<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.1 20151215//EN" "http://jats.nlm.nih.gov/publishing/1.1/JATS-journalpublishing1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" article-type="research-article" dtd-version="1.1">
<front>
<journal-meta>
<journal-id journal-id-type="pmc">CMC</journal-id>
<journal-id journal-id-type="nlm-ta">CMC</journal-id>
<journal-id journal-id-type="publisher-id">CMC</journal-id>
<journal-title-group>
<journal-title>Computers, Materials &#x0026; Continua</journal-title>
</journal-title-group>
<issn pub-type="epub">1546-2226</issn>
<issn pub-type="ppub">1546-2218</issn>
<publisher>
<publisher-name>Tech Science Press</publisher-name>
<publisher-loc>USA</publisher-loc>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="publisher-id">28520</article-id>
<article-id pub-id-type="doi">10.32604/cmc.2022.028520</article-id>
<article-categories>
<subj-group subj-group-type="heading">
<subject>Article</subject>
</subj-group>
</article-categories>
<title-group>
<article-title>ESSD: Energy Saving and Securing Data Algorithm for WSNs Security</article-title>
<alt-title alt-title-type="left-running-head">ESSD: Energy Saving and Securing Data Algorithm for WSNs Security</alt-title>
<alt-title alt-title-type="right-running-head">ESSD: Energy Saving and Securing Data Algorithm for WSNs Security</alt-title>
</title-group>
<contrib-group content-type="authors">
<contrib id="author-1" contrib-type="author">
<name name-style="western"><surname>Aldaseen</surname><given-names>Manar M.</given-names></name>
<xref ref-type="aff" rid="aff-1">1</xref>
</contrib>
<contrib id="author-2" contrib-type="author">
<name name-style="western"><surname>Matrouk</surname><given-names>Khaled M.</given-names></name>
<xref ref-type="aff" rid="aff-1">1</xref>
</contrib>
<contrib id="author-3" contrib-type="author" corresp="yes">
<name name-style="western"><surname>Almazaydeh</surname><given-names>Laiali H.</given-names></name>
<xref ref-type="aff" rid="aff-2">2</xref><email>laiali.almazaydeh@ahu.edu.jo</email>
</contrib>
<contrib id="author-4" contrib-type="author">
<name name-style="western"><surname>Elleithy</surname><given-names>Khaled M.</given-names></name>
<xref ref-type="aff" rid="aff-3">3</xref>
</contrib>
<aff id="aff-1"><label>1</label><institution>Computer Engineering Department, Al-Hussein Bin Talal University</institution>, <addr-line>Ma&#x2019;an</addr-line>, <country>Jordan</country></aff>
<aff id="aff-2"><label>2</label><institution>Software Engineering Department, Al-Hussein Bin Talal University</institution>, <addr-line>Ma&#x2019;an</addr-line>, <country>Jordan</country></aff>
<aff id="aff-3"><label>3</label><institution>Computer Science and Engineering Department, University of Bridgeport</institution>, <addr-line>CT, Bridgeport</addr-line>, <country>USA</country></aff>
</contrib-group>
<author-notes>
<corresp id="cor1"><label>&#x002A;</label>Corresponding Author: Laiali H. Almazaydeh. Email: <email>laiali.almazaydeh@ahu.edu.jo</email></corresp>
</author-notes>
<pub-date pub-type="epub" date-type="pub" iso-8601-date="2022-06-14"><day>14</day>
<month>06</month>
<year>2022</year></pub-date>
<volume>73</volume>
<issue>2</issue>
<fpage>3969</fpage>
<lpage>3981</lpage>
<history>
<date date-type="received">
<day>11</day>
<month>2</month>
<year>2022</year>
</date>
<date date-type="accepted">
<day>17</day>
<month>4</month>
<year>2022</year>
</date>
</history>
<permissions>
<copyright-statement>&#x00A9; 2022 Aldaseen et al.</copyright-statement>
<copyright-year>2022</copyright-year>
<copyright-holder>Aldaseen et al.</copyright-holder>
<license xlink:href="https://creativecommons.org/licenses/by/4.0/">
<license-p>This work is licensed under a <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://creativecommons.org/licenses/by/4.0/">Creative Commons Attribution 4.0 International License</ext-link>, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.</license-p>
</license>
</permissions>
<self-uri content-type="pdf" xlink:href="TSP_CMC_28520.pdf"></self-uri>
<abstract>
<p>The Wireless Sensor Networks (WSNs) are characterized by their widespread deployment due to low cost, but the WSNs are vulnerable to various types of attacks. To defend against the attacks, an effective security solution is required. However, the limits of these networks&#x2019; battery-based energy to the sensor are the most critical impediments to selecting cryptographic techniques. Consequently, finding a suitable algorithm that achieves the least energy consumption in data encryption and decryption and providing a highly protected system for data remains the fundamental problem. In this research, the main objective is to obtain data security during transmission by proposing a robust and low-power encryption algorithm, in addition, to examining security algorithms such as ECC and MD5 based on previous studies. In this research, the Energy Saving and Securing Data algorithm (ESSD) algorithm is introduced, which provides the Message Digest 5 (MD5) computation simplicity by modifying the Elliptic Curve Cryptography (ECC) under the primary condition of power consumption. These three algorithms, ECC, MD5, and ESSD, are applied to Low Energy Adaptive Clustering Hierarchy (LEACH) and Threshold-sensitive Energy Efficient Sensor Network Protocol (TEEN) hierarchical routing algorithms which are considered the most widely used in WSNs. The results of security methods under the LEACH protocol show that all nodes are dead at 456, 496, and 496, respectively, to ECC, MD5, and ESSD. The results of security methods under the TEEN protocol show that the test ends at 3743, 4815, and 4889, respectively, to ECC, MD5, and ESSD. Based on these results, the ESSD outperforms better in terms of increased security and less power consumption. In addition, it is advantageous when applied to TEEN protocol.</p>
</abstract>
<kwd-group kwd-group-type="author">
<kwd>Cryptography</kwd>
<kwd>ECC</kwd>
<kwd>energy consumption</kwd>
<kwd>ESSD</kwd>
<kwd>LEACH</kwd>
<kwd>MD5</kwd>
<kwd>RSA</kwd>
<kwd>TEEN</kwd>
<kwd>WSNs</kwd>
</kwd-group>
</article-meta>
</front>
<body>
<sec id="s1">
<label>1</label>
<title>Introduction</title>
<p>Wireless Sensor Networks (WSNs) comprise hundreds or even a considerable number of tiny devices, each with detecting, handling, and correspondence abilities to screen present reality conditions. They have various applications with vastly varying sensing interactions with the environment. These applications range from basic military reconnaissance to woodland fire checking and climate observing sooner than later [<xref ref-type="bibr" rid="ref-1">1</xref>].</p>
<p>Sensor networks may consist of many different resource-constrained nodes (i.e., hardware, visual, infrared, radar, etc.). These nodes have restricted preparing ability, low stockpiling limit, obliged correspondence data transfer capacity, constrained vitality, and physical size of the sensor hubs. Because of these limitations, it is hard to utilize the customary security systems in WSNs. To upgrade the customary security calculations for WSNs, it is essential to know about the requirements of sensor hubs [<xref ref-type="bibr" rid="ref-2">2</xref>].</p>
<p>Notwithstanding customary security issues like secure directing and secure information collection, security instruments conveyed in WSNs likewise ought to include coordinated efforts among the hubs because of the decentralized idea of the systems and the nonappearance of any framework.</p>
<p>In the genuine universe of WSNs, the sensor hubs cannot be thought to be a reliable convent. The analysts in WSNs security have, in this way, centered around building a sensor trust strategy to tackle the issues which are past the capacities of conventional cryptographic systems. Since, as a rule, the sensor hubs are unattended and indeed shaky, weakness to physical assault is a significant issue in WSNs. Various recommendations exist in the literature for protection against a physical assault on sensor hubs. Structure and usage of secure WSNs is, in this manner, an especially testing task. Since these systems are typically conveyed in remote places and left unattended, they ought to be outfitted with security components to safeguard against assaults [<xref ref-type="bibr" rid="ref-3">3</xref>].</p>
<p>WSNs are vulnerable to various types of attacks. These attacks can be broadly categorized as follows [<xref ref-type="bibr" rid="ref-4">4</xref>]:</p>
<p>1) <bold>Attacks on privacy and authentication</bold>: standard cryptographic procedures can ensure the mystery and legitimacy of correspondence channels from pariah assaults, for example, spying, parcel replay assaults, and change or parodying of bundles.</p>
