An one-time pad cryptographic algorithm with Huffman Source Coding based energy aware sensor node design
Recently, the security-based algorithms for energy-constrained sensor nodes are being developed to consume less energy for computation as well as communication. For the mission critical wireless sensor network (WSN) applications, continuous and secure data collection from WSN nodes is an essential t...
Saved in:
| Published in: | Sustainable computing informatics and systems Vol. 44; p. 101048 |
|---|---|
| Main Authors: | , |
| Format: | Journal Article |
| Language: | English |
| Published: |
Elsevier Inc
01.12.2024
|
| Subjects: | |
| ISSN: | 2210-5379 |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Abstract | Recently, the security-based algorithms for energy-constrained sensor nodes are being developed to consume less energy for computation as well as communication. For the mission critical wireless sensor network (WSN) applications, continuous and secure data collection from WSN nodes is an essential task on the deployed field. Therefore, in this manuscript, One-Time Pad Cryptographic Algorithm with Huffman Source Coding Based Energy Aware sensor node Design is proposed (EA-SND-OTPCA-HSC). Before transmission, the distance among transmitter and receiver is rated available in mission critical WSN for lessen communication energy consume of sensor node. For the mission critical WSN applications, continuous and secure data collection from WSN nodes is an essential task on the deployed field. The periodic sleep/wake up scheme with Huffman source coding algorithm is used to save energy at the node level. Then, one-time pad cryptographic algorithm in each sensor node, the vernam cipher encryption technique is applied to the compact payload. The proposed technique is executed and efficacy of proposed method is assessed using Payload Vs Energy consume for one sensor node, communication energy consume for one sensor node with different distances, energy consume for one sensor node under various methods, Throughput, delay and Jitter are analyzed. Then the proposed method provides 90.12 %, 89.78 % and 91.78 % lower delay and 88.25 %, 95.34 % and 94.12 % lesser energy consumption comparing to the existing EA-SND-Hyb-MG-CUF, EA-SND-PVEH and EA-SND-PIA techniques respectively.
•Security-based algorithms for energy-constrained sensor nodes develop.•The distance between the transmitter and receiver is rated.•The sleep/wake up scheme with Huffman Source Coding algorithm is used.•The venom cipher encryption technique is applied to the compact payload.•The proposed method is implemented and the efficiency of the proposed. |
|---|---|
| AbstractList | Recently, the security-based algorithms for energy-constrained sensor nodes are being developed to consume less energy for computation as well as communication. For the mission critical wireless sensor network (WSN) applications, continuous and secure data collection from WSN nodes is an essential task on the deployed field. Therefore, in this manuscript, One-Time Pad Cryptographic Algorithm with Huffman Source Coding Based Energy Aware sensor node Design is proposed (EA-SND-OTPCA-HSC). Before transmission, the distance among transmitter and receiver is rated available in mission critical WSN for lessen communication energy consume of sensor node. For the mission critical WSN applications, continuous and secure data collection from WSN nodes is an essential task on the deployed field. The periodic sleep/wake up scheme with Huffman source coding algorithm is used to save energy at the node level. Then, one-time pad cryptographic algorithm in each sensor node, the vernam cipher encryption technique is applied to the compact payload. The proposed technique is executed and efficacy of proposed method is assessed using Payload Vs Energy consume for one sensor node, communication energy consume for one sensor node with different distances, energy consume for one sensor node under various methods, Throughput, delay and Jitter are analyzed. Then the proposed method provides 90.12 %, 89.78 % and 91.78 % lower delay and 88.25 %, 95.34 % and 94.12 % lesser energy consumption comparing to the existing EA-SND-Hyb-MG-CUF, EA-SND-PVEH and EA-SND-PIA techniques respectively.
