{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,25]],"date-time":"2026-04-25T21:34:06Z","timestamp":1777152846133,"version":"3.51.4"},"reference-count":25,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,8,25]],"date-time":"2023-08-25T00:00:00Z","timestamp":1692921600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,8,25]],"date-time":"2023-08-25T00:00:00Z","timestamp":1692921600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,8,25]]},"DOI":"10.1109\/icsecs58457.2023.10256341","type":"proceedings-article","created":{"date-parts":[[2023,9,26]],"date-time":"2023-09-26T17:36:02Z","timestamp":1695749762000},"page":"176-180","source":"Crossref","is-referenced-by-count":2,"title":["Exploring Cryptographic Techniques for Data security in Resource-Constrained Wireless Sensor Networks:Performance Evaluation and Considerations"],"prefix":"10.1109","author":[{"given":"Dharshika","family":"Singarathnam","sequence":"first","affiliation":[{"name":"St John University,Department of Computer Science York,London,England"}]},{"given":"Swathi","family":"Ganesan","sequence":"additional","affiliation":[{"name":"St John University,Department of Computer Science York,London,England"}]},{"given":"Sangita","family":"Pokhrel","sequence":"additional","affiliation":[{"name":"St John University,Department of Computer Science York,London,England"}]},{"given":"Nalinda","family":"Somasiri","sequence":"additional","affiliation":[{"name":"St John University,Department of Computer Science York,London,England"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2881351"},{"key":"ref12","author":"boukerche","year":"2010","journal-title":"Algorithms and Protocols for Wireless Sensor Networks"},{"key":"ref15","first-page":"1","article-title":"Comparative Study of Symmetric and Asymmetric Cryptography Techniques","author":"siddique","year":"0","journal-title":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)"},{"key":"ref14","first-page":"297","article-title":"Cryptography in Wireless Sensor Networks: A Comprehensive Overview","author":"asaduzzaman","year":"0","journal-title":"2016 19th International Conference on Computer and Information Technology (ICCIT)"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2012.6189411"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICIEV.2016.7760041"},{"key":"ref2","first-page":"1724","article-title":"A lightweight and energy-efficient public key encryption scheme for wireless sensor networks","volume":"16","author":"khodaei","year":"2017","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"ref1","first-page":"1092","article-title":"A symmetric key-based encryption algorithm for wireless sensor networks","volume":"60","author":"li","year":"2013","journal-title":"IEEE Transactions on Industrial Electronics"},{"key":"ref17","author":"stinson","year":"2019","journal-title":"Cryptography Theory and Practice"},{"key":"ref16","first-page":"891","article-title":"A Comprehensive Study on Asymmetric Cryptography Techniques","author":"kishore","year":"0","journal-title":"2021 6th International Conference on Communication and Electronics Systems (ICCES)"},{"key":"ref19","article-title":"Efficient Cryptographic Algorithm using Elliptic Curve Cryptography for Security in WSN","author":"singh","year":"0","journal-title":"2017 7th International Conference on Cloud Computing Data Science and Engineering (Confluence)"},{"key":"ref18","author":"menezes","year":"1996","journal-title":"Handbook of Applied Cryptography"},{"key":"ref24","article-title":"Lightweight Cryptography for Low-Cost RFID Systems","author":"engels","year":"0","journal-title":"Proceedings of the 2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber Physical and Social Computing (CP- SCom) and IEEE Smart Data (SmartData)"},{"key":"ref23","author":"meier","year":"2013","journal-title":"Cryptography for Internet and Database Applications"},{"key":"ref25","first-page":"2463","article-title":"Efficient Key Management for Secure Communication in Resource-Constrained Wireless Sensor Networks","volume":"118","author":"kaur","year":"2021","journal-title":"Wireless Personal Communications"},{"key":"ref20","article-title":"Recommendation for Key Management","year":"2022","journal-title":"Nist special publication 800&#x2013;57 part 1 revision 5"},{"key":"ref22","author":"daemen","year":"2013","journal-title":"The Design of RIJNDAEL AES-The Advanced Encryption Standard"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.aej.2023.03.061"},{"key":"ref8"},{"key":"ref7"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1155\/2013\/67532"},{"key":"ref4","first-page":"10","article-title":"Data security and privacy in wireless body area networks","volume":"20","author":"chen","year":"2013","journal-title":"IEEE Wireless Communications"},{"key":"ref3","first-page":"612","article-title":"A survey on wireless sensor network security","volume":"36","author":"sundararaman","year":"2013","journal-title":"Journal of Network and Computer Applications"},{"key":"ref6","first-page":"617","article-title":"A survey on elliptic curve cryptography for wireless sensor networks","volume":"18","author":"li","year":"2016","journal-title":"IEEE Communications Surveys and Tutorials"},{"key":"ref5","first-page":"53","article-title":"A survey on security issues in wireless sensor networks","volume":"50","author":"shuja","year":"2015","journal-title":"Journal of Network and Computer Applications"}],"event":{"name":"2023 IEEE 8th International Conference On Software Engineering and Computer Systems (ICSECS)","location":"Penang, Malaysia","start":{"date-parts":[[2023,8,25]]},"end":{"date-parts":[[2023,8,27]]}},"container-title":["2023 IEEE 8th International Conference On Software Engineering and Computer Systems (ICSECS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10256260\/10256269\/10256341.pdf?arnumber=10256341","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,16]],"date-time":"2023-10-16T17:51:52Z","timestamp":1697478712000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10256341\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,25]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/icsecs58457.2023.10256341","relation":{},"subject":[],"published":{"date-parts":[[2023,8,25]]}}}