References
- Abu Al-Haija, Q. 2011. Toward secure non-deterministic distributed wireless sensor network using probabilistic key management approaches. Journal of Information Assurance and Security 6(1): 010–018.
- Abu Al-Haija, Q., Al Tarayrah, M. Al-Qadeeb H. Al-Lwaimi, A. 2014. A Tiny RSA Cryptosystem Based on Arduino Microcontroller Useful for Small Scale Networks. International Symposium on Emerging Inter-networks, Communication and Mobility (EICM 2014), Elsevier, Canada, Auburn, Washington, USA.
- Abu Al-Haija, Q., Asad, M. M. and Marouf, I. 2018a. A systematic expository review of Schmidt-Samoa Cryptosystem. International Journal of Mathematical Sciences and Computing 4(2): 12–21, 10.5815/ijmsc.2018.02.02.
- Abu Al-Haija, Q., Enshasy, H. and Smadi, A. 2017b. Estimating energy consumption of Diffie Hellman encrypted key exchange (DH-EKE) for wireless sensor network. 2017 IEEE International Conference on Intelligent Techniques in Control, Optimization & Signal Processing (INCO’17), 23–25 March 2017, Srivilliputhur, India.
- Abu Al-Haija, Q., Manasra, G. F. and Al Tarayrah, M. 2017a. Communication power analysis of applying MQV Key agreement scheme for wireless sensor network. 2017 IEEE International Conference on Intelligent Techniques in Control, Optimization & Signal Processing (INCO’17) 17-20 AUGUST 2014, Niagara Falls, Canada.
- Abu Al-Haija, Q., Marouf, I. and Asad, M. M. 2018b. A double stage implementation for 1-K Pseudo RNG using LFSR and TRIVIUM. Journal of Computer Science and Control Systems 11(1): 639–646.
- Alam, S. and De, D. 2014. Analysis of security threats in wireless sensor network. International Journal of Wireless & Mobile Networks 6(2): 1–12.
- Al-Haija, Q., AlShuaibi, A. and Al Badawi, A. 2018. Frequency analysis of 32-bit modular divider based on extended GCD algorithm for different FPGA chips. International Journal of Computers & Technology 17(1): 7133–7139, available at: https://doi.org/10.24297/ijct.v17i1.6992
- Altera Corporation 2012a. Cyclone IV device handbook, Vol. 1, CYIV-5V1-2.2, Altera Corporation, available at: www.altera.com/San Jose, California, United States.
- Altera Corporation 2012b. Introduction to Quartus II software: ver 10.0, Altera Corporation, Intel Quartus II MNL-01055-1.0, San Jose, California, United States.
- Anbuchelian, S., Lokesh, S. and Baskaran, M. 2016. Improving security in wireless sensor network using trust and metaheuristic algorithms. 3rd International Conference on Computer & Information Sciences (ICCOINS) 233–241.
- Asad, M. M., Marouf, I. and Abu Al-Haija, Q. 2017a. Investigation study of feasible prime number testing algorithms. Acta Technica Napocensis – Electronics and Telecommunications 58(3): 11–15.
- Asad, M. M., Marouf, I. and Abu Al-Haija, Q. 2017b. Review of fast multiplication algorithms for embedded systems design. International Journal of Scientific & Technology Research 6(8): 238–242.
- Asad, M. M., Marouf, I. and Abu Al-Haija, Q. 2019. Radix-8 design alternatives of fast two operands interleaved multiplication with enhanced architecture. International Journal of Advanced Network, Monitoring and Controls 4(2): 15–27.
- Balakrishn, T. and Swetha, R. N. 2016. Development of Arm7 based sensor interface for industrial Wireless Sensor Network (WSN) in IoT environment. International Journal of Eminent Engineering Technologies 4(3): 54–60.
- Brent, R. P. and Kung, H. T. 1984. Systolic VLSI arrays for polynomial GCD computation. IEEE Transactions on Computers C-33(8)731–736.
- Brumancia, E. and Sylvia, A. 2015. A profile based scheme for security in clustered wireless sensor networks. IEEE International Conference on Communications & Signal Processing (ICCSP2015) 823–828.
- Chelli, K. 2015. Security issues in wireless sensor networks: attacks and countermeasures. World Congress on Engineering (WCE 2015), Vol. 1, London, U.K., 1–3 July 2015.
- Chowdhury, A., Tanzila, F. A., Chowdhury, S. and Haque, M. M. 2015. An Efficient Security Architecture for Wireless Sensor Networks using Pseudo-inverse Matrix. 18th International Conference on computer and Information Technology (ICCIT), pp. 396–400.
- Daniel, A. and Roslin, E. 2015. a review on existing security frameworks with efficient energy preservation techniques in wireless sensor networks. IEEE International Conference on Communications and Signal Processing (ICCSP 2015) 658–662.
- Ercegovac, M. D. and Lang, T. 2004. Digital arithmetic 1, Morgan Kaufmann Publishers, Elsevier, San Antonio, TX.
- Ghormare, S. and Sahare, V. 2015. Implementation of data confidentiality for providing high security in wireless sensor network. IEEE 2nd International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS 2015), 19–20 MARCH 2015, Coimbatore, India.
- Hlaváč, J. and Lórencz, R. 2013. Arithmetic unit for computations in GF(p) with left-shifting multiplicative inverse algorithm, architecture of computing systems, ARCS 2013. Lecture Notes in Computer Science 7767: 268–279.
