Retraction
IIBE: An Improved Identity-Based Encryption Algorithm for WSN Security
Paper Information
Record ID:
61098
Author(s):
Journal:
Publication Date:
September 20, 2021
Retraction Date:
November 01, 2023
(2.1 years years ago)
Subjects:
Institutions:
Countries:
Article Type:
Publisher:
Hindawi
Open Access:
Yes
DOI:
PubMed ID:
Not indexed in PubMed
Retraction PubMed ID:
Not indexed in PubMed
Retraction Details
Retraction Reasons:
- Concerns/Issues About Data
- Concerns/Issues about Results and/or Conclusions
- Concerns/Issues about Referencing/Attributions
- Concerns/Issues with Peer Review
- Investigation by Journal/Publisher
- Investigation by Third Party
- Paper Mill
- Computer-Aided Content or Computer-Generated Content
- Unreliable Results and/or Conclusions
Nature of Retraction:
Retraction
Retraction Notice:
10.1155/2023/9754210Additional Notes:
See also: https://pubpeer.com/publications/2881EE7E1DCAB423BB69353A6AA44D
Citations (129)
129
Total Citations18
Post-Retraction(14.0%)
110
Pre-Retraction1
Same DayPost-Retraction Citation Analysis
2
Within 30 days
16
Within 1 year
0
After 2+ years
427
Days since retraction (latest)
Machine Learning Algorithm for Intrusion Detection System to Protect Mobile Ad Hoc Network
Karuna G. Bagde, Atul D. Raut
Lecture notes in networks and systems
Published: Jan 2025
427 days after retraction
Sequential fusion estimation for nonlinear systems under deceptive attacks
Shu Yin, Kelei Miao, Yu Li
Asian Journal of Control
Published: Dec 2024
413 days after retraction
IDENTITY-BASED ENCRYPTION: A SECURE METHOD FOR DATA PROTECTION
Shermina, R. Latha, R Sreenithi
Unknown Journal
Published: Sep 2024
329 days after retraction
PPSO and Bayesian game for intrusion detection in WSN from a macro perspective
Ning Liu, Shangkun Liu, Weimin Zheng
Complex & Intelligent Systems
Open Access
Published: Jul 2024
269 days after retraction
Enhancing agricultural wireless sensor network security through integrated machine learning approaches
Ishu Sharma, Aditya Bhardwaj, Keshav Kaushik
Security and Privacy
Published: Jul 2024
1 citation
1 citation
244 days after retraction
Paper citing IIBE: An Improved Identity-Based Encryption Algori...
Unknown Authors
Unknown Journal
Published: Jun 2024
240 days after retraction
RETRACTED: Evaluating the integration of traditional gong methods in smart home environment for the recovery of health functions of stroke patients
Baoliang Wang, Hongping Su, Xiaoqian Luo et al. (4 authors)
Journal of Intelligent & Fuzzy Systems
Published: May 2024
188 days after retraction
The Style Transformation of Gu-Zheng Music Based on the Improved Model of Cyclegan
Yifan Li
Deleted Journal
Open Access
Published: May 2024
185 days after retraction
Dynamic Feature Selection and Classification for Threat Mitigation in Wireless Sensor Networks
Akil Adhithyan K, Alfred Daniel
Unknown Journal
Published: Apr 2024
169 days after retraction
The Style Transformation of Gu-Zheng Music Based on the Improved Model of Cyclegan
Yiqi Li
Deleted Journal
Open Access
Published: Apr 2024
159 days after retraction
Watermarking and Encryption for Electronic Medical Records (EMR) Security Based on mCloud
Haider Rasheed Abdulshaheed, Yaseen Saadi Abbas, Jamal F. Tawfeq et al. (6 authors)
Unknown Journal
Published: Feb 2024
117 days after retraction
Authentication schemes in wireless internet of things sensor networks: a survey and comparison
Pendukeni Phalaagae, Adamu Murtala Zungeru, Boyce Sigweni et al. (4 authors)
Indonesian Journal of Electrical Engineering and Computer Science
Open Access
Published: Feb 2024
1 citation
1 citation
107 days after retraction
Review Paper of Performance Analysis in Wireless Sensor Networks
Tiyas Sarkar, Ravi Kumar, Mritunjay Kumar et al. (6 authors)
SSRN Electronic Journal
Published: Jan 2024
5 citations
5 citations
61 days after retraction
Preventing Cyber Crime in Electronic Medical Records Using Encryption Data
Budiman Budiman, Teddy Mantoro, Barito Mulyo Ratmono et al. (4 authors)
Unknown Journal
Published: Dec 2023
49 days after retraction
Combinatorial Bat Optimization for WSN with Hoover Index Clustering
M Gurupriya, Vasavi C.S., Gayathri Ramasamy et al. (4 authors)
Unknown Journal
Published: Dec 2023
6 citations
6 citations
43 days after retraction
Evolutionary Hybrid Algorithms to Pioneer Localization in Wireless Sensor Networks
G. Balachandran, R. Vivek Krishna, S. Kumar Ranjith et al. (4 authors)
2022 International Conference on Innovative Computing, Intelligent Communication and Smart Electrical Systems (ICSES)
Published: Dec 2023
43 days after retraction
Blockchain-Based Multistage Continuous Authentication for Smart Devices
Yue Yao, Xiaomei Zhang, Haomin Hu et al. (6 authors)
Applied Sciences
Open Access
Published: Nov 2023
23 days after retraction
