRSISIIT46373.2020.9405869","DOI":"10.1109\/ICMRSISIIT46373.2020.9405869"},{"key":"3898_CR40","doi-asserted-by":"publisher","unstructured":"Zhang X, Heys H, Li C. Energy efficiency of encryption schemes applied to wireless sensor networks. Secur Communication Networks. 2012;5(Jul). https:\/\/doi.org\/10.1002\/sec.375.","DOI":"10.1002\/sec.375"},{"key":"3898_CR41","doi-asserted-by":"publisher","unstructured":"Dawood OA, Hammadi O. An Analytical Study for Some Drawbacks and Weakness Points of the AES Cipher (Rijndael Algorithm). 2017. https:\/\/doi.org\/10.25212\/ICoIT17.013","DOI":"10.25212\/ICoIT17.013"},{"key":"3898_CR42","doi-asserted-by":"publisher","first-page":"2","DOI":"10.47974\/JDMSC-1888","volume":"27","author":"NP Sable","year":"2024","unstructured":"Sable NP, Rathod VU, Parlewar P, Rathod SB, Waghmode ST, Rathod RR. Efficient lightweight cryptography for resource-constrained WSN nodes. JDMSC. 2024;27:2\u2013A. https:\/\/doi.org\/10.47974\/JDMSC-1888.","journal-title":"JDMSC"},{"issue":"2","key":"3898_CR43","doi-asserted-by":"publisher","first-page":"953","DOI":"10.1007\/s11277-022-10165-7","volume":"129","author":"T Khan","year":"2023","unstructured":"Khan T, Singh K. RTM: realistic Weight-Based reliable trust model for large scale WSNs. Wireless Pers Commun. 2023;129(2):953\u201391.","journal-title":"Wireless Pers Commun"},{"issue":"3","key":"3898_CR44","doi-asserted-by":"publisher","first-page":"1389","DOI":"10.1007\/s11277-024-10948-0","volume":"134","author":"T Khan","year":"2024","unstructured":"Khan T, Singh K. DTMS: A dual Trust-based Multi-level Sybil attack detection approach in WSNs. Wireless Pers Commun. 2024;134(3):1389\u2013420.","journal-title":"Wireless Pers Commun"},{"key":"3898_CR45","unstructured":"Khan T, Singh K, Gupta S, Manjul M. Multi Trust-based Secure Trust Model for WSNs. Journal of Information Technology Management 14, no. Special Issue: Security and Resource Management challenges for Internet of Things (2022): 147\u2013158."},{"key":"3898_CR46","doi-asserted-by":"crossref","unstructured":"Khan T, Singh K, Kamlesh C, Purohit. ICMA: an efficient integrated congestion control approach. Recent Pat Eng. 2020;14(3):294\u2013309.","DOI":"10.2174\/1872212114666191231150916"},{"key":"3898_CR47","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1016\/j.comcom.2023.06.014","volume":"209","author":"T Khan","year":"2023","unstructured":"Khan T, Singh K, Shariq M, Ahmad K, Savita KS, Ahmadian A. Soheil Salahshour, and Mauro Conti. An efficient trust-based decision-making approach for WSNs: machine learning oriented approach. Comput Commun. 2023;209:217\u201329.","journal-title":"Comput Commun"},{"key":"3898_CR48","doi-asserted-by":"crossref","unstructured":"Khan T, Singh K. Khaleel Ahmad, and Khairol Amali Bin Ahmad. A secure and dependable trust assessment (SDTS) scheme for industrial communication networks. Scientific Reports 13, no. 1 (2023): 1910.","DOI":"10.1038\/s41598-023-28721-x"},{"key":"3898_CR49","doi-asserted-by":"crossref","unstructured":"Khan T, Singh K, Shariq M, Manjul M, Dohare I. TEAM: trust evaluation and analysis of misbehavior in WSNs. Uncertainty in computational Intelligence-Based decision making. Academic; 2025. pp. 203\u201318.","DOI":"10.1016\/B978-0-443-21475-2.00002-3"},{"key":"3898_CR50","first-page":"2007","volume":"26","author":"A Dagar","year":"2023","unstructured":"Dagar A, Singh K, Khan T. Comprehensive analysis of continuous authentication for mobile devices. J Discrete Math Sci Crypt. 2023;26:2007\u201324.","journal-title":"J Discrete Math Sci Crypt"}],"container-title":["SN Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-025-03898-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42979-025-03898-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-025-03898-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,4]],"date-time":"2025-04-04T04:17:18Z","timestamp":1743740238000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42979-025-03898-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,1]]},"references-count":50,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2025,4]]}},"alternative-id":["3898"],"URL":"https:\/\/doi.org\/10.1007\/s42979-025-03898-2","relation":{"references":[{"id-type":"doi","id":"10.32604\/iasc.2021.012806","asserted-by":"subject"},{"id-type":"doi","id":"10.32604\/cmc.2022.028520","asserted-by":"subject"}]},"ISSN":["2661-8907"],"issn-type":[{"type":"electronic","value":"2661-8907"}],"subject":[],"published":{"date-parts":[[2025,4,1]]},"assertion":[{"value":"9 August 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 March 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 April 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of Interest"}}],"article-number":"331"}}