79
Views
30
CrossRef citations to date
0
Altmetric
Original Articles

New secure routing protocol with elliptic curve cryptography for military heterogeneous wireless sensor networks

, &
Pages 341-365 | Received 01 Dec 2015, Published online: 03 Apr 2017

Keep up to date with the latest research on this topic with citation updates for this article.

Read on this site (20)

Keisuke Hakuta & Tsukasa Ishikawa. (2022) An alternative proof of the minimality of the Hamming weight of width-3 non-adjacent form. Journal of Discrete Mathematical Sciences and Cryptography 0:0, pages 1-16.
Read now
Karrar Taher R. Aljamaly & Ruma Kareem K. Ajeena. (2021) The elliptic scalar multiplication graph and its application in elliptic curve cryptography. Journal of Discrete Mathematical Sciences and Cryptography 24:6, pages 1793-1807.
Read now
Ruma Kareem K. Ajeena. (2021) The soft graphic integer sub-decomposition method for elliptic scalar multiplication. Journal of Discrete Mathematical Sciences and Cryptography 24:6, pages 1751-1765.
Read now
Belkacem Imine, Naima Hadj-Said & Adda Ali-Pacha. (2021) New McEliece cryptosystem based on non-permutation equivalent polar codes. Journal of Discrete Mathematical Sciences and Cryptography 0:0, pages 1-12.
Read now
Rajit Ram Yadava & Ranvijay. (2021) CATM : Congestion aware trust model for wireless sensor networks. Journal of Discrete Mathematical Sciences and Cryptography 24:5, pages 1475-1485.
Read now
Santoshi Pote, Virendra Sule & B. K. Lande. (2020) Elliptic curve cryptography arithmetic in terms of one variable polynomial division. Journal of Discrete Mathematical Sciences and Cryptography 23:8, pages 1545-1571.
Read now
Nedal Tahat, A. K. Alomari, Obaida M. Al-Hazaimeh & Mohammad F. Al-Jamal. (2020) An efficient self-certified multi-proxy signature scheme based on elliptic curve discrete logarithm problem. Journal of Discrete Mathematical Sciences and Cryptography 23:4, pages 935-948.
Read now
Devender Kumar, Harsh Kumar Singh & Chhahat Ahlawat. (2020) A secure three-factor authentication scheme for wireless sensor networks using ECC. Journal of Discrete Mathematical Sciences and Cryptography 23:4, pages 879-900.
Read now
Nissa Mehibel & M’hamed Hamadouche. (2020) A new enhancement of elliptic curve digital signature algorithm. Journal of Discrete Mathematical Sciences and Cryptography 23:3, pages 743-757.
Read now
D. Yuvaraj, M. Sivaram & S. Navaneetha Krishnan. (2020) Intelligent detection of untrusted data transmission to optimize energy in sensor networks. Journal of Information and Optimization Sciences 41:3, pages 799-811.
Read now
Manju, Pawan Bhambu & Sandeep Kumar. (2020) Target K-coverage problem in wireless sensor networks. Journal of Discrete Mathematical Sciences and Cryptography 23:2, pages 651-659.
Read now
Indu Dohare & Karan Singh. (2019) PSO-DEC: PSO based deterministic energy efficient clustering protocol for IoT. Journal of Discrete Mathematical Sciences and Cryptography 22:8, pages 1463-1475.
Read now
Gayatri Sakya & Vidushi Sharma. (2019) Performance evaluation of ADMC-MAC mission critical protocol for wireless sensor networks. Journal of Discrete Mathematical Sciences and Cryptography 22:8, pages 1407-1422.
Read now
Abderrahmane Nitaj & Emmanuel Fouotsa. (2019) A new attack on RSA and Demytko’s elliptic curve cryptosystem. Journal of Discrete Mathematical Sciences and Cryptography 22:3, pages 391-409.
Read now
Deepika Suhag, Shailendra Singh Gaur & A.K. Mohapatra. (2019) A proposed scheme to achieve node authentication in military applications of wireless sensor network. Journal of Statistics and Management Systems 22:2, pages 347-362.
Read now
Yang-Han Yu, Wen-Wu Xie, Yi-Sha Dong, Jing-Cheng Xu & Shuo Wang. (2018) The influence of factor endowment on financial industry agglomeration – An empirical study based on the financial characteristic town. Journal of Interdisciplinary Mathematics 21:5, pages 1327-1332.
Read now
Ke Wang & Jiaoshu Wu. (2018) High density information encryption and transmission algorithm for large scale database. Journal of Discrete Mathematical Sciences and Cryptography 21:3, pages 781-787.
Read now
Xiao Wu, Na Li, Xingtao Zhang, Yumei Qian & Weiwei Wang. (2018) Plant gene regulation algorithm mediated by agrobacterium tumefaciens Atu4860. Journal of Discrete Mathematical Sciences and Cryptography 21:2, pages 357-362.
Read now
Tiantian Ning, Zhigang Song & Yubo Zhang. (2017) Influence of college students’ leadership on innovative behavior: On the mediating effect of policy perception. Journal of Interdisciplinary Mathematics 20:6-7, pages 1501-1504.
Read now
Hai-Xin Wang, Zu-He Wang & Mei Zhu. (2017) Differential evolution algorithm for multi-project resource leveling problem. Journal of Interdisciplinary Mathematics 20:6-7, pages 1383-1386.
Read now