<p>2) <bold>Attacks on network availability</bold>: are regularly alluded to as DoS assaults. A secretive assault against administration: in a subtle assault, the aggressor&#x2019;s objective is to cause the system to acknowledge bogus information esteem. For instance, an assailant bargains a sensor hub and infuses bogus information esteem through that sensor hub.</p>
<p>Several algorithms were used to address the problem of information security in the WSNs [<xref ref-type="bibr" rid="ref-5">5</xref>,<xref ref-type="bibr" rid="ref-6">6</xref>]. These algorithms did not consider the amount of energy consumption in the sensor nodes. Energy is the most significant requirement for WSNs. Energy utilization in sensor hubs can be arranged in three sections: (I) Energy for the sensor transducer, (II) Energy for correspondence among sensor hubs, and (III) vitality for chip calculation. Accordingly, correspondence is costlier than calculation in WSNs [<xref ref-type="bibr" rid="ref-7">7</xref>]. Any message extension brought about by security components comes at a considerable expense. Consequently, finding the right algorithm that achieves the least energy consumption in data encryption and decryption and providing a highly protected system for data remains the key problem.</p>
<p>In this paper, the proposed algorithm provides a robust security technique and, at the same time, reduces the amount of energy consumption in the sensor nodes, which increases the lifetime of the wireless sensor network.</p>
<p>In this paper, the main contribution can be summarized as follows:
<list list-type="bullet">
<list-item>
<p>Improving the selection of keys of the encryption algorithm.</p></list-item>
<list-item>
<p>Improving the lifetime of the sensor.</p></list-item>
<list-item>
<p>Implementing a light-weight algorithm and at the same time, it should properly protect sensed data.</p></list-item>
<list-item>
<p>Mapping the results with other studies under identical conditions in the WSNs area.</p></list-item>
</list></p>
<p>This paper is organized as follows: Section 2 offers the related research. Section 3 describes the proposed methodology. Section 4 demonstrates the experimental results and evaluation. Section 5 summarizes how the research objectives are being achieved and future works.</p>
</sec>
<sec id="s2">
<label>2</label>
<title>Related Works</title>
<sec id="s2_1">
<label>2.1</label>
<title>Cryptography</title>
<p>WSNs are vulnerable to various types of attacks. These attacks can be broadly categorized. That lead to cryptography, a security system utilized to ensure WSNs against external attacks. It guarantees numerous security administrations, including integrity and verification by checking the information parcel source and its substance using cryptographic algorithms, which can be categorized into three classes, symmetric-key algorithms, asymmetric-key algorithms, and hash functions [<xref ref-type="bibr" rid="ref-8">8</xref>,<xref ref-type="bibr" rid="ref-9">9</xref>].</p>
<p>Knowledge about cryptography and its unique customization with WSNs case studies will provide the research community with the latest updates in cryptographic techniques and bring a new perspective to security, power consumption, and many other areas of high importance in WSNs [<xref ref-type="bibr" rid="ref-10">10</xref>].</p>
<p>It is difficult decision to decide which cryptographic techniques should be used, how often they are used, and which network performance metrics are used to evaluate the design and security analysis. The first choice may be, &#x201C;when does one use symmetric cryptography, and when does one use asymmetric cryptography?&#x201D;</p>
<p>Symmetric encryption is also called single-key cryptography. In this encryption process, the receiver and the sender have to agree upon a single secret (shared) key. Given a message (plain text) and the key, encryption produces one intelligible data, about the same length as the plain text. Decryption is the reverse of encryption and uses the same key as encryption [<xref ref-type="bibr" rid="ref-11">11</xref>]. On the other hand, asymmetric encryption is also called public-key cryptography. It uses two keys: a public key, which is known to the public, used for encryption, and a private key, which is known only to the user of that key, used for decryption. The public and private keys are related by any mathematical means. In other words, data encrypted by one public key can be encrypted only by its corresponding private key [<xref ref-type="bibr" rid="ref-12">12</xref>].</p>
<p>The main distinguishing feature of asymmetric encryption is that it allows the establishment of secure communication between individuals without the requirement of a previously shared a single cryptographic key. Asymmetric cryptography came up with a radical change of paradigms [<xref ref-type="bibr" rid="ref-13">13</xref>]. In [<xref ref-type="bibr" rid="ref-14">14</xref>] Alshammari and Elleithy proposed a protocol that utilizes the existing cryptographic primitives and leverages asymmetric encryption to achieve key distribution and node authentication in one step and using only one frame to avoid communication overhead.</p>
<p>Two popular asymmetric schemes are Rivest-Shamir-Adleman (RSA) [<xref ref-type="bibr" rid="ref-15">15</xref>] and Elliptic Curve Cryptography (ECC) [<xref ref-type="bibr" rid="ref-16">16</xref>,<xref ref-type="bibr" rid="ref-17">17</xref>]. It is widely admitted that RSA is computationally intensive and usually executes thousands or even millions of multiplication instructions to perform a single-security operation [<xref ref-type="bibr" rid="ref-18">18</xref>]. Further, a microprocessor&#x2019;s public key algorithm efficiency is primarily determined by the number of clock cycles required for multiplication instruction [<xref ref-type="bibr" rid="ref-19">19</xref>]. At [<xref ref-type="bibr" rid="ref-20">20</xref>], they found that public key algorithms such as RSA usually require on the order of tens of seconds and up to minutes to perform encryption and decryption operations in resource-constrained wireless devices, which exposes a vulnerability to the attacks.</p>
<p>In [<xref ref-type="bibr" rid="ref-21">21</xref>], they quantified the energy cost of authentication and key exchange based on public-key cryptography, RSA, and ECC on an 8-bit microcontroller platform. A comparison has been presented on two public-key algorithms, RSA and ECC, considering mutual authentication between two parties. The result shows that even software-based public key cryptography is feasible for an 8-bit microcontroller platform. Moreover, ECC shows significantly better results than RSA in terms of reduced computation time and the amount of data that needs to be stored and transmitted. Consequently, ECC requires less energy than RSA [<xref ref-type="bibr" rid="ref-8">8</xref>,<xref ref-type="bibr" rid="ref-21">21</xref>,<xref ref-type="bibr" rid="ref-22">22</xref>]. Further, the ECC-based key exchange protocol outperforms the RSA-based key exchange protocol on the server-side, and there is almost no difference in the energy cost for these two key exchange protocols on the client-side [<xref ref-type="bibr" rid="ref-23">23</xref>]. In addition, the relative performance advantage of ECC over RSA increases as the key size increases.</p>
<p>Anderson&#x00A0;et&#x00A0;al.&#x00A0;questioned if &#x201C;you can show that asymmetric encryption is feasible in sensor networks at a certain level of cost, it becomes possible to invent new security protocols or adapt existing ones for sensor networks&#x201D; [<xref ref-type="bibr" rid="ref-24">24</xref>].</p>
<p>For the above reasons, in this research we adopted security algorithms that are more energy-efficient and have fewer processing operations possible to maintain the sensor&#x2019;s life, such as ECC as asymmetric algorithm and Message Digest 5 (MD5) as hash algorithm. In addition, we propose Energy Saving and Securing Data algorithm (ESSD) and then apply ECC, MD5, and ESSD to LEACH and TEEN routing algorithms, which are considered the most widely used in WSNs.</p>
<p>A quick overview of both ECC algorithm and MD5 algorithms in the following:</p>
<sec id="s2_1_1">
<label>2.1.1</label>
<title>ECC</title>
<p>According to the designers of the ECC, an EC is a plane curve defined by an elliptic curve, which is the set of points that satisfy a specific mathematical equation [<xref ref-type="bibr" rid="ref-25">25</xref>]. The equation for an elliptic curve is:
