{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,8]],"date-time":"2025-11-08T05:38:39Z","timestamp":1762580319942,"version":"build-2065373602"},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2025,11,8]],"date-time":"2025-11-08T00:00:00Z","timestamp":1762560000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,11,8]],"date-time":"2025-11-08T00:00:00Z","timestamp":1762560000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SN COMPUT. SCI."],"DOI":"10.1007\/s42979-025-04455-7","type":"journal-article","created":{"date-parts":[[2025,11,8]],"date-time":"2025-11-08T05:34:48Z","timestamp":1762580088000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Quantum and Lattice-Based Hybrid Cryptosystem for Secure Wireless Body Sensor Networks in Medical Applications"],"prefix":"10.1007","volume":"6","author":[{"given":"Abeer","family":"Raad","sequence":"first","affiliation":[]},{"given":"Maryam Ayad","family":"Gabbar","sequence":"additional","affiliation":[]},{"given":"Musaddak Maher Abdul","family":"Zahra","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,11,8]]},"reference":[{"issue":"5","key":"4455_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3264628","volume":"51","author":"G Avoine","year":"2018","unstructured":"Avoine G, Bing\u00f6l MA, Boureanu I, \u010capkun S, Hancke G, Karda\u015f S, Kim CH, Lauradoux C, Martin B, Munilla J, Peinado A. \u2018Security of distance-bounding: A survey\u2019. ACM Comput Surv. 2018;51(5):1\u201333.","journal-title":"ACM Comput Surv"},{"key":"4455_CR2","doi-asserted-by":"publisher","unstructured":"Roy V, Roy L, Ahluwalia R, Khambra G, Ramesh K, Rajasekhar. An Advance Implementation of Machine Learning Techniques for the Prediction of Cervical Cancer, (2023) 3rd IEEE International Conference on ICT in Business Industry and Government, ICTBIG 2023. https:\/\/doi.org\/10.1109\/ICTBIG59752.2023.10456347","DOI":"10.1109\/ICTBIG59752.2023.10456347"},{"key":"4455_CR3","doi-asserted-by":"publisher","unstructured":"Anandaram H, Velpula S, Ramkumar M, Ramya G, Lakshmisridevi S, Ashok P. (2024), Applications of Quantum Cascade Lasers in Spectroscopy and Trace Gas Analysis,2024 4th International Conference on Advances in Electrical, Computing, Communication and Sustainable Technologies, ICAECT 2024.https:\/\/doi.org\/10.1109\/ICAECT60202.2024.10469348","DOI":"10.1109\/ICAECT60202.2024.10469348"},{"key":"4455_CR4","doi-asserted-by":"publisher","unstructured":"Hardik Agarwal K, Somani S, Sharma P, Arora PS, Lamba G, Chaudhary*. Palmprint Recognition Using Fusion of Local Binary Pattern and Histogram of Oriented Gradients, Fusion: Practice and Applications, Vol. 1, No. 1, (2020) : 22\u201331 (https:\/\/doi.org\/10.54216\/FPA.010103)","DOI":"10.54216\/FPA.010103)"},{"key":"4455_CR5","doi-asserted-by":"publisher","unstructured":"Alghamdi W, Salama R, Hemalatha S, Alzubaidi LH, Akrom U, Senthilkumar R. Quantum computing: Algorithms,Architectures, and applications. E3S Web Conferences. 2023;399. https:\/\/doi.org\/10.1051\/e3sconf\/202339904041.","DOI":"10.1051\/e3sconf\/202339904041"},{"issue":"8s","key":"4455_CR6","first-page":"568","volume":"11","author":"MR Tanpoco","year":"2023","unstructured":"Tanpoco MR, Patil P, Patnaik U, Bodhankar A, Vijaya Lakshmi TR. An effective leveraging ensembling methods for High-Enactment chronic disease prediction systems. Int J Intell Syst Appl Eng. 2023;11(8s):568\u201375.","journal-title":"Int J Intell Syst Appl Eng"},{"issue":"3","key":"4455_CR7","doi-asserted-by":"publisher","first-page":"685","DOI":"10.1007\/s11227-010-0501-4","volume":"64","author":"Y Zengm","year":"2013","unstructured":"Zengm Y, Cao J, Hong J, Zhang S, Xie L. \u2018Secure localization and location verification in wireless sensor networks: A survey. \u2019 J Supercomput. 