- Hwang, L. C., Lee, C. C. and Hwang, M. S. 2013. A n2 + n MQV key agreement protocol. The International Arab Journal of Information Technology 10(2): 137–142.
- Ishmukhametov, S. and Mubarakov, B. 2013. On practical aspects of the Miller-Rabin primality test. Lobachevskii Journal of Mathematics 34(4): 304–312.
- Karatsuba, A. and Ofman, Y. 1963. Multiplication of multidigit numbers on automata. Soviet Physics, Doklady 595–596.
- Koutsopoulos, I. and Halkidi, M. 2014. Distributed energy-efficient estimation in spatially correlated wireless sensor networks. Computer Communications 45(1): 47–58.
- Kumar, E. S., Kusuma, S. M. and Kumar, B. P. V. 2014. A random key distribution based artificial immune system for security in clustered wireless sensor networks. IEEE Students’ Conference on Electrical, Electronics and Computer Science 1–2 MARCH 2014, Bhopal, India.
- LaMeres, B. J. 2017. Introduction to logic circuits & logic design with VHDL. Electronics and Electrical Engineering, Springer, Heidelberg, Germany.
- Marouf, I., Asad, M. M. and Abu Al-Haija, Q. 2017b. Reviewing and analyzing efficient GCD/LCM algorithms for cryptographic design. International Journal of New Computer Architectures and their Applications, Society of Digital Information and Wireless Communication 7(1): 1–7.
- Marouf, I., Asad, M. M. and Abu Al-Haija, Q. 2017c. Comparative study of efficient modular exponentiation algorithms. An International Journal of Advanced Computer Technology 6(8): 2381–2389.
- Marouf, I., Asad, M. M., Bakhuraibah, A. and Abu Al-Haija, Q. 2017a. Cost analysis study of variable parallel prefix adders using Altera Cyclone IV FPGA kit. IEEE International Conference on Electrical & Computing Technologies & Applications, (ICECTA) 19–21 NOVEMBER 2017, Ras Al Khaimah, UAE.
- Paar, C. and Pelzl, J. 2010. Understanding cryptography, Springer-Verlag, Berlin and Heidelberg, available at: https://doi.org/10.1007/978-3-642-04101-3
- Panja, B., Scott, Z. and Meharia, P. 2014. Security in wireless sensor networks for health monitoring helmet with anomaly detection using power analysis and probabilistic model. IEEE Conference on Wireless Sensors (ICWiSE 2014) 26–28.
- Patil, S.D. and Kumar, V. 2014. Secure health monitoring in wireless sensor networks with mobility-supporting adaptive authentication scheme. International Journal of Computer Networking, Wireless and Mobile Communications 4(1): 27–34.
- Polastre, J., Szewczyk, R., Sharp, C. and Culler, D. 2004. The mote revolution: low power wireless sensor network devices, Computer Science Department, University of California, Berkeley, CA.
- Radzevych, V. A. and Mathew, S. 2003. Security in wireless sensor networks: key management approaches. PPt File, University at Buffalo – The State University of New York, Computer Science and Engineering, New York, USA.
- Rault, F., Bouabdallah, A. and Challal, Y. 2014. Energy efficiency in wireless sensor networks: a top-down survey. Elsevier Computer Networks 67: 104–122.
- Samoa, K. S. 2006. A new Rabin-type trapdoor permutation equivalent to factoring. Electronic Notes in Theoretical Computer Science 157(3): 79–94, available at: https://eprint.iacr.org/2005/278.pdf
- Shahdad, S. Y., Sabahath, A. and Parveez, R. 2016. Architecture, issues and challenges of wireless mesh network. International Conference on Communication and Signal Processing (ICCSP 2016), Melmaruvathur 0557–0560.
- Stein, W. 2009. Elementary number theory: primes, congruence, and secrets: a computational approach. Number Theory and Discrete Mathematics 1: 1–172.
- Suman, S. B., Kumar, P. V. R. and Kumar, E. S. 2014. Random keying technique for security in wireless sensor networks based on memetics. International Journal of Computer Science: Theory and Application 2(1): 25–31.
- Tian, Y., Chen, G. and Li, J. 2009. On the design of Trivium. Beijing Daxue Xuebao Ziran Kexue Ban/Acta Scientiarum Naturalium Universitatis Pekinensis 5 1–13, available at: http://eprint.iacr.org/2009/43.
- Walter, C. D. 2010. Right-to-left or left-to-right exponentiation? 1st International Workshop on Constructive Side-Channel Analysis and Secure Design, Darmstadt.
- Wang, N., Zhou, Y. and Xiang, W. 2016. An energy efficient clustering protocol for lifetime maximization in wireless sensor networks. IEEE Global Communications Conference (GLOBECOM 2016) 1–6USA.
- Wu, S. and Tseng, Y. 2006. Wireless ad hoc networking 1, Taylor and Francis Group, Auerbach Publications 139–160, CRC Press, Boca Raton, Florida, USA.
- Yang, S. H. 2014. Wireless sensor networks: Principles, Design and Applications. Signals and Communication Technology. Springer Nature, Springer-Verlag, 2–4, Heidelberg, Germany.
- Zorbas, D., Raveneau, P. and Doudane, Y. G. 2016. Assessing the cost of RF-power harvesting nodes in wireless sensor networks. IEEE Global Communications Conference (GLOBECOM 2016) 4–8 DECEMBER 2016, Washington, DC USA.