{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,24]],"date-time":"2024-08-24T05:44:53Z","timestamp":1724478293298},"reference-count":51,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2016,2,1]],"date-time":"2016-02-01T00:00:00Z","timestamp":1454284800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Ad Hoc Networks"],"published-print":{"date-parts":[[2016,2]]},"DOI":"10.1016\/j.adhoc.2015.08.026","type":"journal-article","created":{"date-parts":[[2015,9,12]],"date-time":"2015-09-12T15:19:45Z","timestamp":1442071185000},"page":"301-323","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":31,"special_numbering":"P2","title":["Maximizing Wireless Sensor Network lifetime by communication\/computation energy optimization of non-repudiation security service: Node level versus network level strategies"],"prefix":"10.1016","volume":"37","author":[{"given":"Huseyin Ugur","family":"Yildiz","sequence":"first","affiliation":[]},{"given":"Kemal","family":"Bicakci","sequence":"additional","affiliation":[]},{"given":"Bulent","family":"Tavli","sequence":"additional","affiliation":[]},{"given":"Hakan","family":"Gultekin","sequence":"additional","affiliation":[]},{"given":"Davut","family":"Incebacak","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.adhoc.2015.08.026_bib0001","series-title":"Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM)","first-page":"377","article-title":"Energy efficient schemes for wireless sensor networks with multiple mobile base stations","volume":"vol. 1","author":"Gandham","year":"2003"},{"issue":"1","key":"10.1016\/j.adhoc.2015.08.026_bib0002","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1002\/wcm.1219","article-title":"A survey on communication and data management issues in mobile sensor networks","volume":"14","author":"Zhu","year":"2014","journal-title":"Wireless Commun. Mobile Comput."},{"key":"10.1016\/j.adhoc.2015.08.026_bib0003","doi-asserted-by":"crossref","first-page":"484","DOI":"10.1109\/TMC.2007.70784","article-title":"General network lifetime and cost models for evaluating sensor network deployment strategies","volume":"7","author":"Cheng","year":"2008","journal-title":"IEEE Trans. Mobile Comput."},{"key":"10.1016\/j.adhoc.2015.08.026_bib0004","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1016\/j.ins.2011.11.018","article-title":"Communication\/computation tradeoffs for prolonging network lifetime in wireless sensor networks: The case of digital signatures","volume":"188","author":"Bicakci","year":"2012","journal-title":"Inform. Sci."},{"key":"10.1016\/j.adhoc.2015.08.026_bib0005","doi-asserted-by":"crossref","first-page":"880","DOI":"10.1109\/LCOMM.2005.10007","article-title":"On multi-hop routing for energy efficiency","volume":"9","author":"Ergen","year":"2005","journal-title":"IEEE Commun. Lett."},{"key":"10.1016\/j.adhoc.2015.08.026_bib0006","series-title":"Proceedings of International Symposium on Information Processing in Sensor Networks (IPSN)","first-page":"13","article-title":"Maximizing system lifetime in wireless sensor networks","author":"Dong","year":"2005"},{"issue":"3","key":"10.1016\/j.adhoc.2015.08.026_bib0007","doi-asserted-by":"crossref","first-page":"689","DOI":"10.1007\/s11042-011-0840-z","article-title":"A survey of visual sensor network platforms","volume":"60","author":"Tavli","year":"2012","journal-title":"Multimedia Tools Appl."},{"key":"10.1016\/j.adhoc.2015.08.026_bib0008","series-title":"Proceedings of the ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN)","first-page":"169","article-title":"How public key cryptography influences wireless sensor node lifetime","author":"Piotrowski","year":"2006"},{"key":"10.1016\/j.adhoc.2015.08.026_bib0009","series-title":"Proceedings of the IEEE International Conference on Pervasive Computing and Communications (PerCom)","first-page":"324","article-title":"Energy analysis of public-key cryptography for wireless sensor networks","author":"Wander","year":"2005"},{"key":"10.1016\/j.adhoc.2015.08.026_bib0010","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","article-title":"A