<disp-formula id="eqn-1"><label>(1)</label><mml:math id="mml-eqn-1" display="block"><mml:msup><mml:mi>y</mml:mi><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msup><mml:mo>=</mml:mo><mml:msup><mml:mi>x</mml:mi><mml:mrow><mml:mn>3</mml:mn></mml:mrow></mml:msup><mml:mo>+</mml:mo><mml:mi>a</mml:mi><mml:mi>x</mml:mi><mml:mo>+</mml:mo><mml:mi>b</mml:mi></mml:math></disp-formula></p>
<p>Where (x,y,a,b) &#x0404; R &#x0039B; (a,b) &#x2260; 0,</p>
<p>R: a real number field,</p>
<p>The constants (a and b) control the shape of the ECC graph and any change in any of these numbers changes the scheme too.</p>
<p>Equations based on elliptic curves have a characteristic that is very valuable for cryptography purposes: they are relatively easy to perform, and extremely difficult to reverse.</p>
<p>ECC has two main advantages [<xref ref-type="bibr" rid="ref-26">26</xref>]: (1) ECC public keys are smaller for the same level of security as RSA solutions, thus reducing the number of bits that need to be exchanged; and (2) ECC public-key operations require fewer computations than conventional public-key methods.</p>
</sec>
<sec id="s2_1_2">
<label>2.1.2</label>
<title>MD5</title>
<p>It was developed by Rivest [<xref ref-type="bibr" rid="ref-27">27</xref>] for providing data integrity. It is a widely used cryptographic hash function processing a variable-length message into a fixed-length output of 128 bits.</p>
</sec>
</sec>
<sec id="s2_2">
<label>2.2</label>
<title>Hierarchical Routing Protocols (HRP)</title>
<p>In WSNs, the energy consumption is one of the most critical issues. The traditional routing protocols for WSN may not be optimal in energy consumption [<xref ref-type="bibr" rid="ref-28">28</xref>]. HRPs are more energy-efficient than other protocols [<xref ref-type="bibr" rid="ref-29">29</xref>]. HRP follows the clustering mechanisms; clustering techniques can be efficient in energy and scalability [<xref ref-type="bibr" rid="ref-30">30</xref>]. By using a clustering technique, they greatly minimize the consumption of energy in collecting and disseminating (fusion and aggregation) data. HRP minimizes energy consumption by dividing nodes into different clusters. In each cluster, higher energy nodes, i.e., the Cluster Heads (CHs), can process and send the information to the Base Station (BS). In contrast, low energy nodes, i.e., the cluster members, can be used to perform the sensing in the proximity of the target and send it to its CH. This means that the creation of clusters and assigning particular tasks to CH can significantly contribute to overall system scalability, lifetime, and energy efficiency, reducing the size of the routing table by localizing the route setup within the clusters and conserving the communication bandwidth of the network [<xref ref-type="bibr" rid="ref-31">31</xref>&#x2013;<xref ref-type="bibr" rid="ref-33">33</xref>].</p>
<p>A quick overview of both LEACH and TEEN routing algorithms in the following:</p>
<sec id="s2_2_1">
<label>2.2.1</label>
<title>LEACH</title>
<p>It is the most popular energy-efficient hierarchical routing algorithm proposed by Heinzelman&#x00A0;et&#x00A0;al.&#x00A0;[<xref ref-type="bibr" rid="ref-34">34</xref>] for WSNs to reduce power consumption.</p>
<p>In LEACH, direct communication is used by each CH to forward the data to the BS. LEACH divides the network into several clusters. Since energy dissipation of the sensor depends on the distance, LEACH attempts to transmit data over short distances and reduce the total number of transmission and reception operations [<xref ref-type="bibr" rid="ref-35">35</xref>].</p>
</sec>
<sec id="s2_2_2">
<label>2.2.2</label>
<title>TEEN</title>
<p>It is a hierarchical routing protocol proposed in [<xref ref-type="bibr" rid="ref-36">36</xref>] for time-critical applications, where the sensor nodes sense the medium continuously, but the data transmission is done less frequently.</p>
<p>In TEEN, the CH sends aggregated data to higher-level CH until the data reaches the base. Thus, the sensor network architecture in TEEN is based on a hierarchical grouping where closer nodes form clusters, and this process goes on to the second level until the BS (base) is reached.</p>
</sec>
</sec>
</sec>
<sec id="s3">
<label>3</label>
<title>Materials and Methods</title>
<p>In this paper, the main objective is to achieve data security during transmission by proposing strong, low-power encryption algorithm and mapping the results with (MD5 and ECC) based on previous studies. All then will be applied to two of the most used protocol types (TEEN and LEACH) protocols in wireless networks.</p>
<sec id="s3_1">
<label>3.1</label>
<title>Proposed Algorithm (ESSD)</title>
<p>Our proposed Energy Saving and Securing Data algorithm (ESSD) is designed to generate a set of encryption key numbers. It starts with points, Ax, Bx, Cx on the ECC curve and P prime number, then takes the start points&#x2019; integer part. In order to generate the rest of the sequence using the sum of all points modulo (P) and stop the sequence at the index (3P), the last step is to remove the repetition of numbers. Finally, get the set of integers which are the encryption keys. The steps of the ESSD method are illustrated in Algorithm 1.</p>
<p><bold>Developed Algorithm ESSD (Energy Saving and Securing Data) in keys generation</bold></p>
<fig id="fig-5">
<graphic mimetype="image" mime-subtype="png" xlink:href="CMC_28520-fig-5.png"/>
</fig>
<p>For Example:</p>
<p>Let, Ax &#x003D; 1, Bx &#x003D; 1, Cx &#x003D; 5, P &#x003D; 13,</p>
<p>The next point is 7; (1&#x002B;1&#x002B;5) mod 13 &#x2261; 7 mod 13</p>
<p>The next point is 1; (1&#x002B;1&#x002B;5&#x002B;7) mod 13 &#x2261; 1 mod 13</p>
<p>And so on as represented in <xref ref-type="table" rid="table-1">Tab. 1</xref>.</p>
<table-wrap id="table-1">
<label>Table 1</label>
<caption>
<title>Points value with the index</title>
</caption>
<table frame="hsides">
<colgroup>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
</colgroup>
<thead>
<tr>
<th style="background:#D9D9D9;">Index</th>
<th style="background:#D9D9D9;">1</th>
<th style="background:#D9D9D9;">2</th>
<th style="background:#D9D9D9;">3</th>
<th style="background:#D9D9D9;">4</th>
<th style="background:#D9D9D9;">5</th>
<th style="background:#D9D9D9;">6</th>
<th style="background:#D9D9D9;">7</th>
<th style="background:#D9D9D9;">8</th>
<th style="background:#D9D9D9;">9</th>
<th style="background:#D9D9D9;">10</th>
<th style="background:#D9D9D9;">11</th>
<th style="background:#D9D9D9;">12</th>
<th style="background:#D9D9D9;">13</th>
</tr>
</thead>
<tbody>
<tr>
<td>Value</td>
<td>1</td>
<td>1</td>
<td>5</td>
<td>7</td>
<td>1</td>
<td>2</td>
<td>4</td>
<td>8</td>
<td>3</td>
<td>6</td>
<td>12</td>
<td>11</td>
<td>9</td>
</tr>
<tr>
<td style="background:#D9D9D9;">Index</td>
<td style="background:#D9D9D9;">14</td>
<td style="background:#D9D9D9;">15</td>
<td style="background:#D9D9D9;">16</td>
<td style="background:#D9D9D9;">17</td>
<td style="background:#D9D9D9;">18</td>
<td style="background:#D9D9D9;">19</td>
<td style="background:#D9D9D9;">20</td>
<td style="background:#D9D9D9;">21</td>
<td style="background:#D9D9D9;">22</td>
<td style="background:#D9D9D9;">23</td>
<td style="background:#D9D9D9;">24</td>
<td style="background:#D9D9D9;">25</td>
<td style="background:#D9D9D9;">26</td>
</tr>
<tr>
<td>Value</td>
<td>5</td>
<td>10</td>
<td>7</td>
<td>1</td>
<td>2</td>
<td>4</td>
<td>8</td>
<td>3</td>
<td>6</td>
<td>12</td>
<td>11</td>
<td>9</td>
<td>5</td>
</tr>
<tr>
<td style="background:#D9D9D9;">Index</td>
<td style="background:#D9D9D9;">27</td>
<td style="background:#D9D9D9;">28</td>
<td style="background:#D9D9D9;">29</td>
<td style="background:#D9D9D9;">30</td>
<td style="background:#D9D9D9;">31</td>
<td style="background:#D9D9D9;">32</td>
<td style="background:#D9D9D9;">33</td>
<td style="background:#D9D9D9;">34</td>
<td style="background:#D9D9D9;">35</td>
<td style="background:#D9D9D9;">36</td>
<td style="background:#D9D9D9;">37</td>
<td style="background:#D9D9D9;">38</td>
<td style="background:#D9D9D9;">39</td>
</tr>
<tr>
<td>Value</td>
<td>10</td>
<td>7</td>
<td>1</td>
<td>2</td>
<td>4</td>
<td>8</td>
<td>3</td>
<td>6</td>
<td>12</td>
<td>11</td>
<td>9</td>
<td>5</td>
<td>10</td>
</tr>
</tbody>
</table>
</table-wrap>
<p><xref ref-type="table" rid="table-1">Tab. 1</xref> shows the generated points until the stop point 3P which equal to 3 &#x00D7; 13 &#x003D; 39 in the example. In the previous step, we allow repetition in generating the key sequence, but the result should be a unique sequence without repetition.</p>
<p>So, the next step is to remove the repeated values and get the final sequence, as shown in <xref ref-type="table" rid="table-2">Tab. 2</xref>,</p>
<table-wrap id="table-2">
