{"id":"https://openalex.org/W4408057087","doi":"https://doi.org/10.1142/s179396232550028x","title":"An enhanced asymmetric quantization Boolean encryption for secure routing in wireless sensor networks","display_name":"An enhanced asymmetric quantization Boolean encryption for secure routing in wireless sensor networks","publication_year":2025,"publication_date":"2025-03-01","ids":{"openalex":"https://openalex.org/W4408057087","doi":"https://doi.org/10.1142/s179396232550028x"},"language":"en","primary_location":{"id":"doi:10.1142/s179396232550028x","is_oa":false,"landing_page_url":"https://doi.org/10.1142/s179396232550028x","pdf_url":null,"source":{"id":"https://openalex.org/S107361000","display_name":"Advances in Complex Systems","issn_l":"0219-5259","issn":["0219-5259","1793-6802","1793-9615","1793-9623"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319815","host_organization_name":"World Scientific","host_organization_lineage":["https://openalex.org/P4310319815"],"host_organization_lineage_names":["World Scientific"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Modeling, Simulation, and Scientific Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"M. Sudha","orcid":"https://orcid.org/0000-0003-1790-9870"},"institutions":[{"id":"https://openalex.org/I4210128379","display_name":"Orthopaedic Research Group","ror":"https://ror.org/02pfaex92","country_code":"IN","type":"nonprofit","lineage":["https://openalex.org/I4210128379"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"M. Sudha","raw_affiliation_strings":["Department of Electronics and Communication Engineering, SNS College of Engineering, Coimbatore 641107, Tamil Nadu, India"],"raw_orcid":"https://orcid.org/0000-0003-1790-9870","affiliations":[{"raw_affiliation_string":"Department of Electronics and Communication Engineering, SNS College of Engineering, Coimbatore 641107, Tamil Nadu, India","institution_ids":["https://openalex.org/I4210128379"]}]},{"author_position":"middle","author":{"id":null,"display_name":"M. Saravanakumar","orcid":"https://orcid.org/0009-0006-4390-2145"},"institutions":[{"id":"https://openalex.org/I4210133257","display_name":"KPR Institute of Engineering and Technology","ror":"https://ror.org/02q9f3a53","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210133257"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"M. Saravanakumar","raw_affiliation_strings":["Artificial Intelligence & Data Science, Nehru Institute of Engineering and Technology, Coimbatore 641105, Tamil Nadu, India"],"raw_orcid":"https://orcid.org/0009-0006-4390-2145","affiliations":[{"raw_affiliation_string":"Artificial Intelligence & Data Science, Nehru Institute of Engineering and Technology, Coimbatore 641105, Tamil Nadu, India","institution_ids":["https://openalex.org/I4210133257"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066826293","display_name":"Pradeep Jangir","orcid":"https://orcid.org/0000-0001-6944-4775"},"institutions":[{"id":"https://openalex.org/I101407740","display_name":"Chandigarh University","ror":"https://ror.org/05t4pvx35","country_code":"IN","type":"education","lineage":["https://openalex.org/I101407740"]},{"id":"https://openalex.org/I27570832","display_name":"Jadara University","ror":"https://ror.org/001drnv35","country_code":"JO","type":"education","lineage":["https://openalex.org/I27570832"]}],"countries":["IN","JO"],"is_corresponding":false,"raw_author_name":"Pradeep Jangir","raw_affiliation_strings":["Jadara University Research Center, Jadara University, Irbid, Jordan","University Centre for Research and Development, Chandigarh University, Gharuan, Mohali 140413, India"],"raw_orcid":"https://orcid.org/0000-0001-6944-4775","affiliations":[{"raw_affiliation_string":"Jadara University Research Center, Jadara University, Irbid, Jordan","institution_ids":["https://openalex.org/I27570832"]},{"raw_affiliation_string":"University Centre for Research and Development, Chandigarh University, Gharuan, Mohali 140413, India","institution_ids":["https://openalex.org/I101407740"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5011661590","display_name":"Elangovan