{"id":"https://openalex.org/W2999499787","doi":"https://doi.org/10.1002/spe.2782","title":"Secure and efficient data transfer using spreading and assimilation in MANET","display_name":"Secure and efficient data transfer using spreading and assimilation in MANET","publication_year":2020,"publication_date":"2020-01-10","ids":{"openalex":"https://openalex.org/W2999499787","doi":"https://doi.org/10.1002/spe.2782","mag":"2999499787"},"language":"en","primary_location":{"id":"doi:10.1002/spe.2782","is_oa":false,"landing_page_url":"https://doi.org/10.1002/spe.2782","pdf_url":null,"source":{"id":"https://openalex.org/S122199241","display_name":"Software Practice and Experience","issn_l":"0038-0644","issn":["0038-0644","1097-024X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Software: Practice and Experience","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5078332598","display_name":"Samina Kausar","orcid":"https://orcid.org/0000-0003-1330-7266"},"institutions":[{"id":"https://openalex.org/I141962983","display_name":"Shanghai University of Engineering Science","ror":"https://ror.org/0557b9y08","country_code":"CN","type":"education","lineage":["https://openalex.org/I141962983"]},{"id":"https://openalex.org/I146840658","display_name":"University of Azad Jammu and Kashmir","ror":"https://ror.org/015566d55","country_code":"PK","type":"education","lineage":["https://openalex.org/I146840658"]}],"countries":["CN","PK"],"is_corresponding":false,"raw_author_name":"Samina Kausar","raw_affiliation_strings":["Department of CS &amp; IT University of Kotli Azad Jammu and Kashmir  Azad Kashmir Pakistan","School of Computer Engineering and Science Shanghai University  Shanghai China","Department of CS &amp; IT University of Kotli Azad Jammu and Kashmir Azad Kashmir Pakistan","School of Computer Engineering and Science, Shanghai University, Shanghai, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of CS &amp; IT University of Kotli Azad Jammu and Kashmir  Azad Kashmir Pakistan","institution_ids":["https://openalex.org/I146840658"]},{"raw_affiliation_string":"School of Computer Engineering and Science Shanghai University  Shanghai China","institution_ids":["https://openalex.org/I141962983"]},{"raw_affiliation_string":"Department of CS &amp; IT University of Kotli Azad Jammu and Kashmir Azad Kashmir Pakistan","institution_ids":["https://openalex.org/I146840658"]},{"raw_affiliation_string":"School of Computer Engineering and Science, Shanghai University, Shanghai, China","institution_ids":["https://openalex.org/I141962983"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102987390","display_name":"Muhammad Habib","orcid":"https://orcid.org/0000-0002-9884-4898"},"institutions":[{"id":"https://openalex.org/I146840658","display_name":"University of Azad Jammu and Kashmir","ror":"https://ror.org/015566d55","country_code":"PK","type":"education","lineage":["https://openalex.org/I146840658"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Muhammad Habib","raw_affiliation_strings":["Department of CS &amp; IT University of Kotli Azad Jammu and Kashmir  Azad Kashmir Pakistan","Department of CS &amp; IT University of Kotli Azad Jammu and Kashmir Azad Kashmir Pakistan"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of CS &amp; IT University of Kotli Azad Jammu and Kashmir  Azad Kashmir Pakistan","institution_ids":["https://openalex.org/I146840658"]},{"raw_affiliation_string":"Department of CS &amp; IT University of Kotli Azad Jammu and Kashmir Azad Kashmir Pakistan","institution_ids":["https://openalex.org/I146840658"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066052712","display_name":"Muhammad Yasir Shabir","orcid":"https://orcid.org/0000-0002-2729-9247"},"institutions":[{"id":"https://openalex.org/I146840658","display_name":"University of Azad Jammu and Kashmir","ror":"https://ror.org/015566d55","country_code":"PK","type":"education","lineage":["https://openalex.org/I146840658"]}],"countries":["PK"],"is_corresponding":true,"raw_author_name":"Muhammad Yasir Shabir","raw_affiliation_strings":["Department of CS &amp; IT University of Kotli Azad Jammu and Kashmir  Azad Kashmir Pakistan","Department of CS &amp; IT University of Kotli Azad Jammu and Kashmir Azad Kashmir Pakistan"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of CS &amp; IT University of Kotli Azad Jammu and Kashmir  Azad Kashmir Pakistan","institution_ids":["https://openalex.org/I146840658"]},{"raw_affiliation_string":"Department of CS &amp; IT University of Kotli Azad Jammu and Kashmir Azad Kashmir