{"id":"https://openalex.org/W4408381580","doi":"https://doi.org/10.1177/14727978251321651","title":"Wireless sensor network security encryption based on AES module optimization design","display_name":"Wireless sensor network security encryption based on AES module optimization design","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4408381580","doi":"https://doi.org/10.1177/14727978251321651"},"language":"en","primary_location":{"id":"doi:10.1177/14727978251321651","is_oa":true,"landing_page_url":"https://doi.org/10.1177/14727978251321651","pdf_url":"https://journals.sagepub.com/doi/pdf/10.1177/14727978251321651","source":{"id":"https://openalex.org/S2765058733","display_name":"Journal of Computational Methods in Sciences and Engineering","issn_l":"1472-7978","issn":["1472-7978","1875-8983"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computational Methods in Sciences and Engineering","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://journals.sagepub.com/doi/pdf/10.1177/14727978251321651","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5013188461","display_name":"Zhenglu Yang","orcid":"https://orcid.org/0000-0001-9528-965X"},"institutions":[{"id":"https://openalex.org/I4210129425","display_name":"Lanzhou Petrochemical Polytechnic","ror":"https://ror.org/03pkj2z67","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210129425"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zheng'an Yang","raw_affiliation_strings":["Lanzhou Vocational and Technical College","Department of Electronic Information Engineering, Lanzhou Vocational and Technical College, Lanzhou, China"],"affiliations":[{"raw_affiliation_string":"Lanzhou Vocational and Technical College","institution_ids":["https://openalex.org/I4210129425"]},{"raw_affiliation_string":"Department of Electronic Information Engineering, Lanzhou Vocational and Technical College, Lanzhou, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5013188461"],"corresponding_institution_ids":["https://openalex.org/I4210129425"],"apc_list":null,"apc_paid":null,"fwci":4.8085,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.94206056,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":97},"biblio":{"volume":"25","issue":"1","first_page":"766","last_page":"778"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.995199978351593,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9937000274658203,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/advanced-encryption-standard","display_name":"Advanced Encryption Standard","score":0.7548235654830933},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6700084209442139},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6493682265281677},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.5664616823196411},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4868254065513611},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.4552858769893646},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.32511240243911743}],"concepts":[{"id":"https://openalex.org/C94520183","wikidata":"https://www.wikidata.org/wiki/Q190746","display_name":"Advanced Encryption Standard","level":3,"score":0.7548235654830933},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6700084209442139},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6493682265281677},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.5664616823196411},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4868254065513611},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.4552858769893646},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.32511240243911743}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1177/14727978251321651","is_oa":true,"landing_page_url":"https://doi.org/10.1177/14727978251321651","pdf_url":"https://journals.sagepub.com/doi/pdf/10.1177/14727978251321651","source":{"id":"https://openalex.org/S2765058733","display_name":"Journal of Computational Methods in Sciences and Engineering","issn_l":"1472-7978","issn":["1472-7978","1875-8983"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computational Methods in Sciences and Engineering","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1177/14727978251321651","is_oa":true,"landing_page_url":"https://doi.org/10.1177/14727978251321651","pdf_url":"https://journals.sagepub.com/doi/pdf/10.1177/14727978251321651","source":{"id":"https://openalex.org/S2765058733","display_name":"Journal