Muniyandy","orcid":"https://orcid.org/0000-0003-2349-3701"},"institutions":[{"id":"https://openalex.org/I146367977","display_name":"Applied Science Private University","ror":"https://ror.org/01ah6nb52","country_code":"JO","type":"education","lineage":["https://openalex.org/I146367977"]},{"id":"https://openalex.org/I85461943","display_name":"Saveetha University","ror":"https://ror.org/0034me914","country_code":"IN","type":"education","lineage":["https://openalex.org/I85461943"]}],"countries":["IN","JO"],"is_corresponding":false,"raw_author_name":"Elangovan Muniyandy","raw_affiliation_strings":["Applied Science Research Center, Applied Science Private University, Amman, Jordan","Department of Biosciences, Saveetha School of Engineering, Saveetha Institute of Medical and Technical Sciences, Chennai 602105, Tamil Nadu, India"],"raw_orcid":"https://orcid.org/0000-0003-2349-3701","affiliations":[{"raw_affiliation_string":"Applied Science Research Center, Applied Science Private University, Amman, Jordan","institution_ids":["https://openalex.org/I146367977"]},{"raw_affiliation_string":"Department of Biosciences, Saveetha School of Engineering, Saveetha Institute of Medical and Technical Sciences, Chennai 602105, Tamil Nadu, India","institution_ids":["https://openalex.org/I85461943"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I4210128379"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.03186023,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"16","issue":"02","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9932000041007996,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9932000041007996,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9872000217437744,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9718000292778015,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6583127975463867},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6273927092552185},{"id":"https://openalex.org/keywords/quantization","display_name":"Quantization (signal processing)","score":0.5692274570465088},{"id":"https://openalex.org/keywords/routing","display_name":"Routing (electronic design automation)","score":0.5675036311149597},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.5608115196228027},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5424346327781677},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.46766960620880127},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.45498600602149963},{"id":"https://openalex.org/keywords/routing-protocol","display_name":"Routing protocol","score":0.4237661063671112},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.23031669855117798}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6583127975463867},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6273927092552185},{"id":"https://openalex.org/C28855332","wikidata":"https://www.wikidata.org/wiki/Q198099","display_name":"Quantization (signal processing)","level":2,"score":0.5692274570465088},{"id":"https://openalex.org/C74172769","wikidata":"https://www.wikidata.org/wiki/Q1446839","display_name":"Routing (electronic design automation)","level":2,"score":0.5675036311149597},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.5608115196228027},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5424346327781677},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.46766960620880127},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.45498600602149963},{"id":"https://openalex.org/C104954878","wikidata":"https://www.wikidata.org/wiki/Q1648707","display_name":"Routing protocol","level":3,"score":0.4237661063671112},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.23031669855117798}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1142/s179396232550028x","is_oa":false,"landing_page_url":"https://doi.org/10.1142/s179396232550028x","pdf_url":null,"source":{"id":"https://openalex.org/S107361000","display_name":"Advances in Complex Systems","issn_l":"0219-5259","issn":["0219-5259","1793-6802","1793-9615","1793-9623"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319815","host_organization_name":"World Scientific","host_organization_lineage":["https://openalex.org/P4310319815"],"host_organization_lineage_names":["World