Articles from other publishers (10)

Lirui Tan, Qiuju Zheng & Junji Chen. (2023) Providing an effective key management scheme to increase transaction security of homogeneous mobile wireless sensor networks. Journal of Intelligent & Fuzzy Systems 45:6, pages 10451-10466.
Crossref
Demin Gao, Yunhuai Liu, Bin Hu, Lei Wang, Weiwei Chen, Yongrui Chen & Tian He. (2023) Time Synchronization Based on Cross-Technology Communication for IoT Networks. IEEE Internet of Things Journal 10:22, pages 19753-19764.
Crossref
Han Ping. (2022) Network Information Security Data Protection Based on Data Encryption Technology. Wireless Personal Communications 126:3, pages 2719-2729.
Crossref
Chun-Cheng Lin, Yi-Chun Peng, Li-Wei Chang & Zheng-Yu Chen. (2022) Joint deployment and sleep scheduling of the Internet of things. Wireless Networks 28:6, pages 2471-2483.
Crossref
Karthick RamasamyMohammad Hossein Anisi & Anish Jindal. (2022) E2DA: Energy Efficient Data Aggregation and End-to-End Security in 3D Reconfigurable WSN. IEEE Transactions on Green Communications and Networking 6:2, pages 787-798.
Crossref
Neeraj Chandnani & Chandrakant N. Khairnar. (2022) Bio-Inspired Multilevel Security Protocol for Data Aggregation and Routing in IoT WSNs. Mobile Networks and Applications 27:3, pages 1030-1049.
Crossref
Venkata Abhishek Kanthuru & Kakelli Anil Kumar. 2021. Advances in Distributed Computing and Machine Learning. Advances in Distributed Computing and Machine Learning 25 34 .
Hongying Bai, Xiaotong Zhang & Fangjie Liu. (2020) Intrusion Detection Algorithm Based on Change Rates of Multiple Attributes for WSN. Wireless Communications and Mobile Computing 2020, pages 1-16.
Crossref
German-Wedge Rodriguez-Pirateque. (2020) UAV systems for multipurpose heterogeneous networks: a review of design, development and performance. Aeronautics and Aerospace Open Access Journal 4:3, pages 121-139.
Crossref
Khalid Haseeb, Naveed Islam, Ahmad Almogren, Ikram Ud Din, Hisham N. Almajed & Nadra Guizani. (2019) Secret Sharing-Based Energy-Aware and Multi-Hop Routing Protocol for IoT Based WSNs. IEEE Access 7, pages 79980-79988.
Crossref

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.