Pakistan","institution_ids":["https://openalex.org/I146840658"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5067324722","display_name":"Ata Ullah","orcid":"https://orcid.org/0000-0003-3603-1709"},"institutions":[{"id":"https://openalex.org/I17120543","display_name":"National University of Modern Languages","ror":"https://ror.org/008dh2426","country_code":"PK","type":"education","lineage":["https://openalex.org/I17120543"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Ata Ullah","raw_affiliation_strings":["Department of Computer Science National University of Modern Languages (NUML)  Islamabad Pakistan","Department of Computer Science, National University of Modern Languages (NUML), Islamabad, Pakistan"],"raw_orcid":"https://orcid.org/0000-0003-3603-1709","affiliations":[{"raw_affiliation_string":"Department of Computer Science National University of Modern Languages (NUML)  Islamabad Pakistan","institution_ids":["https://openalex.org/I17120543"]},{"raw_affiliation_string":"Department of Computer Science, National University of Modern Languages (NUML), Islamabad, Pakistan","institution_ids":["https://openalex.org/I17120543"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5084467125","display_name":"Huahu Xu","orcid":"https://orcid.org/0000-0001-8220-1639"},"institutions":[{"id":"https://openalex.org/I141962983","display_name":"Shanghai University of Engineering Science","ror":"https://ror.org/0557b9y08","country_code":"CN","type":"education","lineage":["https://openalex.org/I141962983"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Huahu Xu","raw_affiliation_strings":["School of Computer Engineering and Science Shanghai University  Shanghai China","School of Computer Engineering and Science, Shanghai University, Shanghai, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Computer Engineering and Science Shanghai University  Shanghai China","institution_ids":["https://openalex.org/I141962983"]},{"raw_affiliation_string":"School of Computer Engineering and Science, Shanghai University, Shanghai, China","institution_ids":["https://openalex.org/I141962983"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5042681178","display_name":"Rashid Mehmood","orcid":"https://orcid.org/0000-0002-3488-9413"},"institutions":[{"id":"https://openalex.org/I146840658","display_name":"University of Azad Jammu and Kashmir","ror":"https://ror.org/015566d55","country_code":"PK","type":"education","lineage":["https://openalex.org/I146840658"]}],"countries":["PK"],"is_corresponding":true,"raw_author_name":"Rashid Mehmood","raw_affiliation_strings":["Department of CS &amp; IT University of Kotli Azad Jammu and Kashmir  Azad Kashmir Pakistan","Department of CS &amp; IT University of Kotli Azad Jammu and Kashmir Azad Kashmir Pakistan"],"raw_orcid":"https://orcid.org/0000-0002-3488-9413","affiliations":[{"raw_affiliation_string":"Department of CS &amp; IT University of Kotli Azad Jammu and Kashmir  Azad Kashmir Pakistan","institution_ids":["https://openalex.org/I146840658"]},{"raw_affiliation_string":"Department of CS &amp; IT University of Kotli Azad Jammu and Kashmir Azad Kashmir Pakistan","institution_ids":["https://openalex.org/I146840658"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5030902303","display_name":"Rongfang Bie","orcid":"https://orcid.org/0000-0002-9971-7698"},"institutions":[{"id":"https://openalex.org/I25254941","display_name":"Beijing Normal University","ror":"https://ror.org/022k4wk35","country_code":"CN","type":"education","lineage":["https://openalex.org/I25254941"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Rongfang Bie","raw_affiliation_strings":["College of Information Sciences and Technology Beijing Normal University  Beijing China","College of Information Sciences and Technology, Beijing Normal University, Beijing, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"College of Information Sciences and Technology Beijing Normal University  Beijing China","institution_ids":["https://openalex.org/I25254941"]},{"raw_affiliation_string":"College of Information Sciences and Technology, Beijing Normal University, Beijing, China","institution_ids":["https://openalex.org/I25254941"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5004733863","display_name":"Muhammad Shahid Iqbal","orcid":"https://orcid.org/0000-0003-4766-0439"},"institutions":[{"id":"https://openalex.org/I143868143","display_name":"Anhui University","ror":"https://ror.org/05th6yx34","country_code":"CN","type":"education","lineage":["https://openalex.org/I143868143"]},{"id":"https://openalex.org/I899713450","display_name":"Air