2013;64(3):685\u2013701.","journal-title":"\u2019 J Supercomput"},{"key":"4455_CR8","doi-asserted-by":"crossref","unstructured":"Perazzo P, Taponecco L, D\u2019amico AA, Dini G. \u2018Secure positioning in wireless sensor networks through enlargement miscontrol detection\u2019. ACM Trans Sens Netw. 2016;12(4):1\u201332.","DOI":"10.1145\/2943782"},{"issue":"2","key":"4455_CR9","doi-asserted-by":"publisher","first-page":"48","DOI":"10.54216\/FPA.090204","volume":"9","author":"V Roy","year":"2022","unstructured":"Roy V. Breast cancer classification with Multi-Fusion technique and correlation analysis. Fusion: Pract Appl. 2022;9(2):48\u201361. https:\/\/doi.org\/10.54216\/FPA.090204.","journal-title":"Fusion: Pract Appl"},{"key":"4455_CR10","doi-asserted-by":"crossref","unstructured":"Fogue M, Martinez FJ, Garrido P, Fiore M, Chiasserini C-F, Casetti C, Cano J-C, Calafate CT, Manzoni P. \u2018\u2018Securing warning message dissemination in VANETs using cooperative neighbor position verification,\u2019\u2019 IEEE Trans. Veh. Technol., vol. 64, no. 6, pp. 2538\u20132550, Jun. 2014.","DOI":"10.1109\/TVT.2014.2344633"},{"key":"4455_CR11","doi-asserted-by":"publisher","unstructured":"Aditya Sharma AV, Dash SS, Kaur S. Artificial Intelligence enabled virtual sixth sense application for the disabled, Fusion: Practice and Applications, Vol. 1, No. 1, (2020) : 32\u201339 (https:\/\/doi.org\/10.54216\/FPA.010104).","DOI":"10.54216\/FPA.010104"},{"issue":"8s","key":"4455_CR12","first-page":"499","volume":"11","author":"RS Ravindran","year":"2023","unstructured":"Ravindran RS, Ernest Y, Aradhya BC, Senthil Kumar A, Lakshmi TRV. Sugasri Sureshkumar, and Syed Abudaheer Kajamohideen. A fusion classification prototypical for eye state recognition in stroke patients using electroencephalogram (EEG) data. Int J Intell Syst Appl Eng. 2023;11(8s):499\u2013507.","journal-title":"Int J Intell Syst Appl Eng"},{"key":"4455_CR13","doi-asserted-by":"publisher","first-page":"848","DOI":"10.1007\/s42979-024-03193-6","volume":"5","author":"K Ramu","year":"2024","unstructured":"Ramu K, Raju SVSRK, Singh S, Rachapudi V, Mary MA, Roy V, Joshi S. Deep Learning\u2013Infused hybrid security model for energy optimization and enhanced security in wireless sensor networks. SN Comput Sci. 2024;5:848. https:\/\/doi.org\/10.1007\/s42979-024-03193-6.","journal-title":"SN Comput Sci"},{"issue":"3","key":"4455_CR14","doi-asserted-by":"publisher","first-page":"216","DOI":"10.17485\/ijst\/2015\/v8i3\/59585","volume":"8","author":"SB Sasi","year":"2015","unstructured":"Sasi SB, Sivanandam N. Emeritus A survey on cryptography using optimization algorithms in WSNs. Indian J Sci Technol. 