{"id":"https://openalex.org/W3197448544","doi":"https://doi.org/10.1007/s40747-021-00505-8","title":"Code-based encryption techniques with distributed cluster head and energy consumption routing protocol","display_name":"Code-based encryption techniques with distributed cluster head and energy consumption routing protocol","publication_year":2021,"publication_date":"2021-08-30","ids":{"openalex":"https://openalex.org/W3197448544","doi":"https://doi.org/10.1007/s40747-021-00505-8","mag":"3197448544"},"language":"en","primary_location":{"id":"doi:10.1007/s40747-021-00505-8","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s40747-021-00505-8","pdf_url":"https://link.springer.com/content/pdf/10.1007/s40747-021-00505-8.pdf","source":{"id":"https://openalex.org/S3035462843","display_name":"Complex & Intelligent Systems","issn_l":"2198-6053","issn":["2198-6053","2199-4536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Complex &amp; Intelligent Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://link.springer.com/content/pdf/10.1007/s40747-021-00505-8.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5049805832","display_name":"M. Jalasri","orcid":null},"institutions":[{"id":"https://openalex.org/I43814544","display_name":"Sathyabama Institute of Science and Technology","ror":"https://ror.org/01defpn95","country_code":"IN","type":"education","lineage":["https://openalex.org/I43814544"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"M. Jalasri","raw_affiliation_strings":["Department of CSE, Sathyabama Institute of Science and Technology, Chennai, Tamil Nadu, 600119, India"],"affiliations":[{"raw_affiliation_string":"Department of CSE, Sathyabama Institute of Science and Technology, Chennai, Tamil Nadu, 600119, India","institution_ids":["https://openalex.org/I43814544"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102807731","display_name":"L. Lakshmanan","orcid":null},"institutions":[{"id":"https://openalex.org/I43814544","display_name":"Sathyabama Institute of Science and Technology","ror":"https://ror.org/01defpn95","country_code":"IN","type":"education","lineage":["https://openalex.org/I43814544"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"L. Lakshmanan","raw_affiliation_strings":["Department of CSE, Sathyabama Institute of Science and Technology, Chennai, Tamil Nadu, 600119, India"],"affiliations":[{"raw_affiliation_string":"Department of CSE, Sathyabama Institute of Science and Technology, Chennai, Tamil Nadu, 600119, India","institution_ids":["https://openalex.org/I43814544"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5049805832"],"corresponding_institution_ids":["https://openalex.org/I43814544"],"apc_list":{"value":1320,"currency":"GBP","value_usd":1619},"apc_paid":{"value":1320,"currency":"GBP","value_usd":1619},"fwci":0.6072,"has_fulltext":true,"cited_by_count":7,"citation_normalized_percentile":{"value":0.67335728,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"9","issue":"3","first_page":"2943","last_page":"2955"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11458","display_name":"Advanced Wireless Communication Technologies","score":0.9934999942779541,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9926999807357788,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8111591339111328},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.571693480014801},{"id":"https://openalex.org/keywords/energy-consumption","display_name":"Energy consumption","score":0.5158361792564392},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5115293264389038},{"id":"https://openalex.org/keywords/data-security","display_name":"Data security","score":0.48271772265434265},{"id":"https://openalex.org/keywords/data-sharing","display_name":"Data sharing","score":0.45062166452407837},{"id":"https://openalex.org/keywords/data-transmission","display_name":"Data transmission","score":0.4359416365623474},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.42546698451042175},{"id":"https://openalex.org/keywords/routing-protocol","display_name":"Routing protocol","score":0.41055411100387573},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3609354794025421},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3474873900413513},{"id":"https://openalex.org/keywords/routing","display_name":"Routing (electronic design automation)","score":0.22253692150115967},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.10518914461135864}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8111591339111328},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.571693480014801},{"id":"https://openalex.org/C2780165032","wikidata":"https://www.wikidata.org/wiki/Q16869822","display_name":"Energy consumption","level":2,"score":0.5158361792564392},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5115293264389038},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.48271772265434265},{"id":"https://openalex.org/C2779965156","wikidata":"https://www.wikidata.org/wiki/Q5227350","display_name":"Data sharing","level":3,"score":0.45062166452407837},{"id":"https://openalex.org/C557945733","wikidata":"https://www.wikidata.org/wiki/Q389772","display_name":"Data transmission","level":2,"score":0.4359416365623474},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.42546698451042175},{"id":"https://openalex.org/C104954878","wikidata":"https://www.wikidata.org/wiki/Q1648707","display_name":"Routing protocol","level":3,"score":0.41055411100387573},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3609354794025421},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3474873900413513},{"id":"https://openalex.org/C74172769","wikidata":"https://www.wikidata.org/wiki/Q1446839","display_name":"Routing (electronic design