<label>Table 2</label>
<caption>
<title>Index points without repetition used as keys</title>
</caption>
<table frame="hsides">
<colgroup>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
</colgroup>
<thead>
<tr>
<th style="background:#D9D9D9;">Index</th>
<th style="background:#D9D9D9;">1</th>
<th style="background:#D9D9D9;">2</th>
<th style="background:#D9D9D9;">3</th>
<th style="background:#D9D9D9;">4</th>
<th style="background:#D9D9D9;">5</th>
<th style="background:#D9D9D9;">6</th>
<th style="background:#D9D9D9;">7</th>
<th style="background:#D9D9D9;">8</th>
<th style="background:#D9D9D9;">9</th>
<th style="background:#D9D9D9;">10</th>
<th style="background:#D9D9D9;">11</th>
<th style="background:#D9D9D9;">12</th>
</tr>
</thead>
<tbody>
<tr>
<td>Value</td>
<td>1</td>
<td>5</td>
<td>7</td>
<td>2</td>
<td>4</td>
<td>8</td>
<td>3</td>
<td>6</td>
<td>12</td>
<td>11</td>
<td>9</td>
<td>10</td>
</tr>
</tbody>
</table>
</table-wrap>
<p><xref ref-type="table" rid="table-2">Tab. 2</xref> shows the key sequence for a specific example. Thus, we have the key sequence with the least number of computations and take the ECC security in order.</p>
</sec>
<sec id="s3_2">
<label>3.2</label>
<title>Radio Energy Dissipation Model</title>
<p>The simple radio model which describes the energy dissipation through the electronic devices, transmitter, power amplifier and receiver is shown in <xref ref-type="fig" rid="fig-1">Fig. 1</xref> [<xref ref-type="bibr" rid="ref-37">37</xref>].</p>
<fig id="fig-1">
<label>Figure 1</label>
<caption>
<title>The simple radio model [<xref ref-type="bibr" rid="ref-38">38</xref>]</title>
</caption>
<graphic mimetype="image" mime-subtype="png" xlink:href="CMC_28520-fig-1.png"/>
</fig>
<p>In this work, we use MATLAB [<xref ref-type="bibr" rid="ref-38">38</xref>,<xref ref-type="bibr" rid="ref-39">39</xref>] for modeling &#x0026; simulating the ESSD method.</p>
<p>Consider the following:</p>
<p>1) The equations of transmission and receiving the energy of the basic radio model [<xref ref-type="bibr" rid="ref-40">40</xref>] have been considered. The equations are listed below:</p>
<p><disp-formula id="eqn-2"><label>(2)</label><mml:math id="mml-eqn-2" display="block"><mml:mi>E</mml:mi><mml:mi>T</mml:mi><mml:mi>X</mml:mi><mml:mo>=</mml:mo><mml:mrow><mml:mi mathvariant="italic">E</mml:mi><mml:mi mathvariant="italic">c</mml:mi><mml:mi mathvariant="italic">l</mml:mi><mml:mi mathvariant="italic">e</mml:mi><mml:mi mathvariant="italic">c</mml:mi><mml:mo mathvariant="italic">&#x2217;</mml:mo><mml:mi mathvariant="italic">K</mml:mi></mml:mrow><mml:mo>+</mml:mo><mml:mrow><mml:mi mathvariant="italic">E</mml:mi><mml:mi mathvariant="italic">a</mml:mi><mml:mi mathvariant="italic">m</mml:mi><mml:mi mathvariant="italic">p</mml:mi><mml:mo mathvariant="italic">&#x2217;</mml:mo><mml:mi mathvariant="italic">d</mml:mi></mml:mrow><mml:msup><mml:mspace width="thinmathspace" /><mml:mo>&#x2227;</mml:mo></mml:msup><mml:mn>2</mml:mn><mml:mo>&#x2217;</mml:mo><mml:mi>K</mml:mi></mml:math></disp-formula>
<disp-formula id="eqn-3"><label>(3)</label><mml:math id="mml-eqn-3" display="block"><mml:mi>E</mml:mi><mml:mi>R</mml:mi><mml:mi>X</mml:mi><mml:mo>=</mml:mo><mml:mrow><mml:mi mathvariant="italic">E</mml:mi><mml:mi mathvariant="italic">c</mml:mi><mml:mi mathvariant="italic">l</mml:mi><mml:mi mathvariant="italic">e</mml:mi><mml:mi mathvariant="italic">c</mml:mi><mml:mo mathvariant="italic">&#x2217;</mml:mo><mml:mi mathvariant="italic">K</mml:mi></mml:mrow></mml:math></disp-formula></p>
<p>Where,</p>
<p>ETX &#x003D; Transmission Energy (The amount of energy consumed from the node when transmitting k of bit).</p>
<p>ERX &#x003D; Receiving Energy (The amount of energy consumed from the node when Receiving k of bit).</p>
<p>Eclec (Energy used to run Transmitter Circuit) &#x003D; 50 nJ/bit.</p>
<p>Eamp (Energy Amplifier) &#x003D; 100 pJ/bit/m2.</p>
<p>k &#x003D; number of bits to transmit or receive.</p>
<p>d &#x003D; distance between source and destination.</p>
<p>Efs &#x003D; Transmit Amplifier types-free space loss &#x003D; 10^ (-12) &#x002A; 1.</p>
<p>Emp &#x003D; Transmit Amplifier types - multi path loss &#x003D; 10^ (-15) &#x002A; 1.3.</p>
<p>2) It&#x2019;s known that <xref ref-type="disp-formula" rid="eqn-4">Eq. (4)</xref> is not defined for a distance equal to zero. That is the reason for using a close in the distance do [<xref ref-type="bibr" rid="ref-41">41</xref>], which is in the following equation:</p>
<p><disp-formula id="eqn-4"><label>(4)</label><mml:math id="mml-eqn-4" display="block"><mml:mi>d</mml:mi><mml:mrow><mml:mtext>o</mml:mtext></mml:mrow><mml:mo>=</mml:mo><mml:mo stretchy="false">(</mml:mo><mml:mfrac><mml:mrow><mml:mrow><mml:mi mathvariant="italic">f</mml:mi><mml:mi mathvariant="italic">r</mml:mi><mml:mi mathvariant="italic">e</mml:mi><mml:mi mathvariant="italic">e</mml:mi><mml:mi mathvariant="italic">s</mml:mi><mml:mi mathvariant="italic">p</mml:mi><mml:mi mathvariant="italic">a</mml:mi><mml:mi mathvariant="italic">c</mml:mi><mml:mi mathvariant="italic">e</mml:mi><mml:mi mathvariant="italic">l</mml:mi><mml:mi mathvariant="italic">o</mml:mi><mml:mi mathvariant="italic">s</mml:mi><mml:mi mathvariant="italic">s</mml:mi></mml:mrow><mml:mrow><mml:mo>(</mml:mo><mml:mi>E</mml:mi><mml:mi>f</mml:mi><mml:mi>s</mml:mi><mml:mo>)</mml:mo></mml:mrow></mml:mrow><mml:mrow><mml:mrow><mml:mi mathvariant="italic">m</mml:mi><mml:mi mathvariant="italic">u</mml:mi><mml:mi mathvariant="italic">l</mml:mi><mml:mi mathvariant="italic">t</mml:mi><mml:mi mathvariant="italic">i</mml:mi><mml:mi mathvariant="italic">p</mml:mi><mml:mi mathvariant="italic">a</mml:mi><mml:mi mathvariant="italic">t</mml:mi><mml:mi mathvariant="italic">h</mml:mi><mml:mi mathvariant="italic">l</mml:mi><mml:mi mathvariant="italic">o</mml:mi><mml:mi mathvariant="italic">s</mml:mi><mml:mi mathvariant="italic">s</mml:mi></mml:mrow><mml:mrow><mml:mo>(</mml:mo><mml:mi>E</mml:mi><mml:mi>m</mml:mi><mml:mi>p</mml:mi><mml:mo>)</mml:mo></mml:mrow></mml:mrow></mml:mfrac><mml:msup><mml:mo stretchy="false">)</mml:mo><mml:mo>&#x2227;</mml:mo></mml:msup><mml:mn>0.5</mml:mn></mml:math></disp-formula></p>
<p>3) Computing the distance between nodes using the Euclidean distance.</p>
<p>4) The big number of counters to compute Statistics.</p>
</sec>
<sec id="s3_3">
<label>3.3</label>
<title>ESSD Cryptosystem</title>
<p><xref ref-type="fig" rid="fig-2">Fig. 2</xref> shows the connection loop from the node until the base station and backward. The node collects data and converts it to plain text after the ESSD method converts plain text to ciphertext. The ESSD method takes the security connection configuration as the ECC method and runs from the start points and uses a small prime number for creating a key sequence, which is the advantage of the MD5 hash key, which gives the ESSD method less number of computations.</p>
<fig id="fig-2">
<label>Figure 2</label>
<caption>
<title>The ESSD diagram connection</title>
</caption>
<graphic mimetype="image" mime-subtype="png" xlink:href="CMC_28520-fig-2.png"/>
</fig>
<p>The ESSD is a light method as the MD5 and secure as the ECC method since it takes the ECC idea and initialization.</p>
<p>In this chapter, we viewed the process of the ESSD method and the methodology of testing the security methods (ECC and MD5) with TEEN and LEACH protocols.</p>
</sec>
<sec id="s3_4">
<label>3.4</label>
<title>ESSD Simulation</title>
<p>A MATLAB code has been developed to compare the lifetime of the best in literature routing protocols by enhancing the security services of these protocols by using the ESSD method. The implementation counts the number of dead nodes for each round (time) and shows how the proposed ESSD method outperformed the other key security algorithms such as MD5 and ECC. The proposed method has been implemented to conduct several tests.</p>
<p>The implementation code has been done under the following assumptions:
<list list-type="bullet">
<list-item>
<p>In nature, all nodes are homogeneous</p></list-item>
<list-item>
<p>All nodes start with the same initial energy</p></list-item>
<list-item>
<p>Nodes have the location information</p></list-item>
<list-item>
<p>The BS is situated at the center of the area space</p></list-item>
<list-item>
<p>Clusters and nodes are static</p></list-item>
<list-item>
<p>Normal nodes transmit directly to their respective</p></list-item>
<list-item>
<p>All nodes are lying on the same surface. So the third dimension is ignored</p></list-item>
</list></p>
<p>The parameters used in the simulation are shown in <xref ref-type="table" rid="table-3">Tab. 3</xref>.</p>
<table-wrap id="table-3">
<label>Table 3</label>
<caption>
<title>Values of implementation</title>