method for obtaining digital signatures and public-key cryptosystems","volume":"21","author":"Rivest","year":"1978","journal-title":"Commun. ACM"},{"key":"10.1016\/j.adhoc.2015.08.026_bib0011","series-title":"Guide to Elliptic Curve Cryptography","author":"Hankerson","year":"2003"},{"key":"10.1016\/j.adhoc.2015.08.026_bib0012","series-title":"Technical Report, SRI International Computer Science Laboratory","article-title":"Constructing digital signatures from a one-way function","author":"Lamport","year":"1979"},{"key":"10.1016\/j.adhoc.2015.08.026_bib0013","series-title":"Computers and Intractability; A Guide to the Theory of NP-Completeness","author":"Garey","year":"1990"},{"key":"10.1016\/j.adhoc.2015.08.026_bib0014","series-title":"Combinatorial Optimization: Algorithms and Complexity","author":"Papadimitriou","year":"1982"},{"key":"10.1016\/j.adhoc.2015.08.026_bib0015","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1007\/s10479-006-0091-y","article-title":"Progress in computational mixed integer programming\u2014A look back from the other side of the tipping point","volume":"149","author":"Bixby","year":"2007","journal-title":"Annal. Oper. Res."},{"key":"10.1016\/j.adhoc.2015.08.026_bib0016","series-title":"Proceedings of the International Conference on Industrial Engineering Theory, Applications and Practice","first-page":"936","article-title":"An overview of heuristic solution methods","volume":"55","author":"Silver","year":"2004"},{"key":"10.1016\/j.adhoc.2015.08.026_bib0017","series-title":"Proceedings of the IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)","first-page":"79","article-title":"Power consumption evaluation of efficient digital signature schemes for low power devices","volume":"1","author":"Seys","year":"2005"},{"issue":"0","key":"10.1016\/j.adhoc.2015.08.026_bib0018","doi-asserted-by":"crossref","first-page":"273","DOI":"10.1016\/j.comnet.2014.02.001","article-title":"Lightweight collaborative key establishment scheme for the internet of things","volume":"64","author":"Saied","year":"2014","journal-title":"Comput. Netw."},{"key":"10.1016\/j.adhoc.2015.08.026_bib0019","series-title":"Proceedings of the ACM Conference on Wireless Network Security (WiSec)","first-page":"1","article-title":"On the application of pairing based cryptography to wireless sensor networks","author":"Szczechowiak","year":"2009"},{"key":"10.1016\/j.adhoc.2015.08.026_bib0020","series-title":"Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security (ASIA CCS\u201913)","first-page":"287","article-title":"Comparative study of multicast authentication schemes with application to wide-area measurement system","author":"Law","year":"2013"},{"key":"10.1016\/j.adhoc.2015.08.026_bib0021","series-title":"Integer Programming","author":"Wolsey","year":"1998"},{"key":"10.1016\/j.adhoc.2015.08.026_bib0022","doi-asserted-by":"crossref","first-page":"151","DOI":"10.1002\/ett.1466","article-title":"Energy consumption balancing (ECB) issues and mechanisms in wireless sensor networks (WSNs): A comprehensive overview","volume":"22","author":"Ishmanov","year":"2011","journal-title":"Eur. Trans. Telecommun."},{"key":"10.1016\/j.adhoc.2015.08.026_bib0023","series-title":"Telecommunications Networks\u2014Current Status and Future Trends","first-page":"153","article-title":"Review of optimization problems in wireless sensor networks","author":"Gogu","year":"2012"},{"key":"10.1016\/j.adhoc.2015.08.026_bib0024","doi-asserted-by":"crossref","first-page":"390","DOI":"10.1016\/j.ejor.2006.05.037","article-title":"Maximizing system lifetime in wireless sensor networks","volume":"181","author":"Alfieri","year":"2007","journal-title":"Eur. J. Oper. Res."},{"key":"10.1016\/j.adhoc.2015.08.026_bib0025","doi-asserted-by":"crossref","first-page":"905","DOI":"10.1109\/LCOMM.2009.12.091331","article-title":"The impact of one-time energy costs on network lifetime in wireless sensor networks","volume":"13","author":"Bicakci","year":"2009","journal-title":"IEEE Commun. Lett."