Scientific"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Modeling, Simulation, and Scientific Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/7","score":0.7200000286102295,"display_name":"Affordable and clean energy"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":32,"referenced_works":["https://openalex.org/W3157211919","https://openalex.org/W3214137637","https://openalex.org/W4206088785","https://openalex.org/W4226031261","https://openalex.org/W4282576344","https://openalex.org/W4294439705","https://openalex.org/W4309487558","https://openalex.org/W4311907459","https://openalex.org/W4313398549","https://openalex.org/W4316660727","https://openalex.org/W4321374683","https://openalex.org/W4322706779","https://openalex.org/W4352977382","https://openalex.org/W4362582243","https://openalex.org/W4377293781","https://openalex.org/W4378194827","https://openalex.org/W4379209503","https://openalex.org/W4381336995","https://openalex.org/W4382281032","https://openalex.org/W4384007720","https://openalex.org/W4385407614","https://openalex.org/W4386432334","https://openalex.org/W4387388060","https://openalex.org/W4387710915","https://openalex.org/W4387842906","https://openalex.org/W4389196132","https://openalex.org/W4389197272","https://openalex.org/W4391667328","https://openalex.org/W4392106536","https://openalex.org/W4392880910","https://openalex.org/W4399989640","https://openalex.org/W4400229964"],"related_works":["https://openalex.org/W2100090372","https://openalex.org/W4361205702","https://openalex.org/W2385965183","https://openalex.org/W4289281780","https://openalex.org/W2013342653","https://openalex.org/W2901818815","https://openalex.org/W4237598585","https://openalex.org/W2359552542","https://openalex.org/W2374897487","https://openalex.org/W4205163163"],"abstract_inverted_index":{"For":[0,132],"Wireless":[1],"Sensor":[2],"Networks":[3],"(WSNs)":[4],"to":[5,44,54,82,100,175],"be":[6],"both":[7],"secure":[8,12,59,197],"and":[9,22,47,116,129,165,182,192],"effective,":[10],"a":[11,58,157,166,190],"routing":[13,23,60],"method":[14,194],"is":[15,111,189],"essential.":[16],"Enhancing":[17],"data":[18,20,50,114,126,134],"aggregation,":[19,115],"security,":[21,185],"security":[24],"has":[25,77],"been":[26,78],"the":[27,89,95,136,143,186],"focus":[28],"of":[29,169],"recent":[30],"research;":[31],"nonetheless,":[32],"these":[33,56],"strategies":[34],"frequently":[35],"face":[36],"major":[37],"obstacles,":[38],"such":[39],"as":[40],"time":[41],"complexity,":[42],"vulnerability":[43],"malicious":[45],"assaults,":[46],"worries":[48],"about":[49],"insecurity.":[51],"In":[52,80],"order":[53,81],"tackle":[55],"problems,":[57],"protocol":[61],"for":[62,113,195],"WSNs":[63],"named":[64],"Asymmetric":[65,106],"Quantization":[66,107],"Boolean":[67,117],"Encryption":[68,119],"Growth":[69,90],"Network":[70,109,118],"with":[71,120],"Leopard":[72,145],"Seal":[73,146],"Routing":[74,147],"Protocol":[75,148],"(AQBEGNet-LSRP)":[76],"suggested.":[79],"cluster":[83],"sensor":[84],"nodes,":[85],"this":[86],"model":[87,188],"uses":[88],"Optimizer":[91],"(GO)":[92],"technique,":[93],"choosing":[94],"Cluster":[96],"Head":[97],"(CH)":[98],"according":[99],"node":[101],"similarity.":[102],"A":[103],"Deep":[104],"Progressive":[105],"Neural":[108],"(DPAQNNet)":[110],"used":[112],"Asynchronous":[121],"Updating":[122],"Algorithm":[123],"(BNEAUA)":[124],"protects":[125],"during":[127],"transmission":[128],"thwarts":[130],"attacks.":[131],"encrypted":[133],"transit,":[135],"best":[137],"routes":[138],"are":[139],"then":[140],"chosen":[141],"by":[142],"upgraded":[144],"(LSRP).":[149],"With":[150],"its":[151,176],"remarkable":[152],"performance":[153],"characteristics,":[154],"which":[155],"include":[156],"110":[158],"Kbps":[159],"throughput,":[160],"an":[161],"80%":[162],"network":[163,184],"lifetime,":[164],"low":[167],"latency":[168],"0.02[Formula:":[170],"see":[171],"text]ms,":[172],"in":[173],"addition":[174],"99%":[177,183],"Packet":[178],"Delivery":[179],"Ratio":[180],"(PDR)":[181],"suggested":[187],"dependable":[191],"effective":[193],"transmitting":[196],"data.":[198]},"counts_by_year":[],"updated_date":"2025-12-23T23:11:35.936235","created_date":"2025-10-10T00:00:00"}