</caption>
<table frame="hsides">
<colgroup>
<col align="left"/>
<col align="left"/>
</colgroup>
<thead>
<tr>
<th>Parameter</th>
<th>Value</th>
</tr>
</thead>
<tbody>
<tr>
<td>Nodes</td>
<td>100</td>
</tr>
<tr>
<td>Network size</td>
<td>100 m &#x00D7; 100 m</td>
</tr>
<tr>
<td>Base-Station location</td>
<td>(0,0)</td>
</tr>
<tr>
<td>Base sensor location</td>
<td>(50,50)</td>
</tr>
<tr>
<td>Radio propagation speed</td>
<td>3 &#x00D7; 10<sup>8</sup> m/s</td>
</tr>
<tr>
<td>Processing delay</td>
<td>50 <roman>&#x00B5;</roman>s</td>
</tr>
<tr>
<td>Data rate</td>
<td>1 Mbps</td>
</tr>
<tr>
<td>Data size</td>
<td>4000 bits</td>
</tr>
<tr>
<td>Maximum number of rounds</td>
<td>5000</td>
</tr>
<tr>
<td>The energy required to run circuity</td>
<td>5 &#x00D7; 10<sup>-8</sup> Joules/bit</td>
</tr>
<tr>
<td>d<sub>0</sub></td>
<td>8.7706 &#x00D7; 10<sup>-11</sup></td>
</tr>
<tr>
<td>Heterogeneity percentage of nodes</td>
<td>0.1</td>
</tr>
<tr>
<td>Initial energy</td>
<td>2 Joules</td>
</tr>
<tr>
<td>Threshold value Alpha (&#x03B1;)</td>
<td>0.99</td>
</tr>
<tr>
<td>E<sub>fs</sub>: Transmit Amplifier types-free space loss</td>
<td>1 &#x00D7; 10<sup>-12</sup></td>
</tr>
<tr>
<td>E<sub>mp</sub>: Transmit Amplifier types - multi-path loss</td>
<td>1.3 &#x00D7; 10<sup>-15</sup></td>
</tr>
</tbody>
</table>
</table-wrap>
<p>The network lifetime in TEEN and LEACH are measured before and after applying security methods.</p>
</sec>
</sec>
<sec id="s4">
<label>4</label>
<title>Experimental Results</title>
<p>This section shows the results of experimental tests with changing the security method used. All the results are the average of the 10000-time test.</p>
<sec id="s4_1">
<label>4.1</label>
<title>Experimental Results on LEACH Routing Protocol</title>
<p><xref ref-type="fig" rid="fig-3">Fig. 3</xref> shows the behavior of the LEACH protocol with all tested security methods.</p>
<fig id="fig-3">
<label>Figure 3</label>
<caption>
<title>The LEACH Protocol with all tested security method</title>
</caption>
<graphic mimetype="image" mime-subtype="png" xlink:href="CMC_28520-fig-3.png"/>
</fig>
<p>Here, we compare with regards to energy consumption and show that the best result for energy consumption is when ESSD is used with LEACH, as the sensors began to die after 496 times (rounds) which is the longest time for all cases.</p>
<p><xref ref-type="table" rid="table-4">Tab. 4</xref> shows the number of dead nodes and the time of death for each security method. As it appears, the longest time when ESSD is used, it is less energy-consuming. The most energy-consuming is when using ECC because the first 10 sensors begin to die at 412 times. The least energy-consuming is when using the ESSD method because the first 10 sensor nodes are to die at 549, and hence it shows that the best position for energy consumption is when we use ESSD with the LEACH protocol.</p>
<table-wrap id="table-4">
<label>Table 4</label>
<caption>
<title>The LEACH protocol with all tested security methods</title>
</caption>
<table frame="hsides">
<colgroup>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
</colgroup>
<thead>
<tr>
<th align="left" colspan="2">Number of dead nodes</th>
<th align="left">10</th>
<th align="left">20</th>
<th align="left">30</th>
<th align="left">40</th>
<th align="left">50</th>
<th align="left">60</th>
<th align="left">70</th>
<th align="left">80</th>
<th align="left">90</th>
<th align="left">100</th>
</tr>
</thead>
<tbody>
<tr>
<td align="left" rowspan="4">Security method</td>
<td align="left">ECC</td>
<td align="left">412</td>
<td align="left">426</td>
<td align="left">431</td>
<td align="left">434</td>
<td align="left">436</td>
<td align="left">438</td>
<td align="left">442</td>
<td align="left">447</td>
<td align="left">450</td>
<td align="left">456</td>
</tr>
<tr>
<td align="left">ESSD</td>
<td align="left">459</td>
<td align="left">466</td>
<td align="left">469</td>
<td align="left">472</td>
<td align="left">476</td>
<td align="left">479</td>
<td align="left">483</td>
<td align="left">486</td>
<td align="left">490</td>
<td align="left">496</td>
</tr>
<tr>
<td align="left">MD5</td>
<td align="left">452</td>
<td align="left">463</td>
<td align="left">465</td>
<td align="left">468</td>
<td align="left">471</td>
<td align="left">474</td>
<td align="left">477</td>
<td align="left">481</td>
<td align="left">487</td>
<td align="left">496</td>
</tr>
<tr>
<td align="left">Without</td>
<td align="left">458</td>
<td align="left">465</td>
<td align="left">469</td>
<td align="left">473</td>
<td align="left">475</td>
<td align="left">478</td>
<td align="left">483</td>
<td align="left">486</td>
<td align="left">490</td>
<td align="left">496</td>
</tr>
</tbody>
</table>
</table-wrap>
</sec>
<sec id="s4_2">
<label>4.2</label>
<title>Experimental Results on TEEN Routing Protocol</title>
<p><xref ref-type="fig" rid="fig-4">Fig. 4</xref> shows the behavior of TEEN protocol with all tested security methods.</p>
<fig id="fig-4">
<label>Figure 4</label>
<caption>
<title>The TEEN protocol with all tested security method</title>
</caption>
<graphic mimetype="image" mime-subtype="png" xlink:href="CMC_28520-fig-4.png"/>
</fig>
<p><xref ref-type="table" rid="table-5">Tab. 5</xref> shows the number of dead nodes and the time of death for each security method. This table compares the numbers of sensors that die for each algorithm and shows that its best result was ESSD as, at the time, 4317 began the death of the first ten sensors. This means that we received the lowest power consumption and the confidentiality and authentication of essential security services.</p>
<table-wrap id="table-5">
<label>Table 5</label>
<caption>
<title>The TEEN protocol with all tested security methods</title>
</caption>
<table frame="hsides">
<colgroup>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
</colgroup>
<thead>
<tr>
<th align="left" colspan="2">Number of dead nodes</th>
<th align="left">10</th>
<th align="left">20</th>
<th align="left">30</th>
<th align="left">40</th>
<th align="left">50</th>
<th align="left">60</th>
<th align="left">70</th>
<th align="left">80</th>
<th align="left">90</th>
<th align="left">100</th>
</tr>
</thead>
<tbody>
<tr>
<td align="left" rowspan="4">Security method</td>
<td align="left">ECC</td>
<td align="left">2783</td>
<td align="left">2911</td>
<td align="left">3030</td>
<td align="left">3068</td>
<td align="left">3147</td>
<td align="left">3221</td>
<td align="left">3298</td>
<td align="left">3455</td>
<td align="left">3592</td>
<td align="left">3743</td>
</tr>
<tr>
<td align="left">ESSD</td>
<td align="left">4317</td>
<td align="left">4469</td>
<td align="left">4704</td>
<td align="left">4889</td>
<td align="left">Non</td>
<td align="left">Non</td>
<td align="left">Non</td>
<td align="left">Non</td>
<td align="left">Non</td>
<td align="left">Non</td>
</tr>
<tr>
<td align="left">MD5</td>
<td align="left">4086</td>
<td align="left">4317&#x00A0;</td>
<td align="left">4453</td>
<td align="left">4644</td>
<td align="left">4815</td>
<td align="left">Non</td>
<td align="left">Non</td>
<td align="left">Non</td>
<td align="left">Non</td>
<td align="left">Non</td>
</tr>
<tr>
<td align="left">Without</td>
<td align="left">4302</td>
<td align="left">4480</td>
<td align="left">4645</td>
<td align="left">4925</td>
<td align="left">Non</td>
<td align="left">Non</td>
<td align="left">Non</td>
<td align="left">Non</td>
<td align="left">Non</td>
<td align="left">Non</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>The ESSD mapped the confidentiality from the MD5 method steps and mapped the authentication from the ECC method steps since the ESSD comes from the idea of generating MD5 and ECC.</p>
<p>Note: The word &#x201C;Non&#x201D; used in <xref ref-type="table" rid="table-5">Tab. 5</xref> describes that the test ends when it reaches the maximum number of rounds which is 5000 rounds.</p>
</sec>
</sec>
<sec id="s5">
<label>5</label>
<title>Conclusion and Future Works</title>
<p>The WSNs are mainly resource-constrained connected devices, so we must design and implement a lightweight algorithm. The proposed method of ESSD provides the security for the wireless sensor networks, as we aim to improve the selection of keys of the encryption, increase the node lifetime, and use a light-weight algorithm. These are accomplished with ESSD method by comparing the results under the same conditions with ECC and MD5. The ESSD is suitable as a secure algorithm, where the ESSD has the ECC security level and almost the same level of computing as the MD5.</p>