•Security-based algorithms for energy-constrained sensor nodes develop.•The distance between the transmitter and receiver is rated.•The sleep/wake up scheme with Huffman Source Coding algorithm is used.•The venom cipher encryption technique is applied to the compact payload.•The proposed method is implemented and the efficiency of the proposed. |
| ArticleNumber | 101048 |
| Author | Paramasivan, B. Saravanaselvan, A. |
| Author_xml | – sequence: 1 givenname: A. orcidid: 0000-0002-5918-9456 surname: Saravanaselvan fullname: Saravanaselvan, A. email: asselvan1981@gmail.com organization: Department of Electronics and Communication Engineering, National Engineering College, K.R.Nagar Post, Thoothukudi District, Kovilpatti, Tamil Nadu, India – sequence: 2 givenname: B. surname: Paramasivan fullname: Paramasivan, B. email: bparamasivan@yahoo.co.in organization: Department of Information Technology, National Engineering College, K.R. Nagar Post, Thoothukudi District, Kovilpatti, Tamil Nadu, India |
| BookMark | eNp9kMtqwzAQRbVIoWmaP-hCP-BUkm3Z3hRC6AsCXbRdC2U0chRiyUhOQ_6-Du66s5iBC_cwnDsy88EjIQ-crTjj8vGwSqcEoVsJJoprxIp6RuZCcJaVedXckmVKBzZOKXmTF3OyX3s6MrLBdUh7bSjESz-ENup-74DqYxuiG_YdPY-bvp2s7bSnn-EUAekmGOdbutMJDUWPsb1QfdYRaUKfQqQ-GKQGk2v9Pbmx-phw-XcX5Pvl-Wvzlm0_Xt83620GoiyHDGsGTV2ZHDmUlstaWiZ2O6g0A1ZxYYWuKia1ANRW141ElFoWVV4YyaE2-YIUExdiSCmiVX10nY4XxZm6SlIHNUlSV0lqkjTWnqYajr_9OIwqgUMPaFxEGJQJ7n_AL0VSd44 |
| Cites_doi | 10.1109/I2MTC.2012.6229385 10.3233/JIFS-169670 10.3233/JIFS-169946 10.1023/B:VLSI.0000040424.11334.34 10.1109/TIM.2013.2245181 10.1016/j.engappai.2016.10.014 10.3390/s20123604 10.1016/j.asoc.2021.107473 10.1002/dac.4234 10.1016/j.sna.2020.112039 10.1016/j.asoc.2022.109442 10.1007/s11042-019-07765-0 10.1007/s11276-022-02917-x 10.1007/s12652-020-02020-z 10.3390/jsan4020067 10.1007/s12652-019-01481-1 10.1142/S1793962321500100 10.1007/s11063-021-10525-7 10.3390/s21020548 10.22247/ijcna/2020/196041 10.15866/irecap.v7i5.11852 10.1049/iet-com.2019.0359 10.3390/s22072598 10.1109/ACCESS.2021.3068830 10.1109/TNET.2020.2971770 10.1007/s00034-021-01850-2 10.53106/160792642021112206008 10.3233/JIFS-169923 10.1016/j.future.2010.09.006 |
| ContentType | Journal Article |
| Copyright | 2024 Elsevier Inc. |
| Copyright_xml | – notice: 2024 Elsevier Inc. |
| DBID | AAYXX CITATION |
| DOI | 10.1016/j.suscom.2024.101048 |
| DatabaseName | CrossRef |
| DatabaseTitle | CrossRef |
| DatabaseTitleList | |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| ExternalDocumentID | 10_1016_j_suscom_2024_101048 S2210537924000933 |
| GroupedDBID | --K --M .~1 0R~ 1~. 4.4 457 4G. 7-5 8P~ AACTN AAEDT AAEDW AAHCO AAIKJ AAKOC AALRI AAOAW AAQFI AARJD AAXKI AAXUO AAYFN ABBOA ABMAC ABWVN ABXDB ACDAQ ACGFS ACNNM ACRLP ACRPL ACZNC ADBBV ADEZE ADMUD ADNMO AEBSH AEKER AFJKZ AFKWA AFTJW AGHFR AGUBO AGYEJ AHZHX AIALX AIEXJ AIKHN AITUG AJOXV ALMA_UNASSIGNED_HOLDINGS AMFUW AMRAJ AOUOD AXJTR BELTK BKOJK BLXMC EBS EFJIC EJD FDB FIRID FNPLU FYGXN GBLVA GBOLZ HZ~ J1W JARJE KOM M41 MO0 N9A O-L O9- OAUVE P-8 P-9 PC. Q38 RIG ROL SDF SES SPC SPCBC SSR SSV SSZ T5K ~G- AATTM AAYWO AAYXX ABJNI ACLOT AEIPS AIIUN ANKPU APXCP CITATION EFKBS EFLBG ~HD |
| ID | FETCH-LOGICAL-c255t-e80c987d3e1c5f1686f02bbc7a0c0712f2a7706a2ceafa896ee6a64734d61c8d3 |
| ISICitedReferencesCount | 1 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=001355869000001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 2210-5379 |
| IngestDate | Sat Nov 29 02:53:03 EST 2025 Sat Dec 28 15:51:30 EST 2024 |
| IsPeerReviewed | false |
| IsScholarly | true |
| Keywords | One-time pad with Huffman Source Coding source coding Wireless sensor network Energy consumption Cryptography Information security |
| Language | English |
| LinkModel | OpenURL |
| MergedId | FETCHMERGED-LOGICAL-c255t-e80c987d3e1c5f1686f02bbc7a0c0712f2a7706a2ceafa896ee6a64734d61c8d3 |
| ORCID | 0000-0002-5918-9456 |
| ParticipantIDs | crossref_primary_10_1016_j_suscom_2024_101048 elsevier_sciencedirect_doi_10_1016_j_suscom_2024_101048 |
| PublicationCentury | 2000 |
| PublicationDate | December 2024 2024-12-00 |
| PublicationDateYYYYMMDD | 2024-12-01 |
| PublicationDate_xml | – month: 12 year: 2024 text: December 2024 |
| PublicationDecade | 2020 |
| PublicationTitle | Sustainable computing informatics and systems |
| PublicationYear | 2024 |
| Publisher | Elsevier Inc |
| Publisher_xml | – name: Elsevier Inc |