University","ror":"https://ror.org/03yfe9v83","country_code":"PK","type":"education","lineage":["https://openalex.org/I899713450"]}],"countries":["CN","PK"],"is_corresponding":false,"raw_author_name":"Muhammad Shahid Iqbal","raw_affiliation_strings":["Department of Computer Science Air University  Islamabad Pakistan","School of Computer Science and Technology Anhui University  Hefei China","School of Computer Science and Technology, Anhui University, Hefei, China","Department of Computer Science, Air University, Islamabad, Pakistan"],"raw_orcid":"https://orcid.org/0000-0003-4766-0439","affiliations":[{"raw_affiliation_string":"Department of Computer Science Air University  Islamabad Pakistan","institution_ids":["https://openalex.org/I899713450"]},{"raw_affiliation_string":"School of Computer Science and Technology Anhui University  Hefei China","institution_ids":["https://openalex.org/I143868143"]},{"raw_affiliation_string":"School of Computer Science and Technology, Anhui University, Hefei, China","institution_ids":["https://openalex.org/I143868143"]},{"raw_affiliation_string":"Department of Computer Science, Air University, Islamabad, Pakistan","institution_ids":["https://openalex.org/I899713450"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":8,"corresponding_author_ids":["https://openalex.org/A5042681178","https://openalex.org/A5066052712"],"corresponding_institution_ids":["https://openalex.org/I146840658"],"apc_list":{"value":4220,"currency":"USD","value_usd":4220},"apc_paid":null,"fwci":1.2949,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":{"value":0.8133065,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"50","issue":"11","first_page":"2095","last_page":"2109"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9958000183105469,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8248741030693054},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6919217705726624},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6034706830978394},{"id":"https://openalex.org/keywords/mobile-ad-hoc-network","display_name":"Mobile ad hoc network","score":0.46934640407562256},{"id":"https://openalex.org/keywords/plaintext","display_name":"Plaintext","score":0.46038365364074707},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4538222551345825},{"id":"https://openalex.org/keywords/data-transmission","display_name":"Data transmission","score":0.4239519238471985},{"id":"https://openalex.org/keywords/wireless-ad-hoc-network","display_name":"Wireless ad hoc network","score":0.4221019148826599},{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.417497843503952},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.41218096017837524},{"id":"https://openalex.org/keywords/data-security","display_name":"Data security","score":0.4104292392730713},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.2916845679283142},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.2878548204898834},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2798733115196228},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.26640182733535767}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8248741030693054},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6919217705726624},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6034706830978394},{"id":"https://openalex.org/C91280400","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Mobile ad hoc network","level":3,"score":0.46934640407562256},{"id":"https://openalex.org/C92717368","wikidata":"https://www.wikidata.org/wiki/Q1162538","display_name":"Plaintext","level":3,"score":0.46038365364074707},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4538222551345825},{"id":"https://openalex.org/C557945733","wikidata":"https://www.wikidata.org/wiki/Q389772","display_name":"Data transmission","level":2,"score":0.4239519238471985},{"id":"https://openalex.org/C94523657","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Wireless ad hoc network","level":3,"score":0.4221019148826599},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.417497843503952},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.41218096017837524},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.4104292392730713},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.2916845679283142},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.2878548204898834},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2798733115196228},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.26640182733535767},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1002/spe.2782","is_oa":false,"landing_page_url":"https://doi.org/10.1002/spe.2782","pdf_url":null,"source":{"id":"https://openalex.org/S122199241","display_name":"Software