<p>We plan to apply the ESSD security method on other protocols than LEACH and TEEN in future work. Also, we will compare the results with other security methods and try to combine ECC and MD5 to get another security method that will be more efficient than ESSD.</p>
</sec>
</body>
<back>
<fn-group>
<fn fn-type="other"><p><bold>Funding Statement:</bold> The authors received no specific funding for this study.</p>
</fn>
<fn fn-type="conflict"><p><bold>Conflicts of Interest:</bold> The authors declare that they have no conflicts of interest to report regarding the present study.</p>
</fn>
</fn-group>
<ref-list content-type="authoryear">
<title>References</title>
<ref id="ref-1"><label>[1]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>P.</given-names> <surname>Rawat</surname></string-name>, <string-name><given-names>K. D.</given-names> <surname>Singh</surname></string-name>, <string-name><given-names>H.</given-names> <surname>Chaouchi</surname></string-name> and <string-name><given-names>J. M.</given-names> <surname>Bonnin</surname></string-name></person-group>, &#x201C;<article-title>Wireless sensor networks: A survey on recent developments and potential synergies</article-title>,&#x201D; <source>The Journal of Supercomputing</source>, vol. <volume>68</volume>, no. <issue>1</issue>, pp. <fpage>1</fpage>&#x2013;<lpage>48</lpage>, <year>2014</year>.</mixed-citation></ref>
<ref id="ref-2"><label>[2]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>K.</given-names> <surname>Sharma</surname></string-name> and <string-name><given-names>M. K.</given-names> <surname>Ghose</surname></string-name></person-group>, &#x201C;<article-title>Wireless sensor networks: An overview on its security threats</article-title>,&#x201D; <source>IJCA, Special Issue on &#x201C;Mobile Ad-hoc Networks&#x201D; MANETs</source>, <volume>1495</volume> pp. <fpage>42</fpage>&#x2013;<lpage>45</lpage>, <year>2010</year>.</mixed-citation></ref>
<ref id="ref-3"><label>[3]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>M.</given-names> <surname>Burhanuddin</surname></string-name>, <string-name><given-names>A.</given-names> <surname>Mohammed</surname></string-name>, <string-name><given-names>R.</given-names> <surname>Ismail</surname></string-name>, <string-name><given-names>M.</given-names> <surname>Hameed</surname></string-name> and <string-name><given-names>M. A.</given-names> <surname>Kareem</surname></string-name></person-group>, &#x201C;<article-title>A review on security challenges and features in wireless sensor networks: IoT perspective</article-title>,&#x201D; <source>Journal of Telecommunication, Electronic and Computer Engineering (JTEC)</source>, vol. <volume>10</volume>, no. <issue>1&#x2013;7</issue>, pp. <fpage>17</fpage>&#x2013;<lpage>21</lpage>, <year>2018</year>.</mixed-citation></ref>
<ref id="ref-4"><label>[4]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>K.</given-names> <surname>Chelli</surname></string-name></person-group>, &#x201C;<article-title>Security issues in wireless sensor networks: Attacks and countermeasures</article-title>,&#x201D; <source>Proceedings of the World Congress on Engineering</source>, vol. <volume>1</volume>, no. <issue>20</issue>, pp. <fpage>876</fpage>&#x2013;<lpage>3423</lpage>, <year>2015</year>.</mixed-citation></ref>
<ref id="ref-5"><label>[5]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>N.</given-names> <surname>Saqib</surname></string-name> and <string-name><given-names>U.</given-names> <surname>Iqbal</surname></string-name></person-group>, &#x201C;<article-title>Security in wireless sensor networks using ECC</article-title>,&#x201D; in <conf-name>2016 IEEE Int. Conf. on Advances in Computer Applications (ICACA)</conf-name>, USA, pp. <fpage>270</fpage>&#x2013;<lpage>274</lpage>, <year>2016</year>. </mixed-citation></ref>
<ref id="ref-6"><label>[6]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>J.</given-names> <surname>Li</surname></string-name></person-group>, &#x201C;<article-title>A symmetric cryptography algorithm in wireless sensor network security</article-title>,&#x201D; <source>International Journal of Online Engineering (iJOE)</source>, vol. <volume>13</volume>, no. <issue>11</issue>, pp. <fpage>102</fpage>&#x2013;<lpage>110</lpage>, <year>2017</year>.</mixed-citation></ref>
<ref id="ref-7"><label>[7]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>M.</given-names> <surname>Shafiq</surname></string-name>, <string-name><given-names>H.</given-names> <surname>Ashraf</surname></string-name>, <string-name><given-names>A.</given-names> <surname>Ullah</surname></string-name> and <string-name><given-names>S.</given-names> <surname>Tahira</surname></string-name></person-group>, &#x201C;<article-title>Systematic literature review on energy efficient routing schemes in WSN-A Survey</article-title>,&#x201D; <source>Mobile Networks &#x0026; Applications</source>, vol. <volume>25</volume>, no. <issue>3</issue>, pp. <fpage>882</fpage>&#x2013;<lpage>895</lpage>, <year>2020</year>.</mixed-citation></ref>
<ref id="ref-8"><label>[8]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>G.</given-names> <surname>Sharma</surname></string-name>, <string-name><given-names>S.</given-names> <surname>Bala</surname></string-name> and <string-name><given-names>K.</given-names> <surname>Verma</surname></string-name></person-group>, &#x201C;<article-title>Security frameworks for wireless sensor networks-review</article-title>,&#x201D; <source>Procedia Technology</source>, vol. <volume>6</volume>, no. <issue>11</issue>, pp. <fpage>978</fpage>&#x2013;<lpage>987</lpage>, <year>2012</year>.</mixed-citation></ref>
<ref id="ref-9"><label>[9]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>M.</given-names> <surname>Panda</surname></string-name></person-group>, &#x201C;<article-title>Security in wireless sensor networks using cryptographic techniques</article-title>,&#x201D; <source>American Journal of Engineering Research</source>, vol. <volume>3</volume>, no. <issue>1</issue>, pp. <fpage>50</fpage>&#x2013;<lpage>56</lpage>, <year>2014</year>.</mixed-citation></ref>
<ref id="ref-10"><label>[10]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>A.</given-names> <surname>Shamir</surname></string-name></person-group>, &#x201C;<article-title>Identity based cryptosystems and signature schemes</article-title>,&#x201D; in <conf-name>Proc. Crypto&#x2019;84</conf-name>, <conf-loc>USA</conf-loc>, pp. <fpage>47</fpage>&#x2013;<lpage>53</lpage>, <year>1984</year>. </mixed-citation></ref>
<ref id="ref-11"><label>[11]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>J.</given-names> <surname>Thakur</surname></string-name> and <string-name><given-names>N.</given-names> <surname>Kumar</surname></string-name></person-group>, &#x201C;<article-title>DES, AES and BlowFish: Symmetric key cryptography algorithms simulation-based performance analysis</article-title>,&#x201D; <source>International Journal of Engineering Technology and Advanced Engineering</source>, vol. <volume>1</volume>, no. <issue>2</issue>, pp. <fpage>6&#x2013;12</fpage> <year>2011</year>.</mixed-citation></ref>
<ref id="ref-12"><label>[12]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>G.</given-names> <surname>Quirino</surname></string-name>, <string-name><given-names>A.</given-names> <surname>Ribeiro</surname></string-name> and <string-name><given-names>E.</given-names> <surname>Moreno</surname></string-name></person-group>, &#x201C;<article-title>Asymmetric encryption in wireless sensor networks</article-title>,&#x201D; <source>Wireless Sensor Networks-Technology and Protocols</source>, pp. <fpage>219</fpage>&#x2013;<lpage>232</lpage>, <year>2012</year>.</mixed-citation></ref>
<ref id="ref-13"><label>[13]</label><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><given-names>W.</given-names> <surname>Stallings</surname></string-name></person-group>, <chapter-title>Network and internetwork security: Principles and practices</chapter-title>. <publisher-name>Prentice-Hall, Inc</publisher-name>, <publisher-loc>USA</publisher-loc>, <year>1995</year>.</mixed-citation></ref>
<ref id="ref-14"><label>[14]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>M.</given-names> <surname>Alshammari</surname></string-name> and <string-name><given-names>K.</given-names> <surname>Elleithy</surname></string-name></person-group>, &#x201C;<article-title>Efficient and secure key distribution protocol for wireless sensor networks</article-title>,&#x201D; <source>Sensors</source>, vol. <volume>18</volume>, no. <issue>10</issue>, pp. <fpage>3569</fpage>, <year>2018</year>.</mixed-citation></ref>