| References | Rajesh, Shajin, Kumaran (bib12) 2022; 15 H. Sun, Y. Qian, R. Yan, 2012, Design and realization of an intelligent sensor node with its application in energy-aware WSNs. In 2012 IEEE International Instrumentation and Measurement Technology Conference Proceedings (pp. 941-946). (2012) IEEE.. Venkatesh, Raj, Kannan (bib23) 2019; 36 Shajin, Rajesh, Nagoji Rao (bib7) 2022 Rahim, Murugan, Priya, Magesh, Manikandan (bib6) 2020; 7 Kanoun, Bradai, Khriji, Bouattour, Houssaini, Ben Ammar, Naifar, Bouhamed, Derbel, Viehweger (bib32) 2021; 21 Yan, Sun, Qian (bib39) 2013; 62 Sajan, Christopher, Kavitha, Akhila (bib15) 2022; 28 Wang, Zhao, Luo, Zhao, Yang, Jiang, Maeda (bib30) 2020; 310 Dowlatshahi, Kuchaki Rafsanjani, Gupta (bib20) 2021; 108 Rajesh, Shajin, Kannayeram (bib4) 2022; 128 Wang (bib27) 2019; 79 Shahbazi, Byun (bib11) 2020; 20 Sun, Rehfeldt, Brazil, Thomas, Halgamuge (bib31) 2020; 28 Qazi, Qureshi, Bashir, Islam, Iqbal, Arshad (bib34) 2021; 12 Sarrigeorgidis, Rabaey (bib28) 2004; 38 Kardi, Zagrouba (bib33) 2021; 1 Sharma, Vashisht, Singh (bib5) 2020; 14 Pichumani, Sundararajan, Dhanaraj, Nam, Kadry (bib36) 2021; 22 Madhawa, Balakrishnan (bib26) 2019; 36 Fotohi, Firoozi Bari, Yusefi (bib38) 2020; 33 Mishra, Roy, Mukherjee, De, Ghosh, Buyya (bib1) 2019; 11 Wong, Chen, Chin (bib9) 2015; 4 Nagaraju, Gudino, Tripathi, Sreejith, Ramesha (bib29) 2021; 33 Burhan, Ibrahim, Jebur, Zahra, Salih, Jaleel (bib37) 2021; 9 Hajiee, Fartash, Osati Eraghi (bib16) 2021; 53 Sahu, Pattanayak (bib17) 2017; 7 Balakrishnan, Somasundaram (bib25) 2011; 27 Hriez, Almajali, Elgala, Ayyash, Salameh (bib2) 2021 Shajin, Rajesh, Raja (bib10) 2022; 41 Uppalapati (bib21) 2020; 19 Liang, Durrani, Koh, Liang, Li, Wang (bib22) 2021; 9 Sakib, Drieberg, Sarang, Aziz, Hang, Stojanović (bib8) 2022; 22 Mann, Singh (bib13) 2017; 57 Hakim, Abid, Atitallah, Loukil, BenSalah (bib18) 2019; 17 Madhawa, Balakrishnan (bib24) 2018; 35 Mehta, Saxena (bib3) 2020; 28 Mujeeb, Praveen Sam, Madhavi (bib19) 2021; 12 Gupta (bib35) 2021; 8 Ghosh, Mohanty, Pattnaik, Pramanik (bib14) 2021; 13 Burhan (10.1016/j.suscom.2024.101048_bib37) 2021; 9 Ghosh (10.1016/j.suscom.2024.101048_bib14) 2021; 13 Pichumani (10.1016/j.suscom.2024.101048_bib36) 2021; 22 Mishra (10.1016/j.suscom.2024.101048_bib1) 2019; 11 10.1016/j.suscom.2024.101048_bib40 Shahbazi (10.1016/j.suscom.2024.101048_bib11) 2020; 20 Balakrishnan (10.1016/j.suscom.2024.101048_bib25) 2011; 27 Liang (10.1016/j.suscom.2024.101048_bib22) 2021; 9 Qazi (10.1016/j.suscom.2024.101048_bib34) 2021; 12 Sajan (10.1016/j.suscom.2024.101048_bib15) 2022; 28 Rajesh (10.1016/j.suscom.2024.101048_bib4) 2022; 128 Rahim (10.1016/j.suscom.2024.101048_bib6) 2020; 7 Sharma (10.1016/j.suscom.2024.101048_bib5) 2020; 14 Hajiee (10.1016/j.suscom.2024.101048_bib16) 2021; 53 Madhawa (10.1016/j.suscom.2024.101048_bib24) 2018; 35 Kardi (10.1016/j.suscom.2024.101048_bib33) 2021; 1 Shajin (10.1016/j.suscom.2024.101048_bib10) 2022; 41 Uppalapati (10.1016/j.suscom.2024.101048_bib21) 2020; 19 Rajesh (10.1016/j.suscom.2024.101048_bib12) 2022; 15 Wong (10.1016/j.suscom.2024.101048_bib9) 2015; 4 Hakim (10.1016/j.suscom.2024.101048_bib18) 2019; 17 Sun (10.1016/j.suscom.2024.101048_bib31) 2020; 28 Madhawa (10.1016/j.suscom.2024.101048_bib26) 2019; 36 Sakib (10.1016/j.suscom.2024.101048_bib8) 2022; 22 Yan (10.1016/j.suscom.2024.101048_bib39) 2013; 62 Wang (10.1016/j.suscom.2024.101048_bib30) 2020; 310 Venkatesh (10.1016/j.suscom.2024.101048_bib23) 2019; 36 Sarrigeorgidis (10.1016/j.suscom.2024.101048_bib28) 2004; 38 Hriez (10.1016/j.suscom.2024.101048_bib2) 2021 Gupta (10.1016/j.suscom.2024.101048_bib35) 2021; 8 Nagaraju (10.1016/j.suscom.2024.101048_bib29) 2021; 33 Kanoun (10.1016/j.suscom.2024.101048_bib32) 2021; 21 Fotohi (10.1016/j.suscom.2024.101048_bib38) 2020; 33 Shajin (10.1016/j.suscom.2024.101048_bib7) 2022 Mujeeb (10.1016/j.suscom.2024.101048_bib19) 2021; 12 Dowlatshahi (10.1016/j.suscom.2024.101048_bib20) 2021; 108 Mann (10.1016/j.suscom.2024.101048_bib13) 2017; 57 Sahu (10.1016/j.suscom.2024.101048_bib17) 2017; 7 Mehta (10.1016/j.suscom.2024.101048_bib3) 2020; 28 Wang (10.1016/j.suscom.2024.101048_bib27) 2019; 79 |