},{"key":"10.1016\/j.adhoc.2015.08.026_bib0026","doi-asserted-by":"crossref","first-page":"992","DOI":"10.1016\/j.aeue.2009.08.004","article-title":"Data processing and communication strategies for lifetime optimization in wireless sensor networks","volume":"64","author":"Tavli","year":"2010","journal-title":"AEU\u2014Int. J. Electr. Commun."},{"key":"10.1016\/j.adhoc.2015.08.026_bib0027","doi-asserted-by":"crossref","first-page":"408","DOI":"10.1109\/LCOMM.2010.05.092372","article-title":"Optimal data compression and forwarding in wireless sensor networks","volume":"14","author":"Tavli","year":"2010","journal-title":"IEEE Commun. Lett."},{"key":"10.1016\/j.adhoc.2015.08.026_bib0028","first-page":"436","article-title":"Heuristics for designing energy-efficient wireless sensor network topologies","volume":"4","author":"Santos","year":"2009","journal-title":"J. Netw."},{"key":"10.1016\/j.adhoc.2015.08.026_bib0029","series-title":"European Wireless Sensor Networks Workshop (EWSN)","first-page":"197","article-title":"Collaborative broadcasting and compression in cluster-based wireless sensor networks","author":"Hoang","year":"2005"},{"issue":"1","key":"10.1016\/j.adhoc.2015.08.026_bib0030","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1109\/TMC.2013.81","article-title":"Joint scheduling of tasks and messages for energy minimization in interference-aware real-time sensor networks","volume":"14","author":"Fateh","year":"2015","journal-title":"IEEE Trans. Mobile Comput."},{"key":"10.1016\/j.adhoc.2015.08.026_bib0031","series-title":"2013 10th Annual IEEE Communications Society Conference on Sensor, Mesh andAd Hoc Communications and Networks (SECON)","first-page":"263","article-title":"Joint sleep scheduling and routing for lifetime optimization in delay-sensitive sensor networks","author":"Gu","year":"2013"},{"key":"10.1016\/j.adhoc.2015.08.026_bib0032","series-title":"2013 IEEE Global Communications Conference (GLOBECOM)","first-page":"480","article-title":"Optimum power and rate allocation in video sensor networks","author":"El-Sherif","year":"2013"},{"issue":"2","key":"10.1016\/j.adhoc.2015.08.026_bib0033","doi-asserted-by":"crossref","first-page":"928","DOI":"10.1109\/TWC.2012.121412.120635","article-title":"Cross-layer schemes for reducing delay in multihop wireless networks","volume":"12","author":"Cheng","year":"2013","journal-title":"IEEE Trans. Wireless Commun."},{"key":"10.1016\/j.adhoc.2015.08.026_bib0034","series-title":"2014 IEEE Topical Conference on Wireless Sensors and Sensor Networks (WiSNet)","first-page":"49","article-title":"Communication\/computation trade-offs in wireless sensor networks: Comparing network-level and node-level strategies","author":"Yildiz","year":"2014"},{"key":"10.1016\/j.adhoc.2015.08.026_bib0035","doi-asserted-by":"crossref","first-page":"660","DOI":"10.1109\/TWC.2002.804190","article-title":"An application-specific protocol architecture for wireless microsensor networks","volume":"1","author":"Heinzelman","year":"2002","journal-title":"IEEE Trans. Wireless Commun."},{"key":"10.1016\/j.adhoc.2015.08.026_bib0036","series-title":"Proceedings of the IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC)","first-page":"2357","article-title":"Energy consumption and image quality in wireless video-surveillance networks","volume":"vol. 5","author":"Chiasserini","year":"2002"},{"key":"10.1016\/j.adhoc.2015.08.026_bib0037","doi-asserted-by":"crossref","first-page":"660","DOI":"10.1109\/TWC.2002.804190","article-title":"An application specific protocol architecture for wireless microsensor networks","volume":"1","author":"Heinzelman","year":"2002","journal-title":"IEEE Trans. Wireless Commun."},{"key":"10.1016\/j.adhoc.2015.08.026_bib0038","doi-asserted-by":"crossref","first-page":"905","DOI":"10.1109\/LCOMM.2009.12.091331","article-title":"The impact of one-time energy costs on network lifetime in wireless sensor networks","volume":"13","author":"Bicakci","year":"2009","journal-title":"IEEE Commun. Lett."