<ref id="ref-15"><label>[15]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>R.</given-names> <surname>Rivest</surname></string-name>, <string-name><given-names>A.</given-names> <surname>Shamir</surname></string-name> and <string-name><given-names>L.</given-names> <surname>Adleman</surname></string-name></person-group>, &#x201C;<article-title>A Method for obtaining digital signatures and public-key cryptosystems</article-title>,&#x201D; <source>Communications of the ACM</source>, vol. <volume>21</volume>, no. <issue>2</issue>, pp. <fpage>120</fpage>&#x2013;<lpage>126</lpage>, <year>1978</year>.</mixed-citation></ref>
<ref id="ref-16"><label>[16]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>N.</given-names> <surname>Koblitz</surname></string-name></person-group>, &#x201C;<article-title>Elliptic curve crytosystems</article-title>,&#x201D; <source>Mathematics of Computation</source>, vol. <volume>48</volume>, no. <issue>177</issue>, pp. <fpage>203</fpage>&#x2013;<lpage>209</lpage>, <year>1987</year>.</mixed-citation></ref>
<ref id="ref-17"><label>[17]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>V.</given-names> <surname>Miller</surname></string-name></person-group>, &#x201C;<article-title>Use of elliptic curves in cryptography</article-title>,&#x201D; in <conf-name>Conference on the Theory and Application of Cryptographic Techniques</conf-name>, <publisher-loc>Springer, vol. </publisher-loc><volume>128</volume>, pp. <fpage>417</fpage>&#x2013;<lpage>426</lpage>, <year>1985</year>. </mixed-citation></ref>
<ref id="ref-18"><label>[18]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>I.</given-names> <surname>Mansour</surname></string-name>, <string-name><given-names>G.</given-names> <surname>Chalhoub</surname></string-name> and <string-name><given-names>P.</given-names> <surname>Lafourcade</surname></string-name></person-group>, &#x201C;<article-title>Key management in wireless sensor networks</article-title>,&#x201D; <source>Journal of Sensor and Actuator Networks</source>, vol. <volume>4</volume>, no. <issue>3</issue>, pp. <fpage>251</fpage>&#x2013;<lpage>273</lpage>, <year>2015</year>.</mixed-citation></ref>
<ref id="ref-19"><label>[19]</label><mixed-citation publication-type="other"><person-group person-group-type="author"><string-name><given-names>D.</given-names> <surname>Carman</surname></string-name>, <string-name><given-names>P.</given-names> <surname>Krus</surname></string-name> and <string-name><given-names>B.</given-names> <surname>Matt</surname></string-name></person-group>, &#x201C;<article-title>Constraints and approaches for distributed sensor network security</article-title>. <publisher-loc>Glenwood, MD</publisher-loc>: <publisher-name>NAI Labs, Network Associates Inc, </publisher-name><comment>Technical Report 00-010</comment>, <year>2000</year>.</mixed-citation></ref>
<ref id="ref-20"><label>[20]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>M.</given-names> <surname>Brown</surname></string-name>, <string-name><given-names>D.</given-names> <surname>Cheung</surname></string-name>, <string-name><given-names>D.</given-names> <surname>Hankerson</surname></string-name>, <string-name><given-names>J.</given-names> <surname>Hernandez</surname></string-name> and <string-name><given-names>M.</given-names> <surname>Kirkup</surname></string-name></person-group>, &#x201C;<article-title>PGP in constrained wireless devices</article-title>,&#x201D; in <conf-name>Proc. of the 9th USENIX Security Sym.</conf-name>, <conf-loc>Colorado</conf-loc>, <year>2000</year>. </mixed-citation></ref>
<ref id="ref-21"><label>[21]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>A.</given-names> <surname>Wander</surname></string-name>, <string-name><given-names>N.</given-names> <surname>Gura</surname></string-name>, <string-name><given-names>H.</given-names> <surname>Eberle</surname></string-name>, <string-name><given-names>V.</given-names> <surname>Gupta</surname></string-name> and <string-name><given-names>S.</given-names> <surname>Shantz</surname></string-name></person-group>, &#x201C;<article-title>Energy analysis of public-key cryptography for wireless sensor networks</article-title>,&#x201D; in <conf-name>Proc. of the 3rd IEEE Int. Conf. on Pervasive Computing and Communications</conf-name>, <conf-loc>USA</conf-loc>, pp. <fpage>324</fpage>&#x2013;<lpage>328</lpage>, <year>2005</year>. </mixed-citation></ref>
<ref id="ref-22"><label>[22]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>K.</given-names> <surname>Piotrowski</surname></string-name>, <string-name><given-names>P.</given-names> <surname>Langendoerfer</surname></string-name> and <string-name><given-names>S.</given-names> <surname>Peter</surname></string-name></person-group>, &#x201C;<article-title>How public key cryptography influences wireless sensor node lifetime</article-title>,&#x201D; in <conf-name>Proc. of the 4th ACM workshop on Security of Ad Hoc and Sensor Networks</conf-name>, <conf-loc>NY, USA</conf-loc>, pp. <fpage>169</fpage>&#x2013;<lpage>176</lpage>, <year>2006</year>. </mixed-citation></ref>
<ref id="ref-23"><label>[23]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>J.</given-names> <surname>Hill</surname></string-name>, <string-name><given-names>R.</given-names> <surname>Szewczyk</surname></string-name>, <string-name><given-names>A.</given-names> <surname>Woo</surname></string-name>, <string-name><given-names>S.</given-names> <surname>Hollar</surname></string-name> and <string-name><given-names>D.</given-names> <surname>Culler</surname></string-name></person-group>, &#x201C;<article-title>System architecture directions for networked sensors</article-title>,&#x201D; in <conf-name>Proc. of the 9th Int. Conf. on Architectural Support for Programming Languages and Operating Systems</conf-name>, <conf-loc>New York</conf-loc>, <publisher-name>ACM Press</publisher-name>, pp. <fpage>93</fpage>&#x2013;<lpage>104</lpage>, <year>2000</year>. </mixed-citation></ref>
<ref id="ref-24"><label>[24]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>R.</given-names> <surname>Anderson</surname></string-name>, <string-name><given-names>F.</given-names> <surname>Bergadano</surname></string-name>, <string-name><given-names>B.</given-names> <surname>Crispo</surname></string-name>, <string-name><given-names>C.</given-names> <surname>Manifavas</surname></string-name> and <string-name><given-names>R.</given-names> <surname>Needham</surname></string-name></person-group>, &#x201C;<article-title>A new family of authentication protocols</article-title>,&#x201D; <source>ACM SIGOPS Operating Systems Review</source>, vol. <volume>32</volume>, no. <issue>4</issue>, pp. <fpage>9</fpage>&#x2013;<lpage>20</lpage>, <year>1998</year>.</mixed-citation></ref>
<ref id="ref-25"><label>[25]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>G.</given-names> <surname>Quirino</surname></string-name> and <string-name><given-names>E.</given-names> <surname>Moreno</surname></string-name></person-group>, &#x201C;<article-title>Architectural evaluation of algorithms RSA, ECC and MQQ in ARM processors</article-title>,&#x201D; <source>International Journal of Computer Networks &#x0026; Communications (IJCNC)</source>, vol. <volume>5</volume>, no. <issue>2</issue>, pp. <fpage>153</fpage>&#x2013;<lpage>168</lpage>, <year>2013</year>.</mixed-citation></ref>
<ref id="ref-26"><label>[26]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>R.</given-names> <surname>Watro</surname></string-name>, <string-name><given-names>D.</given-names> <surname>Kong</surname></string-name>, <string-name><given-names>S.</given-names> <surname>Cuti</surname></string-name>, <string-name><given-names>C.</given-names> <surname>Gardiner</surname></string-name> and <string-name><given-names>C.</given-names> <surname>Lynn</surname></string-name></person-group>, &#x201C;<article-title>TinyPK: Securing sensor networks with public key technology</article-title>,&#x201D; in <conf-name>Proc. of the 2nd ACM workshop on Security of Ad Hoc and Sensor Networks</conf-name>, <conf-loc>NY, USA</conf-loc>, pp. <fpage>59</fpage>&#x2013;<lpage>64</lpage>, <year>2004</year>. </mixed-citation></ref>
<ref id="ref-27"><label>[27]</label><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><given-names>R.</given-names> <surname>Rivest</surname></string-name></person-group>, &#x201C;<chapter-title>The MD5 Messege-Digest algorithm</chapter-title>,&#x201D; in <source>RFC 1321</source>, <conf-loc>USA</conf-loc>, <year>1992</year>.</mixed-citation></ref>
<ref id="ref-28"><label>[28]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>R.</given-names> <surname>Mahapatra</surname></string-name> and <string-name><given-names>R.</given-names> <surname>Yadav</surname></string-name></person-group>, &#x201C;<article-title>Analysis of classical routing algorithms on different contention based MAC protocols for wireless sensor networks</article-title>,&#x201D; <source>Journal of Information and Computing Science (JICT)</source>, vol. <volume>9</volume>, no. <issue>1</issue>, pp. <fpage>31</fpage>&#x2013;<lpage>36</lpage>, <year>2014</year>.</mixed-citation></ref>