| References_xml | – volume: 62 start-page: 1183 year: 2013 end-page: 1191 ident: bib39 article-title: Energy-aware sensor node design with its application in wireless sensor networks publication-title: IEEE Trans. Instrum. Meas. – volume: 36 start-page: 2355 year: 2019 end-page: 2366 ident: bib26 article-title: Roll forward validation based decision tree classification for detecting data integrity attacks in industrial internet of things publication-title: Journal of Intelligent & Fuzzy Systems – volume: 4 start-page: 67 year: 2015 end-page: 153 ident: bib9 article-title: Directional Medium Access Control (MAC) protocols in wireless ad hoc and sensor networks: a survey publication-title: J. Sens. Actuator Netw. – volume: 27 start-page: 265 year: 2011 end-page: 279 ident: bib25 article-title: SLA enabled CARE resource broker publication-title: Future Generation Computer Systems – volume: 33 year: 2020 ident: bib38 article-title: Securing wireless sensor networks against denial-of-sleep attacks using RSA cryptography algorithm and interlock protocol publication-title: Int. J. Commun. Syst. – start-page: 1 year: 2021 end-page: 12 ident: bib2 article-title: A novel trust-aware and energy-aware clustering method that uses stochastic fractal search in IoT-enabled wireless sensor networks publication-title: IEEE Syst. J. – volume: 128 year: 2022 ident: bib4 article-title: A novel intelligent technique for energy management in smart home using internet of things publication-title: Appl. Soft Comput. – start-page: 1 year: 2022 end-page: 8 ident: bib7 article-title: Efficient Framework for Brain Tumour Classification using Hierarchical Deep Learning Neural Network Classifier publication-title: Comput. Methods Biomech. Biomed. Eng.: Imaging Vis. – volume: 41 start-page: 1751 year: 2022 end-page: 1774 ident: bib10 article-title: An efficient VLSI architecture for fast motion estimation exploiting zero motion prejudgment technique and a new quadrant-based search algorithm in HEVC publication-title: Circuits, Syst., Signal Process. – volume: 33 start-page: 608 year: 2021 end-page: 618 ident: bib29 article-title: Mobility assisted localization for mission critical Wireless Sensor Network applications using hybrid area exploration approach publication-title: J. King Saud. Univ. - Comput. Inf. Sci. – volume: 22 start-page: 2598 year: 2022 ident: bib8 article-title: Energy-Aware QoS MAC protocol based on prioritized-data and multi-hop routing for wireless sensor networks publication-title: Sensors – volume: 9 start-page: 49457 year: 2021 end-page: 49466 ident: bib22 article-title: IEEE access special section editorial: mission-critical sensors and sensor networks (MC-SSN) publication-title: IEEE Access – volume: 20 start-page: 3604 year: 2020 ident: bib11 article-title: Towards a Secure Thermal-Energy Aware Routing Protocol in Wireless Body Area Network Based on Blockchain Technology publication-title: Sensors – volume: 28 start-page: 1439 year: 2022 end-page: 1455 ident: bib15 article-title: An energy aware secure three-level weighted trust evaluation and grey wolf optimization based routing in wireless ad hoc sensor network publication-title: Wirel. Netw. – volume: 35 start-page: 1267 year: 2018 end-page: 1279 ident: bib24 article-title: Employing invariants for anomaly detection in software defined networking based industrial internet of things publication-title: Journal of Intelligent & Fuzzy Systems – volume: 310 year: 2020 ident: bib30 article-title: System level design of wireless sensor node powered by piezoelectric vibration energy harvesting publication-title: Sens. Actuators A: Phys. – volume: 36 start-page: 2117 year: 2019 end-page: 2124 ident: bib23 article-title: Precision centric framework for activity recognition using Dempster Shaffer theory and information fusion algorithm in smart environment publication-title: Journal of Intelligent & Fuzzy Systems – volume: 8 start-page: 67 year: 2021 end-page: 78 ident: bib35 article-title: Elliptic curve cryptography based secure image transmission in clustered wireless sensor networks publication-title: Int. J. Comput. Netw. Appl. – volume: 11 start-page: 3155 year: 2019 end-page: 3173 ident: bib1 article-title: An energy-aware multi-sensor geo-fog paradigm for mission critical applications publication-title: J. Ambient Intell. Humaniz. Comput. – volume: 7 start-page: 423 year: 2017 ident: bib17 article-title: Quality of service based multicasting routing protocols for MANETs: a survey publication-title: Int. J. Commun. Antenna Propag. (IRECAP) – volume: 108 year: 2021 ident: bib20 article-title: An energy aware