Practice and Experience","issn_l":"0038-0644","issn":["0038-0644","1097-024X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Software: Practice and Experience","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":34,"referenced_works":["https://openalex.org/W1974666407","https://openalex.org/W2035357213","https://openalex.org/W2043671319","https://openalex.org/W2080719490","https://openalex.org/W2138044788","https://openalex.org/W2146287423","https://openalex.org/W2155715494","https://openalex.org/W2282944455","https://openalex.org/W2289341618","https://openalex.org/W2330833878","https://openalex.org/W2539066393","https://openalex.org/W2596636257","https://openalex.org/W2605104453","https://openalex.org/W2789858278","https://openalex.org/W2791136254","https://openalex.org/W2799787539","https://openalex.org/W2804216917","https://openalex.org/W2810915196","https://openalex.org/W2887012040","https://openalex.org/W2887211702","https://openalex.org/W2898295972","https://openalex.org/W2898423769","https://openalex.org/W2901041891","https://openalex.org/W2912717503","https://openalex.org/W2918508739","https://openalex.org/W2924705234","https://openalex.org/W2946613633","https://openalex.org/W2947993945","https://openalex.org/W2964466812","https://openalex.org/W3017737415","https://openalex.org/W3102471049","https://openalex.org/W4239954687","https://openalex.org/W6750713512","https://openalex.org/W6995526052"],"related_works":["https://openalex.org/W2991412636","https://openalex.org/W3197075707","https://openalex.org/W2363375349","https://openalex.org/W3122681879","https://openalex.org/W50674023","https://openalex.org/W2362592206","https://openalex.org/W2793746109","https://openalex.org/W2048539412","https://openalex.org/W3104202633","https://openalex.org/W4311218790"],"abstract_inverted_index":{"Summary":[0],"Mobile":[1],"ad":[2],"hoc":[3],"Network":[4],"(MANET)":[5],"is":[6,50],"a":[7,14,63],"cluster":[8],"of":[9,32,48,204,209],"moveable":[10],"devices":[11,38],"connected":[12],"through":[13,162],"wireless":[15],"medium":[16],"to":[17,25,54,58,113,127,189,214],"design":[18],"network":[19],"with":[20,181],"rapidly":[21],"changing":[22],"topologies":[23],"due":[24],"mobility.":[26],"MANETs":[27],"are":[28,137],"applicable":[29],"in":[30,165],"variety":[31],"innovative":[33],"application":[34],"scenarios":[35],"where":[36,69],"smart":[37],"exchange":[39],"data":[40,49,67,73,81,85,102,116,135,206,217],"among":[41],"each":[42],"other.":[43],"In":[44,104],"this":[45],"case,":[46],"security":[47],"the":[51,72,79,84,110,115,129,202,216],"major":[52],"concern":[53],"provide":[55],"dependable":[56],"solution":[57],"users.":[59],"This":[60],"article":[61],"presents":[62],"secure":[64,101],"mechanism":[65],"for":[66,100],"transfer":[68,114],"sender":[70,119],"splits":[71],"into":[74],"fragments":[75,117,124,136,218],"and":[76,121,139,151,169,184,212],"receiver":[77,126],"gets":[78],"actual":[80],"by":[82,219],"assimilating":[83],"fragments.":[86],"We":[87,157,198],"have":[88,108,158,199],"presented":[89],"an":[90],"Enhanced":[91],"Secured":[92],"Lempel\u2010Ziv\u2010Welch":[93],"(ES\u2010LZW)":[94],"algorithm":[95],"that":[96,174],"provides":[97],"cryptographic":[98],"operations":[99],"transfer.":[103],"proposed":[105],"model,":[106],"we":[107],"utilized":[109],"disjoint":[111],"paths":[112],"from":[118],"side":[120],"assimilate":[122],"these":[123],"at":[125],"get":[128],"original":[130],"data.":[131,197],"The":[132],"messages":[133],"containing":[134],"compressed":[138],"encrypted":[140],"as":[141,187],"well.":[142],"Our":[143],"scheme":[144,176],"ensures":[145],"confidentiality,":[146],"integrity,":[147],"efficient":[148],"memory":[149,178],"utilization,":[150],"resilience":[152],"against":[153],"node":[154],"compromising":[155],"attacks.":[156],"validated":[159],"our":[160,175],"work":[161],"extensive":[163],"simulations":[164],"NS\u20102.35":[166],"using":[167],"TCL":[168],"C":[170],"language.":[171],"Results":[172],"prove":[173],"reduces":[177],"consumption":[179],"along":[180],"less":[182],"encryption":[183],"decryption":[185],"cost":[186],"compared":[188],"blowfish":[190],"especially":[191],"when":[192],"plaintext":[193],"has":[194],"more":[195],"repetitive":[196],"also":[200],"analyzed":[201],"impact":[203],"creating":[205],"fragments,":[207],"fraction":[208],"communication":[210],"compromised,":[211],"probability":[213],"compromise":[215],"subverting":[220],"intermediaries.":[221]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