<ref id="ref-29"><label>[29]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>E. R.</given-names> <surname>Neetika</surname></string-name> and <string-name><given-names>S.</given-names> <surname>Kaur</surname></string-name></person-group>, &#x201C;<article-title>Review on hierarchical routing in wireless sensor network</article-title>,&#x201D; <source>International Journal of Smart Sensors and Ad- Hoc Networks (IJSSAN)</source>, vol. <volume>2</volume>, no. <issue>4</issue>, pp. <fpage>295</fpage>&#x2013;<lpage>300</lpage>, <year>2012</year>.</mixed-citation></ref>
<ref id="ref-30"><label>[30]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>A.</given-names> <surname>Bhattacharjee</surname></string-name>, <string-name><given-names>B.</given-names> <surname>Bhallamudi</surname></string-name> and <string-name><given-names>Z.</given-names> <surname>Maqbool</surname></string-name></person-group>, &#x201C;<article-title>Energy-efficient hierarchical cluster based routing algorithm in Wsn: A Survey</article-title>,&#x201D; <source>International Journal of Engineering Research &#x0026; Technology (IJERT)</source>, vol. <volume>2</volume>, no. <issue>5</issue>, pp. <fpage>302</fpage>&#x2013;<lpage>311</lpage>, <year>2013</year>.</mixed-citation></ref>
<ref id="ref-31"><label>[31]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>S.</given-names> <surname>Verma</surname></string-name>, <string-name><given-names>R.</given-names> <surname>Mehta</surname></string-name> and <string-name><given-names>K.</given-names> <surname>Sharma</surname></string-name></person-group>, &#x201C;<article-title>Wireless sensor network and hierarchical routing protocols: A Review</article-title>,&#x201D; <source>International Journal of Computer Trends and Technology (IJCTT)</source>, vol. <volume>4</volume>, no. <issue>8</issue>, pp. <fpage>2411</fpage>&#x2013;<lpage>2416</lpage>, <year>2013</year>.</mixed-citation></ref>
<ref id="ref-32"><label>[32]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>W.</given-names> <surname>Sun</surname></string-name>, <string-name><given-names>G. Z.</given-names> <surname>Dai</surname></string-name>, <string-name><given-names>X. R.</given-names> <surname>Zhang</surname></string-name>, <string-name><given-names>X. Z.</given-names> <surname>He</surname></string-name> and <string-name><given-names>X.</given-names> <surname>Chen</surname></string-name></person-group>, &#x201C;<article-title>TBE-Net: A three-branch embedding network with part-aware ability and feature complementary learning for vehicle re-identification</article-title>,&#x201D; <source>IEEE Transactions on Intelligent Transportation Systems</source>, pp. <fpage>1</fpage>&#x2013;<lpage>13</lpage>, <year>2021</year>.</mixed-citation></ref>
<ref id="ref-33"><label>[33]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>W.</given-names> <surname>Sun</surname></string-name>, <string-name><given-names>L.</given-names> <surname>Dai</surname></string-name>, <string-name><given-names>X. R.</given-names> <surname>Zhang</surname></string-name>, <string-name><given-names>P. S.</given-names> <surname>Chang</surname></string-name> and <string-name><given-names>X. Z.</given-names> <surname>He</surname></string-name></person-group>, &#x201C;<article-title>RSOD: Real-time Small object detection algorithm in UAV-based traffic monitoring</article-title>,&#x201D; <source>Applied Intelligence</source>, vol. <volume>92</volume>, no. <issue>6</issue>, pp. <fpage>1</fpage>&#x2013;<lpage>16</lpage>, <year>2021</year>.</mixed-citation></ref>
<ref id="ref-34"><label>[34]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>W.</given-names> <surname>Heinzelman</surname></string-name>, <string-name><given-names>A.</given-names> <surname>Chandrakasan</surname></string-name> and <string-name><given-names>H.</given-names> <surname>Balakrishnan</surname></string-name></person-group>, &#x201C;<article-title>Energy-Efficient communication protocol for wireless microsensor networks</article-title>,&#x201D; in <conf-name>Proc. of the 33rd Hawaii Int. Conf. on System Sciences</conf-name>, <conf-loc>Hawaii</conf-loc>, pp. <fpage>1</fpage>&#x2013;<lpage>10</lpage>, <year>2000</year>. </mixed-citation></ref>
<ref id="ref-35"><label>[35]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>S.</given-names> <surname>Singh</surname></string-name>, <string-name><given-names>M.</given-names> <surname>Singh</surname></string-name> and <string-name><given-names>D.</given-names> <surname>Singh</surname></string-name></person-group>, &#x201C;<article-title>A Survey of energy-efficient hierarchical cluster-based routing in wireless sensor networks</article-title>,&#x201D; <source>International Journal of Advanced Networking and Applications</source>, vol. <volume>02</volume>, no. <issue>2</issue>, pp. <fpage>570</fpage>&#x2013;<lpage>580</lpage>, <year>2010</year>.</mixed-citation></ref>
<ref id="ref-36"><label>[36]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>A.</given-names> <surname>Manjeshwar</surname></string-name> and <string-name><given-names>D.</given-names> <surname>Agarwal</surname></string-name></person-group>, &#x201C;<article-title>TEEN: A routing protocol for enhanced efficiency in wireless sensor networks</article-title>,&#x201D; in <conf-name>Proc. of the 15th Int. Parallel and Distributed Processing Sym. (IPDPS&#x2019;01)</conf-name>, <conf-loc>CA, USA</conf-loc>, vol. <volume>1</volume>, pp. <fpage>189</fpage>&#x2013;<lpage>2015</lpage>, <year>2001</year>. </mixed-citation></ref>
<ref id="ref-37"><label>[37]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>R.</given-names> <surname>Mahapatra</surname></string-name> and <string-name><given-names>R.</given-names> <surname>Yadav</surname></string-name></person-group>, &#x201C;<article-title>Descendant of LEACH based routing protocols in wireless sensor network</article-title>,&#x201D; <source>In proceedings of 3rd International Conference on Recent Trends in Computing (ICRTC-2015). Procedia Computer Science</source>, vol. <volume>57</volume>, pp. <fpage>1005</fpage>&#x2013;<lpage>1014</lpage>, <year>2015</year>.</mixed-citation></ref>
<ref id="ref-38"><label>[38]</label><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><given-names>S.</given-names> <surname>Attaway</surname></string-name></person-group>, <chapter-title>MATLAB: A practical introduction to programming and problem solving</chapter-title>. <publisher-name>Elsevier. Inc</publisher-name>, <publisher-loc>Boston, MA, USA</publisher-loc>, <year>2009</year>.</mixed-citation></ref>
<ref id="ref-39"><label>[39]</label><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><given-names>A.</given-names> <surname>Gilat</surname></string-name></person-group>, <chapter-title>MATLAB: An introduction with applications</chapter-title>. <publisher-name>John Wiley and Sons</publisher-name>, <publisher-loc>USA</publisher-loc>, <year>2004</year>.</mixed-citation></ref>
<ref id="ref-40"><label>[40]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>W.</given-names> <surname>Heinzelman</surname></string-name>, <string-name><given-names>A.</given-names> <surname>Chandrakasan</surname></string-name> and <string-name><given-names>H.</given-names> <surname>Balakrishnan</surname></string-name></person-group>, &#x201C;<article-title>An application-specific protocol architecture for wireless microsensor networks</article-title>,&#x201D; <source>IEEE Transactions on Wireless Communications</source>, vol. <volume>1</volume>, no. <issue>4</issue>, pp. <fpage>660</fpage>&#x2013;<lpage>670</lpage>, <year>2002</year>.</mixed-citation></ref>
<ref id="ref-41"><label>[41]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>N.</given-names> <surname>Gura</surname></string-name>, <string-name><given-names>A.</given-names> <surname>Patel</surname></string-name>, <string-name><given-names>A.</given-names> <surname>Wander</surname></string-name>, <string-name><given-names>H.</given-names> <surname>Eberle</surname></string-name> and <string-name><given-names>S.</given-names> <surname>Shantz</surname></string-name></person-group>, &#x201C;<article-title>Comparing elliptic curve cryptography and RSA on 8-bit CPUs</article-title>,&#x201D; in <conf-name>Proc. of the 2004 6th Int. Workshop on Cryptographic Hardware and Embedded Systems (CUES 2004)</conf-name>, <conf-loc>Boston</conf-loc>, <year>2004</year>. </mixed-citation></ref>
</ref-list>
</back>
</article>