2015;8(3):216\u201321.","journal-title":"Indian J Sci Technol"},{"issue":"8s","key":"4455_CR15","first-page":"517","volume":"11","author":"S Ashabharathi","year":"2023","unstructured":"Ashabharathi S, Kharote P, Rajalakshmi R, Dinesh Kumar R, Vijaya Lakshmi TR. Hybrid feature selection model for computer aided diagnosis system in lung segmentation. Int J Intell Syst Appl Eng. 2023;11(8s):517\u201325.","journal-title":"Int J Intell Syst Appl Eng"},{"key":"4455_CR16","doi-asserted-by":"crossref","unstructured":"Sastry P, Narahari TR, Vijaya Lakshmi NV, Koteswara Rao TV, Rajinikanth, and Abdul Wahab. Telugu handwritten character recognition using zoning features. In 2014 International conference on IT convergencesecurity (ICITCS), pp. 1\u20134. IEEE, 2014.","DOI":"10.1109\/ICITCS.2014.7021817"},{"key":"4455_CR17","doi-asserted-by":"publisher","first-page":"57","DOI":"10.54216\/JCHCI.010202)","volume":"1","author":"P Kavitha","year":"2021","unstructured":"Kavitha P, Subha Shini R, Priya R, An Implementation Of Statistical Feature Algorithms For The Detection Of Brain Tumor. J Cogn Hum Comput Interact. 2021;1:57\u201362. https:\/\/doi.org\/10.54216\/JCHCI.010202)., 2.","journal-title":"J Cogn Hum Comput Interact"},{"key":"4455_CR18","doi-asserted-by":"publisher","unstructured":"Yuan X, Atassi R, Geological Landslide Disaster Monitoring Based on Wireless Network Technology., International Journal of Wireless and Ad Hoc Communication, Vol. 2, No. 1, (2021) : 21\u201332 (https:\/\/doi.org\/10.54216\/IJWAC.020102).","DOI":"10.54216\/IJWAC.020102"},{"key":"4455_CR19","doi-asserted-by":"publisher","unstructured":"Asaduzzaman A, Gummadi D, Waichal P. \u2018\u2018A promising parallel algorithm to manage the RSA decryption complexity,\u2019\u2019 in Proc. SoutheastCon, Apr. 2015, pp. 1\u20135. https:\/\/doi.org\/10.1109\/SECON.2015.7132926","DOI":"10.1109\/SECON.2015.7132926"},{"key":"4455_CR20","doi-asserted-by":"publisher","unstructured":"Pooja D. Manish Kumar Mukhija, Satish Kumar Alaria, Smart City\u2019s Security Model for Management of Image Data on Cloud, Journal of Cognitive Human-Computer Interaction, Vol. 2, No. 1, (2022) : 8\u201314 (https:\/\/doi.org\/10.54216\/JCHCI.020101)","DOI":"10.54216\/JCHCI.020101)"},{"key":"4455_CR21","doi-asserted-by":"publisher","unstructured":"Gupta SS, Pandey TK, Raju VP, Shrivastava R, Pandey R, Nigam A, Roy V. Diabetes Estimation through data mining using Optimization, Clustering, and secure cloud storage strategies. SN Comput Sci. 2024;5(781). https:\/\/doi.org\/10.1007\/s42979-024-03158-9.","DOI":"10.1007\/s42979-024-03158-9"},{"key":"4455_CR22","doi-asserted-by":"publisher","unstructured":"Mohd Zainal Abidin Ab Kadir, Algrnaodi M, Ahmed N, Al-Masri. Optimal Algorithm for Shared Network Communication Bandwidth in IoT Applications, International Journal of Wireless and Ad Hoc Communication, Vol. 2, No. 1, (2021) : 33\u201348 (https:\/\/doi.org\/10.54216\/IJWAC.020103)","DOI":"10.54216\/IJWAC.020103)"},{"key":"4455_CR23","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1007\/s42979-024-03540-7","volume":"6","author":"HK Shakya","year":"2025","unstructured":"Shakya HK, Chandanan AK, Subbalakshmi C, et al. Energy-Proficient cluster enrichment in wireless sensor networks via categorized fuzzy clustering and Multi-Hop routing optimization. SN COMPUT SCI. 2025;6:25. https:\/\/doi.org\/10.1007\/s42979-024-03540-7.","journal-title":"SN COMPUT SCI"},{"issue":"2","key":"4455_CR24","doi-asserted-by":"publisher","first-page":"81","DOI":"10.54216\/JCHCI.010205)","volume":"1","author":"IOT Using","year":"2021","unstructured":"Sonia Jenifer Rayen, Survey On Smart Cane For Visually Impaired, Using IOT. J Cogn Hum Comput Interact. 