grouping memetic algorithm to schedule the sensing activity in WSNs-based IoT for smart cities publication-title: Appl. Soft Comput. – volume: 14 start-page: 1199 year: 2020 end-page: 1208 ident: bib5 article-title: WOATCA: A secure and energy aware scheme based on whale optimisation in clustered wireless sensor networks publication-title: IET Commun. – volume: 17 start-page: 4 year: 2019 ident: bib18 article-title: An efficient Sw/Hw architecture for cooperative transmission in wireless sensor networks publication-title: Int. J. Wirel. Mob. Comput. – volume: 57 start-page: 142 year: 2017 end-page: 152 ident: bib13 article-title: Improved metaheuristic based energy-efficient clustering protocol for wireless sensor networks publication-title: Eng. Appl. Artif. Intell. – reference: H. Sun, Y. Qian, R. Yan, 2012, Design and realization of an intelligent sensor node with its application in energy-aware WSNs. In 2012 IEEE International Instrumentation and Measurement Technology Conference Proceedings (pp. 941-946). (2012) IEEE.. – volume: 28 year: 2020 ident: bib3 article-title: MCH-EOR: multi-objective cluster head based energy-aware optimized routing algorithm in wireless sensor networks publication-title: Sustain. Comput.: Inform. Syst. – volume: 13 start-page: 72 year: 2021 end-page: 88 ident: bib14 article-title: A novel performance evaluation of resourceful energy saving protocols of heterogeneous WSN to maximize network stability and lifetime publication-title: Int. J. Interdiscip. Telecommun. Netw. – volume: 21 start-page: 548 year: 2021 ident: bib32 article-title: Energy-aware system design for autonomous wireless sensor nodes: A comprehensive review publication-title: Sensors – volume: 15 year: 2022 ident: bib12 article-title: An efficient IWOLRS control technique of brushless DC motor for torque ripple minimization publication-title: Appl. Sci. Eng. Prog. – volume: 22 start-page: 1287 year: 2021 end-page: 1297 ident: bib36 article-title: Ruzicka indexed regressive homomorphic ephemeral key benaloh cryptography for secure data aggregation in WSN publication-title: J. Internet Technol. – volume: 12 start-page: 547 year: 2021 end-page: 566 ident: bib34 article-title: Security protocol using elliptic curve cryptography algorithm for wireless sensor networks publication-title: J. Ambient Intell. Humaniz. Comput. – volume: 38 start-page: 115 year: 2004 end-page: 130 ident: bib28 article-title: Ultra low power CORDIC processor for wireless communication algorithms publication-title: J. VLSI Signal Process. -Syst. Signal, Image, Video Technol. – volume: 28 start-page: 681 year: 2020 end-page: 694 ident: bib31 article-title: A physarum-inspired algorithm for minimum-cost relay node placement in wireless sensor networks publication-title: IEEE/ACM Trans. Netw. – volume: 19 start-page: 391 year: 2020 end-page: 397 ident: bib21 article-title: Energy-efficient heterogeneous optimization routing protocol for wireless sensor network publication-title: Instrum. Mes. Métrologie – volume: 12 start-page: 2150010 year: 2021 ident: bib19 article-title: Energy- and trust-aware secure routing algorithm for big data classification using MapReduce framework in IoT networks publication-title: Int. J. Model., Simul., Sci. Comput. – volume: 1 start-page: 643 year: 2021 end-page: 657 ident: bib33 article-title: Hybrid cryptography algorithm for secure data communication in WSNs: DECRSA publication-title: Congress on Intelligent Systems: Proceedings of CIS 2020 – volume: 79 start-page: 35369 year: 2019 end-page: 35382 ident: bib27 article-title: Multimedia data compression storage of sensor network based on improved Huffman coding algorithm in cloud publication-title: Multimed. Tools Appl. – volume: 53 start-page: 2829 year: 2021 end-page: 2852 ident: bib16 article-title: An energy-aware trust and opportunity based routing algorithm in wireless sensor networks using multipath routes technique publication-title: Neural Process. Lett. – volume: 7 start-page: 93 year: 2020 ident: bib6 article-title: Taylor Based Grey Wolf Optimization Algorithm (TGWOA) For Energy Aware Secure Routing Protocol publication-title: Int. J. Comput. Netw. Application – volume: 9 start-page: 1159 year: 2021 end-page: 1165 ident: bib37 article-title: Secure wireless sensor network using cryptographic technique based hybrid genetic firefly algorithm publication-title: Period. Eng. Nat. Sci. – ident: 10.1016/j.suscom.2024.101048_bib40 doi: 10.1109/I2MTC.2012.6229385 – volume: 8 start-page: 67 issue: 1 year: 2021 ident: 10.1016/j.suscom.2024.101048_bib35 article-title: Elliptic curve cryptography based secure image transmission in clustered wireless sensor networks publication-title: Int. J. Comput. Netw. Appl. – volume: 35 start-page: 1267 issue: 2 year: 2018 ident: 10.1016/j.suscom.2024.101048_bib24 article-title: Employing invariants for anomaly detection in software defined networking based industrial internet of things publication-title: Journal of Intelligent & Fuzzy Systems doi: 10.3233/JIFS-169670 – volume: 36 start-page: 2355 issue: 3 year: 2019 ident: 10.1016/j.suscom.2024.101048_bib26 article-title: Roll forward validation based decision tree classification for detecting data integrity attacks in industrial internet of things publication-title: Journal of Intelligent & Fuzzy Systems doi: 10.3233/JIFS-169946 – volume: 38 start-page: 115 issue: 2 year: 2004 ident: 10.1016/j.suscom.2024.101048_bib28 article-title: Ultra low power CORDIC processor for wireless communication algorithms publication-title: J. VLSI Signal Process. -Syst. Signal, Image, Video Technol. doi: 10.1023/B:VLSI.0000040424.11334.34 – volume: 62 start-page: 1183 issue: 5 year: 2013 ident: 10.1016/j.suscom.2024.101048_bib39 article-title: Energy-aware sensor node design with its application in wireless sensor networks publication-title: IEEE Trans. Instrum. Meas. doi: 10.1109/TIM.2013.2245181 – volume: 57 start-page: 142 year: 2017 ident: 10.1016/j.suscom.2024.101048_bib13 article-title: Improved metaheuristic based energy-efficient clustering protocol for wireless sensor networks publication-title: Eng. Appl. Artif. Intell. doi: 10.1016/j.engappai.2016.10.014 – volume: 20 start-page: 3604 issue: 12 year: 2020 ident: 10.1016/j.suscom.2024.101048_bib11 article-title: Towards a Secure Thermal-Energy Aware Routing Protocol in Wireless Body Area Network Based on Blockchain Technology publication-title: Sensors doi: 10.3390/s20123604 – volume: 108 year: 2021 ident: 10.1016/j.suscom.2024.101048_bib20 article-title: An energy aware grouping memetic algorithm to schedule the sensing activity in WSNs-based IoT for smart cities publication-title: Appl. Soft Comput. doi: 10.1016/j.asoc.2021.107473 – volume: 33 issue: 4 year: 2020 ident: 10.1016/j.suscom.2024.101048_bib38 article-title: Securing wireless sensor networks against denial-of-sleep attacks using RSA cryptography algorithm and interlock protocol publication-title: Int. J. Commun. Syst. doi: 10.1002/dac.4234 – volume: 310 year: 2020 ident: 10.1016/j.suscom.2024.101048_bib30 article-title: System level design of wireless sensor node powered by piezoelectric vibration energy harvesting publication-title: Sens. Actuators A: Phys. doi: 10.1016/j.sna.2020.112039 – volume: 128 year: 2022 ident: 10.1016/j.suscom.2024.101048_bib4 article-title: A novel intelligent technique for energy management in smart home using internet of things publication-title: Appl. Soft Comput. doi: 10.1016/j.asoc.2022.109442 – volume: 79 start-page: 35369 issue: 47-48 year: 2019 ident: 10.1016/j.suscom.2024.101048_bib27 article-title: Multimedia data compression storage of sensor network based on improved Huffman coding algorithm in cloud publication-title: Multimed. Tools Appl. doi: 10.1007/s11042-019-07765-0 – volume: 13 start-page: 72 issue: 2 year: 2021 ident: 10.1016/j.suscom.2024.101048_bib14 article-title: A novel performance evaluation of resourceful energy saving protocols of heterogeneous WSN to maximize network stability and lifetime publication-title: Int. J. Interdiscip. Telecommun. Netw. – volume: 28 year: 2020 ident: 10.1016/j.suscom.2024.101048_bib3 article-title: MCH-EOR: multi-objective cluster head based energy-aware optimized routing algorithm in wireless sensor networks publication-title: Sustain. Comput.: Inform. Syst. – volume: 19 start-page: 391 issue: 5 year: 2020 ident: 10.1016/j.suscom.2024.101048_bib21 article-title: Energy-efficient heterogeneous optimization routing protocol for wireless sensor network publication-title: Instrum. Mes. Métrologie – volume: 33 start-page: 608 issue: 5 year: 2021 ident: 10.1016/j.suscom.2024.101048_bib29 article-title: Mobility assisted localization for mission critical Wireless Sensor Network applications using hybrid area exploration