},{"key":"10.1016\/j.adhoc.2015.08.026_bib0039","doi-asserted-by":"crossref","first-page":"1297","DOI":"10.1109\/TMC.2006.151","article-title":"Energy and spatial reuse efficient network wide real-time data broadcasting in mobile ad hoc networking","volume":"10","author":"Tavli","year":"2006","journal-title":"IEEE Trans. Mobile Comput."},{"key":"10.1016\/j.adhoc.2015.08.026_bib0040","series-title":"Proceedings of the 9th ACM Conference on Embedded Networked Sensor Systems","first-page":"345","article-title":"Poster: Securing the internet of things with dtls","author":"Kothmayr","year":"2011"},{"key":"10.1016\/j.adhoc.2015.08.026_bib0041","unstructured":"NIST report on cryptographic key length and crypto-period."},{"key":"10.1016\/j.adhoc.2015.08.026_bib0042","unstructured":"General Algebraic Modeling System (GAMS)."},{"key":"10.1016\/j.adhoc.2015.08.026_bib0043","series-title":"Proceedings of the Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM)","first-page":"1587","article-title":"Bounding the lifetime of sensor networks via optimal role assignments","volume":"vol. 3","author":"Bhardwaj","year":"2002"},{"key":"10.1016\/j.adhoc.2015.08.026_bib0044","doi-asserted-by":"crossref","first-page":"609","DOI":"10.1109\/TNET.2004.833122","article-title":"Maximum lifetime routing in wireless sensor networks","volume":"12","author":"Chang","year":"2004","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"10.1016\/j.adhoc.2015.08.026_bib0045","series-title":"Proceedings of the International Conference on Computer Communications and Networks (ICCCN)","first-page":"1","article-title":"Optimal wireless network restoration under jamming attack","author":"Jiang","year":"2009"},{"key":"10.1016\/j.adhoc.2015.08.026_bib0046","series-title":"Tutorials on Emerging Methodologies and Applications in Operations Research","first-page":"1","article-title":"Heuristic search for network design","volume":"76","author":"Gamvros","year":"2005"},{"key":"10.1016\/j.adhoc.2015.08.026_bib0047","doi-asserted-by":"crossref","first-page":"502","DOI":"10.1090\/S0002-9939-1953-0055639-3","article-title":"Sequential minimax search for a maximum","volume":"4","author":"Kiefer","year":"1953","journal-title":"Proc. Amer. Math. Soc."},{"key":"10.1016\/j.adhoc.2015.08.026_bib0048","series-title":"Numerical Recipes 3rd Edition: The Art of Scientific Computing","author":"Press","year":"2007"},{"key":"10.1016\/j.adhoc.2015.08.026_bib0049","series-title":"Introduction to Numerical Analysis","author":"Stoer","year":"2002"},{"key":"10.1016\/j.adhoc.2015.08.026_bib0050","doi-asserted-by":"crossref","first-page":"269","DOI":"10.1007\/BF01386390","article-title":"A note on two problems in connexion with graphs","volume":"1","author":"Dijkstra","year":"1959","journal-title":"Numer. Math."},{"key":"10.1016\/j.adhoc.2015.08.026_bib0051","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1090\/qam\/102435","article-title":"On a routing problem","volume":"16","author":"Bellman","year":"1958","journal-title":"Quart. Appl. Math."}],"container-title":["Ad Hoc Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1570870515001924?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1570870515001924?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,11,3]],"date-time":"2019-11-03T11:45:55Z","timestamp":1572781555000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1570870515001924"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,2]]},"references-count":51,"alternative-id":["S1570870515001924"],"URL":"https:\/\/doi.org\/10.1016\/j.adhoc.2015.08.026","relation":{},"ISSN":["1570-8705"],"issn-type":[{"value":"1570-8705","type":"print"}],"subject":[],"published":{"date-parts":[[2016,2]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Maximizing Wireless Sensor Network lifetime by communication\/computation energy optimization of non-repudiation security service: Node level versus network level strategies","name":"articletitle","label":"Article Title"},{"value":"Ad Hoc Networks","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.adhoc.2015.08.026","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"Copyright \u00a9 2015 Elsevier B.V. All rights reserved.","name":"copyright","label":"Copyright"}]}}