{"id":"https://openalex.org/W2147674576","doi":"https://doi.org/10.1109/comswa.2008.4554485","title":"Swarm intelligence based key generation for text encryption in cellular networks","display_name":"Swarm intelligence based key generation for text encryption in cellular networks","publication_year":2008,"publication_date":"2008-01-01","ids":{"openalex":"https://openalex.org/W2147674576","doi":"https://doi.org/10.1109/comswa.2008.4554485","mag":"2147674576"},"language":"en","primary_location":{"id":"doi:10.1109/comswa.2008.4554485","is_oa":false,"landing_page_url":"https://doi.org/10.1109/comswa.2008.4554485","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2008 3rd International Conference on Communication Systems Software and Middleware and Workshops (COMSWARE '08)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5034504422","display_name":"N. K. Sreelaja","orcid":null},"institutions":[{"id":"https://openalex.org/I4210109528","display_name":"PSG INSTITUTE OF TECHNOLOGY AND APPLIED RESEARCH","ror":"https://ror.org/01sa9ng67","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210109528"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"N.K. Sreelaja","raw_affiliation_strings":["PSG College of Technology, Coimbatore, India"],"affiliations":[{"raw_affiliation_string":"PSG College of Technology, Coimbatore, India","institution_ids":["https://openalex.org/I4210109528"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5006862051","display_name":"G.A. Vijayalakshmi Pai","orcid":"https://orcid.org/0000-0001-8762-7217"},"institutions":[{"id":"https://openalex.org/I4210109528","display_name":"PSG INSTITUTE OF TECHNOLOGY AND APPLIED RESEARCH","ror":"https://ror.org/01sa9ng67","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210109528"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"G.A. Vijayalakshmi Pai","raw_affiliation_strings":["PSG College of Technology, Coimbatore, India"],"affiliations":[{"raw_affiliation_string":"PSG College of Technology, Coimbatore, India","institution_ids":["https://openalex.org/I4210109528"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5034504422"],"corresponding_institution_ids":["https://openalex.org/I4210109528"],"apc_list":null,"apc_paid":null,"fwci":0.2693,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.60320192,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"30","issue":null,"first_page":"622","last_page":"629"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12029","display_name":"DNA and Biological Computing","score":0.988099992275238,"subfield":{"id":"https://openalex.org/subfields/1312","display_name":"Molecular Biology"},"field":{"id":"https://openalex.org/fields/13","display_name":"Biochemistry, Genetics and Molecular Biology"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}},"topics":[{"id":"https://openalex.org/T12029","display_name":"DNA and Biological Computing","score":0.988099992275238,"subfield":{"id":"https://openalex.org/subfields/1312","display_name":"Molecular Biology"},"field":{"id":"https://openalex.org/fields/13","display_name":"Biochemistry, Genetics and Molecular Biology"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9796000123023987,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12162","display_name":"Cellular Automata and Applications","score":0.9629999995231628,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8056889772415161},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7753221988677979},{"id":"https://openalex.org/keywords/eavesdropping","display_name":"Eavesdropping","score":0.7357226610183716},{"id":"https://openalex.org/keywords/swarm-intelligence","display_name":"Swarm intelligence","score":0.6429817080497742},{"id":"https://openalex.org/keywords/stream-cipher","display_name":"Stream cipher","score":0.5519999265670776},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5491299629211426},{"id":"https://openalex.org/keywords/swarm-behaviour","display_name":"Swarm behaviour","score":0.49979686737060547},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4441133737564087},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3378834128379822},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.18686747550964355},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.18089735507965088},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.1766115427017212},{"id":"https://openalex.org/keywords/particle-swarm-optimization","display_name":"Particle swarm optimization","score":0.08975711464881897}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8056889772415161},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7753221988677979},{"id":"https://openalex.org/C2776788033","wikidata":"https://www.wikidata.org/wiki/Q320769","display_name":"Eavesdropping","level":2,"score":0.7357226610183716},{"id":"https://openalex.org/C119487961","wikidata":"https://www.wikidata.org/wiki/Q863960","display_name":"Swarm intelligence","level":3,"score":0.6429817080497742},{"id":"https://openalex.org/C92950451","wikidata":"https://www.wikidata.org/wiki/Q864718","display_name":"Stream cipher","level":3,"score":0.5519999265670776},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5491299629211426},{"id":"https://openalex.org/C181335050","wikidata":"https://www.wikidata.org/wiki/Q14915018","display_name":"Swarm behaviour","level":2,"score":0.49979686737060547},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4441133737564087},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3378834128379822},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.18686747550964355},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.18089735507965088},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.1766115427017212},{"id":"https://openalex.org/C85617194","wikidata":"https://www.wikidata.org/wiki/Q2072794","display_name":"Particle swarm optimization","level":2,"score":0.08975711464881897}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/comswa.2008.4554485","is_oa":false,"landing_page_url":"https://doi.org/10.1109/comswa.2008.4554485","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2008 3rd International Conference on Communication Systems Software and Middleware and Workshops (COMSWARE '08)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.5099999904632568,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":8,"referenced_works":["https://openalex.org/W117007327","https://openalex.org/W1556597491","https://openalex.org/W1838112905","https://openalex.org/W2030411764","https://openalex.org/W3144627111","https://openalex.org/W6638946015","https://openalex.org/W7008149400","https://openalex.org/W7063947132"],"related_works":["https://openalex.org/W4308079021","https://openalex.org/W1527337688","https://openalex.org/W2399799070","https://openalex.org/W2048054807","https://openalex.org/W2746377055","https://openalex.org/W4386001959","https://openalex.org/W2594296178","https://openalex.org/W3089846858","https://openalex.org/W3012322385","https://openalex.org/W4304182880"],"abstract_inverted_index":{"Encryption":[0],"of":[1,54,56,81,90,103,109],"data":[2,21],"traffic":[3],"in":[4],"cellular":[5],"network":[6],"is":[7,11,49,84],"essential":[8],"since":[9],"it":[10,86],"vulnerable":[12],"to":[13,92],"eavesdropping.":[14],"This":[15],"paper":[16],"focuses":[17],"on":[18],"encrypting":[19,101],"the":[20,24,36,50,77,88,107],"sent":[22],"between":[23],"mobile":[25],"stations":[26,29],"and":[27,95,106],"base":[28],"using":[30,42],"a":[31,43,71],"stream":[32,114],"cipher":[33,115],"method.":[34],"However,":[35],"keys":[37,91],"for":[38,75],"encryption":[39],"are":[40,117],"generated":[41],"swarm":[44],"intelligence":[45,48,53],"approach.":[46],"Swarm":[47],"emergent":[51],"collective":[52],"groups":[55],"simple":[57],"autonomous":[58],"agents.":[59],"The":[60,79],"novel":[61],"technique":[62],"termed":[63],"Ant":[64],"Colony":[65],"Key":[66],"Generation":[67],"Algorithm":[68],"(AKGA)":[69],"employs":[70],"character":[72],"code":[73],"table":[74],"encoding":[76],"keys.":[78],"advantage":[80],"this":[82],"approach":[83],"that":[85],"reduces":[87],"number":[89],"be":[93],"stored":[94],"distributed.":[96],"Experimental":[97],"results":[98],"demonstrating":[99],"AKGApsilas":[100],"text":[102],"different":[104],"lengths":[105],"comparison":[108],"its":[110],"performance":[111],"with":[112],"other":[113],"methods":[116],"presented.":[118]},"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2018,"cited_by_count":2},{"year":2016,"cited_by_count":1},{"year":2014,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