approach publication-title: J. King Saud. Univ. - Comput. Inf. Sci. – volume: 28 start-page: 1439 issue: 4 year: 2022 ident: 10.1016/j.suscom.2024.101048_bib15 article-title: An energy aware secure three-level weighted trust evaluation and grey wolf optimization based routing in wireless ad hoc sensor network publication-title: Wirel. Netw. doi: 10.1007/s11276-022-02917-x – volume: 12 start-page: 547 year: 2021 ident: 10.1016/j.suscom.2024.101048_bib34 article-title: Security protocol using elliptic curve cryptography algorithm for wireless sensor networks publication-title: J. Ambient Intell. Humaniz. Comput. doi: 10.1007/s12652-020-02020-z – volume: 1 start-page: 643 year: 2021 ident: 10.1016/j.suscom.2024.101048_bib33 article-title: Hybrid cryptography algorithm for secure data communication in WSNs: DECRSA – volume: 4 start-page: 67 issue: 2 year: 2015 ident: 10.1016/j.suscom.2024.101048_bib9 article-title: Directional Medium Access Control (MAC) protocols in wireless ad hoc and sensor networks: a survey publication-title: J. Sens. Actuator Netw. doi: 10.3390/jsan4020067 – volume: 17 start-page: 4 year: 2019 ident: 10.1016/j.suscom.2024.101048_bib18 article-title: An efficient Sw/Hw architecture for cooperative transmission in wireless sensor networks publication-title: Int. J. Wirel. Mob. Comput. – volume: 11 start-page: 3155 issue: 8 year: 2019 ident: 10.1016/j.suscom.2024.101048_bib1 article-title: An energy-aware multi-sensor geo-fog paradigm for mission critical applications publication-title: J. Ambient Intell. Humaniz. Comput. doi: 10.1007/s12652-019-01481-1 – start-page: 1 year: 2021 ident: 10.1016/j.suscom.2024.101048_bib2 article-title: A novel trust-aware and energy-aware clustering method that uses stochastic fractal search in IoT-enabled wireless sensor networks publication-title: IEEE Syst. J. – volume: 12 start-page: 2150010 issue: 02 year: 2021 ident: 10.1016/j.suscom.2024.101048_bib19 article-title: Energy- and trust-aware secure routing algorithm for big data classification using MapReduce framework in IoT networks publication-title: Int. J. Model., Simul., Sci. Comput. doi: 10.1142/S1793962321500100 – start-page: 1 year: 2022 ident: 10.1016/j.suscom.2024.101048_bib7 article-title: Efficient Framework for Brain Tumour Classification using Hierarchical Deep Learning Neural Network Classifier publication-title: Comput. Methods Biomech. Biomed. Eng.: Imaging Vis. – volume: 53 start-page: 2829 issue: 4 year: 2021 ident: 10.1016/j.suscom.2024.101048_bib16 article-title: An energy-aware trust and opportunity based routing algorithm in wireless sensor networks using multipath routes technique publication-title: Neural Process. Lett. doi: 10.1007/s11063-021-10525-7 – volume: 21 start-page: 548 issue: 2 year: 2021 ident: 10.1016/j.suscom.2024.101048_bib32 article-title: Energy-aware system design for autonomous wireless sensor nodes: A comprehensive review publication-title: Sensors doi: 10.3390/s21020548 – volume: 7 start-page: 93 issue: 4 year: 2020 ident: 10.1016/j.suscom.2024.101048_bib6 article-title: Taylor Based Grey Wolf Optimization Algorithm (TGWOA) For Energy Aware Secure Routing Protocol publication-title: Int. J. Comput. Netw. Applications doi: 10.22247/ijcna/2020/196041 – volume: 7 start-page: 423 issue: 5 year: 2017 ident: 10.1016/j.suscom.2024.101048_bib17 article-title: Quality of service based multicasting routing protocols for MANETs: a survey publication-title: Int. J. Commun. Antenna Propag. (IRECAP) doi: 10.15866/irecap.v7i5.11852 – volume: 14 start-page: 1199 issue: 8 year: 2020 ident: 10.1016/j.suscom.2024.101048_bib5 article-title: WOATCA: A secure and energy aware scheme based on whale optimisation in clustered wireless sensor networks publication-title: IET Commun. doi: 10.1049/iet-com.2019.0359 – volume: 15 issue: 3 year: 2022 ident: 10.1016/j.suscom.2024.101048_bib12 article-title: An efficient IWOLRS control technique of brushless DC motor for torque ripple minimization publication-title: Appl. Sci. Eng. Prog. – volume: 22 start-page: 2598 issue: 7 year: 2022 ident: 10.1016/j.suscom.2024.101048_bib8 article-title: Energy-Aware QoS MAC protocol based on prioritized-data and multi-hop routing for wireless sensor networks publication-title: Sensors doi: 10.3390/s22072598 – volume: 9 start-page: 49457 year: 2021 ident: 10.1016/j.suscom.2024.101048_bib22 article-title: IEEE