of Computational Methods in Sciences and Engineering","issn_l":"1472-7978","issn":["1472-7978","1875-8983"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computational Methods in Sciences and Engineering","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4408381580.pdf"},"referenced_works_count":22,"referenced_works":["https://openalex.org/W2787953190","https://openalex.org/W2972878892","https://openalex.org/W3025696092","https://openalex.org/W3090360823","https://openalex.org/W3094327350","https://openalex.org/W3118860675","https://openalex.org/W3133709824","https://openalex.org/W3136441670","https://openalex.org/W3137298197","https://openalex.org/W3148337702","https://openalex.org/W3158454129","https://openalex.org/W3159452712","https://openalex.org/W3164155579","https://openalex.org/W3180123331","https://openalex.org/W3203077206","https://openalex.org/W4205549871","https://openalex.org/W4293109491","https://openalex.org/W4306767256","https://openalex.org/W4310946303","https://openalex.org/W4316344964","https://openalex.org/W4377821709","https://openalex.org/W4387742472"],"related_works":["https://openalex.org/W2385743990","https://openalex.org/W2350176425","https://openalex.org/W1499266877","https://openalex.org/W2535398559","https://openalex.org/W4245233789","https://openalex.org/W4248712873","https://openalex.org/W2393941228","https://openalex.org/W3106115593","https://openalex.org/W2390312744","https://openalex.org/W2294670702"],"abstract_inverted_index":{"The":[0,57,119,131,224],"use":[1],"of":[2,11,25,43,71,82,101,111,141,150,181,222,244],"wireless":[3],"sensor":[4],"networks":[5],"(WSNs)":[6],"generates":[7],"a":[8],"significant":[9],"amount":[10],"data":[12],"during":[13,210],"information":[14],"transmission,":[15],"leading":[16],"to":[17,97],"increased":[18],"security":[19,24,70,233,243],"requirements.":[20],"To":[21],"enhance":[22],"the":[23,28,40,63,69,79,109,116,135,147,176,184,195,201,207,215,220,242],"WSN":[26,245],"databases,":[27],"Advanced":[29],"Encryption":[30,92],"Standard":[31],"(AES)":[32],"algorithm":[33,203,230],"is":[34,239],"employed":[35],"for":[36,46,241],"encryption.":[37],"It":[38],"solves":[39],"high":[41,232],"requirements":[42],"AES":[44,72,142,151,185,202,229],"coprocessors":[45,73],"chip":[47,76],"area,":[48],"power":[49],"consumption,":[50],"and":[51,89,103,108,123,126,138,160,197,212,214,234],"other":[52],"aspects":[53,100],"through":[54],"optimized":[55],"design.":[56],"simplified":[58],"4":[59],"S-box":[60],"structure":[61],"replaces":[62],"traditional":[64],"20":[65],"S-boxes,":[66],"effectively":[67],"improving":[68],"while":[74],"reducing":[75],"costs.":[77],"In":[78,199],"performance":[80],"analysis":[81,226],"AES,":[83],"RSA":[84,159,196],"Public":[85],"Key":[86],"System":[87],"(RSA)":[88],"DES":[90],"(Data":[91],"Standard)":[93],"algorithms":[94],"are":[95,128],"introduced":[96],"compare":[98],"four":[99],"encryption":[102,125,137,193,211],"decryption":[104,127,139],"speed,":[105],"accuracy,":[106],"sensitivity,":[107],"size":[110],"storage":[112,182,190],"space":[113,191],"occupied":[114],"by":[115],"three":[117],"algorithms.":[118],"AES\u2019s":[120],"loss":[121,208,216],"value":[122,217],"its":[124],"also":[129],"examined.":[130],"results":[132],"showed":[133],"that":[134,228],"overall":[136],"speed":[140],"was":[143,152,155,168,172],"more":[144],"advantageous.":[145],"And":[146],"highest":[148],"accuracy":[149],"0.9513,":[153],"which":[154,171,238],"5.21%":[156],"higher":[157,162,174],"than":[158,163,175,194],"10.66%":[161],"DES.":[164,198],"Its":[165],"sensitivity":[166],"maximum":[167],"about":[169],"96.5%,":[170],"1.5%/2.5%":[173],"DES/RSA.":[177],"Meanwhile,":[178],"in":[179,206,219],"terms":[180],"space,":[183],"took":[186],"up":[187],"significantly":[188],"less":[189],"after":[192],"addition,":[200],"converged":[204],"faster":[205],"curve":[209],"decryption,":[213],"varied":[218],"range":[221],"0.1\u20131.9.":[223],"comprehensive":[225],"shows":[227],"has":[231],"can":[235],"save":[236],"resources,":[237],"important":[240],"database.":[246]},"counts_by_year":[{"year":2025,"cited_by_count":3}],"updated_date":"2025-12-19T19:40:27.379048","created_date":"2025-10-10T00:00:00"}