2021;1(2):81\u20135. https:\/\/doi.org\/10.54216\/JCHCI.010205).","journal-title":"J Cogn Hum Comput Interact"},{"key":"4455_CR25","doi-asserted-by":"publisher","unstructured":"Ayub MA, Onik ZA, Smith S. \u2018\u2018Parallelized RSA algorithm: An analysis with performance evaluation using OpenMP library in high performance computing environment,\u2019\u2019 in Proc. 22nd Int. Conf. Comput. Inf. Technol. (ICCIT), Dec. 2019, pp. 18\u201320. https:\/\/doi.org\/10.1109\/ICCIT48885.2019.9038275","DOI":"10.1109\/ICCIT48885.2019.9038275"},{"key":"4455_CR26","doi-asserted-by":"publisher","unstructured":"Rawat A, Sehgal K, Tiwari A, Sharma A, Joshi A. \u2018\u2018A novel accelerated implementation of RSA using parallel processing,\u2019\u2019 J. Discrete Math. Sci. Cryptogr., vol. 22, no. 2, pp. 309\u2013322, Feb. 2019, https:\/\/doi.org\/10.1080\/09720529.2019.1582864","DOI":"10.1080\/09720529.2019.1582864"},{"key":"4455_CR27","doi-asserted-by":"publisher","unstructured":"Sharma A, Singh P, Kumar R, Secure and Lightweight Cryptographic Scheme for WBSNs in Healthcare Applications, Access IEEE, vol. 11, pp. 5021\u20135034, Alhassan L, Zhang, Chen Y. Lattice-Based Post-Quantum Cryptography for Securing Medical IoT Devices, Future Generation Computer Systems, vol. 146, pp. 116\u2013127, 2024. https:\/\/doi.org\/10.1016\/j.future.2023.10.014. S. Gupta and V. Rathi, MAC-Aware Blockchain Framework for Secure and Transparent Health Data Exchange in WBSNs, Journal of Biomedical Informatics, vol. 141, pp. 104\u2013113, 2025. DOI: 10.1016\/j.jbi.2025.104113.","DOI":"10.1016\/j.future.2023.10.014"},{"issue":"2","key":"4455_CR28","doi-asserted-by":"publisher","first-page":"1230","DOI":"10.1109\/JIOT.2024.3048702","volume":"10","author":"N Rahman","year":"2024","unstructured":"Rahman N, Bhuiyan T, Wang H. Hybrid cryptography model for Securing wearable devices in smart healthcare. IEEE Internet Things J. 2024;10(2):1230\u201342. https:\/\/doi.org\/10.1109\/JIOT.2024.3048702.","journal-title":"IEEE Internet Things J"},{"key":"4455_CR29","doi-asserted-by":"publisher","first-page":"103092","DOI":"10.1016\/j.cose.2023.103092","volume":"130","author":"K Yadav","year":"2023","unstructured":"Yadav K, Malik S, Ahmed F. Post-Quantum cryptographic solutions for body area networks: A comparative study. Computers Secur. 2023;130:103092. https:\/\/doi.org\/10.1016\/j.cose.2023.103092.","journal-title":"Computers Secur"}],"container-title":["SN Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-025-04455-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42979-025-04455-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-025-04455-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,8]],"date-time":"2025-11-08T05:34:49Z","timestamp":1762580089000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42979-025-04455-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,8]]},"references-count":29,"journal-issue":{"issue":"8","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["4455"],"URL":"https:\/\/doi.org\/10.1007\/s42979-025-04455-7","relation":{},"ISSN":["2661-8907"],"issn-type":[{"value":"2661-8907","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,11,8]]},"assertion":[{"value":"21 March 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 September 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 November 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval"}}],"article-number":"947"}}