access special section editorial: mission-critical sensors and sensor networks (MC-SSN) publication-title: IEEE Access doi: 10.1109/ACCESS.2021.3068830 – volume: 28 start-page: 681 issue: 2 year: 2020 ident: 10.1016/j.suscom.2024.101048_bib31 article-title: A physarum-inspired algorithm for minimum-cost relay node placement in wireless sensor networks publication-title: IEEE/ACM Trans. Netw. doi: 10.1109/TNET.2020.2971770 – volume: 41 start-page: 1751 issue: 3 year: 2022 ident: 10.1016/j.suscom.2024.101048_bib10 article-title: An efficient VLSI architecture for fast motion estimation exploiting zero motion prejudgment technique and a new quadrant-based search algorithm in HEVC publication-title: Circuits, Syst., Signal Process. doi: 10.1007/s00034-021-01850-2 – volume: 9 start-page: 1159 issue: 4 year: 2021 ident: 10.1016/j.suscom.2024.101048_bib37 article-title: Secure wireless sensor network using cryptographic technique based hybrid genetic firefly algorithm publication-title: Period. Eng. Nat. Sci. – volume: 22 start-page: 1287 issue: 6 year: 2021 ident: 10.1016/j.suscom.2024.101048_bib36 article-title: Ruzicka indexed regressive homomorphic ephemeral key benaloh cryptography for secure data aggregation in WSN publication-title: J. Internet Technol. doi: 10.53106/160792642021112206008 – volume: 36 start-page: 2117 issue: 3 year: 2019 ident: 10.1016/j.suscom.2024.101048_bib23 article-title: Precision centric framework for activity recognition using Dempster Shaffer theory and information fusion algorithm in smart environment publication-title: Journal of Intelligent & Fuzzy Systems doi: 10.3233/JIFS-169923 – volume: 27 start-page: 265 issue: 3 year: 2011 ident: 10.1016/j.suscom.2024.101048_bib25 article-title: SLA enabled CARE resource broker publication-title: Future Generation Computer Systems doi: 10.1016/j.future.2010.09.006 |
| SSID | ssj0000561934 |
| Score | 2.3125756 |
| Snippet | Recently, the security-based algorithms for energy-constrained sensor nodes are being developed to consume less energy for computation as well as... |
| SourceID | crossref elsevier |
| SourceType | Index Database Publisher |
| StartPage | 101048 |
| SubjectTerms | Cryptography Energy consumption Information security One-time pad with Huffman Source Coding source coding Wireless sensor network |
| Title | An one-time pad cryptographic algorithm with Huffman Source Coding based energy aware sensor node design |
| URI | https://dx.doi.org/10.1016/j.suscom.2024.101048 |
| Volume | 44 |
| WOSCitedRecordID | wos001355869000001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVESC databaseName: Elsevier SD Freedom Collection Journals 2021 issn: 2210-5379 databaseCode: AIEXJ dateStart: 20110301 customDbUrl: isFulltext: true dateEnd: 99991231 titleUrlDefault: https://www.sciencedirect.com omitProxy: false ssIdentifier: ssj0000561934 providerName: Elsevier |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lb9QwELaWLQcuvBHlJR-4rbJyEm9sHwMqKhwqJIq0t8ixHdrVNrtKsqX8e8Z2nE2hquiBSxRFu85jPs18M54HQu9jYG1SpSwCdk4jSrWOpEuwAdsgSEpJSSo3bIKdnPDlUnydTHahFuZyzeqaX12J7X8VNVwDYdvS2TuIe1gULsA5CB2OIHY4_pPgcyCAtYns0PjZVuqZan5tO9-Y2vZmXf_YNOfd2YWPwB7vqspG8b-5GD5oB1fjYk2bnhlfFih_2uSwFtzdTTOrN9oWWg1ZH6tQT7Ivw1JuToQvlekZcd8Iuh11R7dBHdlIO9K5Net-Nyqf73e0Gnkh27BN9WE-jk4kdJTp4ZRYAi5ltEj9wJigcSkdqczYeoT8Rm3uAwsrMCOtTe2x68_3P7_ePPsPozakGoYstlXhVynsKoVf5R46SNhC8Ck6yD8fLb8MwTnrVgmXkTA8fyi7dLmBfz_QzbRmRFVOH6OHvY-Bc4-NJ2hi6qfoUZjfgXt1_gyd5TUOUMEAFXwNKniACrZQwT1UsIcK9lDBDirYQwU7qGAPFWyhgj1UnqPvn45OPx5H_eSNSIGL2UWGEyU406mJ1aKKM55VJClLxSRRwEmTKpGMkUwmyshKcpEZk8mMspTqLFZcpy_QtIYXeIkwWJBEEA2svVK0BO8-LQWRYDZ4LHWZmEMUhQ9XbH2DleI2mR0iFr5u0ZNET_4KQM2t_3x1xzu9Rg_2iH6Dpl2zM2_RfXXZnbfNux4yvwF9UI1k |
| linkProvider | Elsevier |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=An+one-time+pad+cryptographic+algorithm+with+Huffman+Source+Coding+based+energy+aware+sensor+node+design&rft.jtitle=Sustainable+computing+informatics+and+systems&rft.au=Saravanaselvan%2C+A.&rft.au=Paramasivan%2C+B.&rft.date=2024-12-01&rft.issn=2210-5379&rft.volume=44&rft.spage=101048&rft_id=info:doi/10.1016%2Fj.suscom.2024.101048&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_suscom_2024_101048 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2210-5379&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2210-5379&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2210-5379&client=summon |