References
- M. Winkler, Michael Street, Klaus-Dieter Tuchs, Konrad Wrona, “Wireless Sensor Networks for military purposes”, Springer-Verlag Berlin Heidelberg, pp: 365-394 (Nov 2013).
- Tarek Azzabi, Hassene Farhat, Nabil Sahil “Wireless Sensor Networks Security Issues and Military Specifications”, IEEE International Conference on Advanced Systems and Technologies (IC_ASET), pp: 978-5090-6634-6 (2017).
- S. Subasree, N.K. Sakthivel “Design of a new security protocol using hybrid cryptography algorithm”, International Journal of Research and Reviews in Applied Sciences, pp: 95-103 (2010).
- N. Kumar “A secure Communication Wireless Sensor Network through Hybrid (AES+ECC) Algorithm”, von LAP LAMBERT Academic publishing, vol. 386 (2012).
- Rawya Rizk, Yasmin Alkady “Two-phase hybrid cryptography algorithm for wireless sensor networks”, International Journal of Electrical System and Information Technology, pp: 296-313 (2015). doi: 10.1016/j.jesit.2015.11.005
- Shi-hai Zhu “Research of hybrid cipher algorithm application to hydraulic information transmission”, International Conference on, Electronics, Communication and Control (ICECC), pp: 3873–3876. IEEE (2011).
- Seung-Hyun Seo, Salmin Sultana “Effective Key Management in Dynamic Wireless Sensor Networks”, IEEE Transactions on Information Forensics and Security, vol. 10, NO. 2, pp: 1556-6013 (Feb 2015).
- Dieynaba Mall, Karim Konate, Al-Sakib Khan Pathan “ECL-EKM: An Enhanced Certificateless Effective Key Management Protocol for Dynamic WSN”, NSysS 2017, Department of CSE, BUET, pp: 978-1-5090-3260-0, 2017.
- Jaewoo Choi, Jihyun Bang, Lee Hyung Kim, Mirim Ahn And Tae-kyoung Kwon “Location-Based Key Management Strong Against Insider Threats in Wireless Sensor Networks”, IEEE Systems Journals, vol. 11, Issue 2, pp: 494-502 (2017). doi: 10.1109/JSYST.2015.2422736
- Matthew Musson, “Attacking the Elliptic Curve Discrete Logarithm Problem”, Master of Science (Mathematics and Statistics) Thesis, Acadia University, Canada.
- S. Gaur, A.K. Mohapatra, R. Roges “An Efficient Certificateless Authentication Encryption for WSN Based on Clustering Algorithm”, International Journal of Applied Engineering Research, vol. 12, no. 14, pp: 4184-4190 (2017).
- Farooq Anhum “Location dependent key management in sensor networks without using deployment knowledge”, Springer-Verlag Berlin Heidelberg, pp: 1587-1600 (2013).
- G. Singh, Supriya, “A Study of encryption algorithms (RSA, DES, 3DES and AES) for Information Security”, International Journal of Computer Applications, vol. 67, no. 19, pp. 33-38 (April 2013). doi: 10.5120/11507-7224
- O. Cheikhrouhou, “Secure Group Communication in Wireless Sensor Networks: A survey”, Journal of Network and Computer Applications, Vol. 61, pp. 115-132 (2016). doi: 10.1016/j.jnca.2015.10.011
- Y. Liu, J. Li, and M. Guizani, “PKC based broadcast authentication using signature amortization for WSNs,” IEEE Transactions on Wireless Communications, vol. 11, no. 6, pp. 2106–2115 (2016).
- M. Zhou, M. Zhang, C. Wang, and B. Yang, “Cclas: A practical and compact certificateless aggregate signature with share extraction,” International Journal of Network Security, vol. 16, no. 2, pp. 157-164 (2014).
- D. He, M. Khan, and S. Wu, “On the security of a rsa-based certificateless signature scheme,” International Journal of Network Security, vol. 15, no. 6, pp. 408-410 (2013).
- P. Gong and P. Li, “Further improvement of a certificate-less signature scheme without pairing,” International Journal of Communication Systems, vol. 27, no. 10, pp. 2083-2091 (2014). doi: 10.1002/dac.2457
- J. Tsai, N. Lo, and T. Wu, “Weaknesses and improvements of an efficient certificate-less signature scheme without using bilinear pairings”, International Journal of Communication Systems, vol. 27, no. 7, pp. 1083-090 (2014). doi: 10.1002/dac.2388
- P. Sruthi, S. Jhansi Rani, “Implementation of Asymmetric Security Module in NS2”, International Journal of Advanced Technology and Innovative Research, vol. 9, Issue 1, pp: 0156-0161 (2017).
- Kakelli Anil Kumar, Addepalli V. N. Krishna & K. Shahu Chatrapati, New secure routing protocol with elliptic curve cryptography for military heterogeneous wireless sensor networks, Journal of Information and Optimization Sciences, 38:2, 341-365 (2017 ), DOI: 10.1080/02522667.2016. doi: 10.1080/02522667.2016.1220092
- K. Lingaraj, Rajashree V. Biradar & V. C. Patil, OMMIP: An optimized multiple mobile agents itinerary planning for wireless sensor networks, Journal of Information and Optimization Sciences, 38:6, 1067-1076 (2017 ), DOI: 10.1080/02522667.2017. doi: 10.1080/02522667.2017.1374740
- Addepalli V. N. Krishna, A big–data security mechanism based on fully homomorphic encryption using cubic spline curve public key cryptography, Journal of Information and Optimization Sciences, 39:6, 1387-1399 (2018 ), DOI: 10.1080/02522667.2018. doi: 10.1080/02522667.2018.1507762