automation)","level":2,"score":0.22253692150115967},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.10518914461135864},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/s40747-021-00505-8","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s40747-021-00505-8","pdf_url":"https://link.springer.com/content/pdf/10.1007/s40747-021-00505-8.pdf","source":{"id":"https://openalex.org/S3035462843","display_name":"Complex & Intelligent Systems","issn_l":"2198-6053","issn":["2198-6053","2199-4536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Complex &amp; Intelligent Systems","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:955da2625792491b91c21fe90ee29af5","is_oa":true,"landing_page_url":"https://doaj.org/article/955da2625792491b91c21fe90ee29af5","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Complex & Intelligent Systems, Vol 9, Iss 3, Pp 2943-2955 (2021)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1007/s40747-021-00505-8","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s40747-021-00505-8","pdf_url":"https://link.springer.com/content/pdf/10.1007/s40747-021-00505-8.pdf","source":{"id":"https://openalex.org/S3035462843","display_name":"Complex & Intelligent Systems","issn_l":"2198-6053","issn":["2198-6053","2199-4536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Complex &amp; Intelligent Systems","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/7","score":0.9100000262260437,"display_name":"Affordable and clean energy"}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3197448544.pdf","grobid_xml":"https://content.openalex.org/works/W3197448544.grobid-xml"},"referenced_works_count":33,"referenced_works":["https://openalex.org/W2768229290","https://openalex.org/W2770848963","https://openalex.org/W2936814630","https://openalex.org/W2956857492","https://openalex.org/W2966623281","https://openalex.org/W2993241903","https://openalex.org/W2997599690","https://openalex.org/W2998816190","https://openalex.org/W3000904873","https://openalex.org/W3001234969","https://openalex.org/W3004037385","https://openalex.org/W3005691754","https://openalex.org/W3007157143","https://openalex.org/W3007523155","https://openalex.org/W3015625684","https://openalex.org/W3018623989","https://openalex.org/W3025035827","https://openalex.org/W3026655825","https://openalex.org/W3037917301","https://openalex.org/W3038173901","https://openalex.org/W3042799967","https://openalex.org/W3046133755","https://openalex.org/W3047178630","https://openalex.org/W3047208881","https://openalex.org/W3083988921","https://openalex.org/W3092208992","https://openalex.org/W3094587873","https://openalex.org/W3099926093","https://openalex.org/W3113535026","https://openalex.org/W3116635174","https://openalex.org/W3120419852","https://openalex.org/W3134320273","https://openalex.org/W3164819828"],"related_works":["https://openalex.org/W2074846102","https://openalex.org/W314547274","https://openalex.org/W3177071349","https://openalex.org/W4210478786","https://openalex.org/W4382053117","https://openalex.org/W2362592206","https://openalex.org/W2793746109","https://openalex.org/W3104202633","https://openalex.org/W4221042637","https://openalex.org/W4311218790"],"abstract_inverted_index":{"Abstract":[0],"Fog":[1,20],"computing":[2,21],"and":[3,35,47,87,101,108,136,160,181,195],"the":[4,17,64,74,96,102,109,119,126,161,175,183,189,207,212],"Internet":[5],"of":[6,128,167,193,199,206],"Things":[7],"(IoT)":[8],"played":[9],"a":[10,151],"crucial":[11],"role":[12],"in":[13,16,63,68],"storing":[14],"data":[15,27,30,36,43,62,85,88,97,120,162,172,191],"third-party":[18],"server.":[19],"provides":[22],"various":[23],"resources":[24],"to":[25,139,149,171,188,211],"collect":[26],"by":[28],"managing":[29,84],"security.":[31],"However,":[32],"intermediate":[33,158],"attacks":[34],"sharing":[37,61],"create":[38],"enormous":[39],"security":[40,56,86,173],"challenges":[41],"like":[42],"privacy,":[44],"confidentiality,":[45],"authentication,":[46],"integrity":[48],"issues.":[49],"Various":[50],"researchers":[51],"introduce":[52],"several":[53],"cryptographic":[54],"techniques;":[55],"is":[57,106,115,209],"still":[58],"significant":[59],"while":[60],"distributed":[65,103,111],"environment.":[66],"Therefore,":[67],"this":[69],"paper,":[70],"Code-Based":[71],"Encryption":[72],"with":[73],"Energy":[75],"Consumption":[76],"Routing":[77],"Protocol":[78],"(CBE-ECR)":[79],"has":[80],"been":[81,99],"proposed":[82],"for":[83,117],"transmission":[89],"protocols":[90],"using":[91],"keyed-hash":[92],"message":[93],"authentication.":[94],"Initially,":[95],"have":[98,163],"analyzed,":[100],"cluster":[104],"head":[105],"selected,":[107],"stochastically":[110],"energy":[112,197],"clustering":[113,214],"protocol":[114],"utilized":[116],"making":[118],"transmission.":[121,168],"Code-driven":[122],"cryptography":[123],"relies":[124],"on":[125,146],"severity":[127],"code":[129],"theory":[130],"issues":[131],"such":[132],"as":[133],"disorder":[134],"demodulation":[135],"vibration":[137],"required":[138],"learn":[140],"equivalence.":[141],"These":[142],"crypto-systems":[143],"are":[144],"based":[145],"error":[147],"codes":[148],"build":[150],"single-way":[152],"function.":[153],"The":[154],"encryption":[155],"technique":[156],"minimizes":[157],"attacks,":[159],"protected":[164],"all":[165],"means":[166],"In":[169],"addition":[170],"management,":[174],"introduced":[176],"CBE-ECR":[177],"reduces":[178],"unauthorized":[179],"access":[180],"manages":[182],"network":[184],"lifetime":[185],"successfully,":[186],"leading":[187],"effective":[190],"management":[192],"96.17%":[194],"less":[196],"consumption":[198],"21.11%":[200],"than":[201],"other":[202],"popular":[203],"methods.The":[204],"effectiveness":[205],"system":[208],"compared":[210],"traditional":[213],"techniques.":[215]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":3}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