A Design of Sharing Algorithm Based on Attribute–Based Encryption in Cloud Storage Environment
Jun Fu, Desheng Zeng, Xiaodan Chen et al. (4 authors)
Unknown Journal
Published: Nov 2023
16 days after retraction
Retracted: IIBE: An Improved Identity-Based Encryption Algorithm for WSN Security
Security and Communication Networks
Security and Communication Networks
Open Access
Published: Nov 2023
Same day as retraction
Secure and Energy-Based STEERA Routing Protocol for Wireless Sensor Networks
G. Mohan Ram, E. Ilavarasan
Journal of Interconnection Networks
Published: Sep 2023
33 days before retraction
Deep Wavelet Residual Attention Network for Radio Frequency Fingerprint Recognition under Low SNR
Haoran Li, Chunjie Cao, Yang Sun et al. (6 authors)
2022 IEEE 19th International Conference on Mobile Ad Hoc and Smart Systems (MASS)
Published: Sep 2023
37 days before retraction
Trust management based multidimensional secure cluster with RSA cryptography algorithm in WSN for secure data transmission
S. Anitha, S. Saravanan, A. Chandrasekar
Measurement Sensors
Open Access
Published: Aug 2023
11 citations
11 citations
77 days before retraction
Security for wireless sensor networks using cryptography
P. Ramadevi, S. Ayyasamy, Yalla Suryaprakash et al. (6 authors)
Measurement Sensors
Open Access
Published: Aug 2023
3 citations
3 citations
85 days before retraction
lmprovement of A Searchable Keyword Public Key Encryption Scheme in Cloud Storage
Shuhan Zeng, Chuanhao Zhou, Yingjie Dong et al. (6 authors)
Research Square (Research Square)
Open Access
Published: Jul 2023
111 days before retraction
Hybrid Chaotic-Based PRNG for Secure Cryptography Applications
Abdullah M. Alnajim, Ehab Abou-Bakr, Sarah S. Alruwisan et al. (5 authors)
Applied Sciences
Open Access
Published: Jun 2023
8 citations
8 citations
124 days before retraction
A Critical Cybersecurity Analysis and Future Research Directions for the Internet of Things: A Comprehensive Review
Usman Tariq, Irfan Ahmed, Ali Kashif Bashir et al. (4 authors)
Sensors
Open Access
Published: Apr 2023
171 citations
171 citations
196 days before retraction
ECO-LEACH: A Blockchain-Based Distributed Routing Protocol for Energy-Efficient Wireless Sensor Networks
A. B. Feroz Khan
Information Dynamics and Applications
Open Access
Published: Mar 2023
3 citations
3 citations
215 days before retraction
Addressing Cloud Computing Security and Visibility Issues
Oluwasanmi Richard Arogundade
IARJSET
Open Access
Published: Mar 2023
2 citations
2 citations
216 days before retraction
The Use of Encryption to Preserve the Privacy and Security of Electronic Health Records
Naila Samar Naz
2022 International Conference on Business Analytics for Technology and Security (ICBATS)
Published: Mar 2023
239 days before retraction
Sanitizable Cross-System Authorization for Secure Communication in Intelligent Connected Vehicle
Yanan Zhao, Haiyang Yu, Yuhao Liang et al. (6 authors)
IEEE Transactions on Vehicular Technology
Published: Jan 2023
3 citations
3 citations
304 days before retraction
BC-IoDT
Junaid Akram, Awais Akram, Rutvij H. Jhaveri et al. (5 authors)
Unknown Journal
Open Access
Published: Oct 2022
14 citations
14 citations
380 days before retraction
Dental 3D Printing Design Based on Neurodegeneration and Virtual Reality Imaging Technology
Yanfeng Zhu, Fei Lin, Weihui Chen
BioMed Research International
Open Access
Published: Sep 2022
2 citations
2 citations
419 days before retraction
Text Clustering and Economic Analysis of Free Trade Zone Governance Strategies Based on Random Matrix and Subject Analysis
Lingyan Meng
Mathematical Problems in Engineering
Open Access
Published: Aug 2022
3 citations
3 citations
428 days before retraction
Design of Secure Communication Methodologies for WSN Assisted IoT Applications
P. Geetha, Sanjay Kumar, Jambi Ratna Raja Kumar et al. (4 authors)
2022 2nd Asian Conference on Innovation in Technology (ASIANCON)
Published: Aug 2022
1 citation
1 citation
432 days before retraction
Value Assessment for a Theory-Oriented Flipped Classroom of Physical Education Based on Multi-Source Data Analysis
Na Li
Security and Communication Networks
Open Access
Published: Aug 2022
1 citation
1 citation
450 days before retraction
A Framework of Deploying Blockchain in Wireless Sensor Networks
Minh Tuấn Nguyễn, Cuong V. Nguyen, Hoang T. Tran
EAI Endorsed Transactions on Industrial Networks and Intelligent Systems
Open Access
Published: Aug 2022
2 citations
2 citations
454 days before retraction
Multivariate Statistical Analysis of Quality Improvement Effect of Innovation and Entrepreneurship Education Based on Random Matrix Theory
Xiaohang Wu, Zhihua Qin
Mathematical Problems in Engineering
Open Access
Published: Jul 2022
9 citations
9 citations
467 days before retraction
A Study on the Innovative Use of Blockchain in the Human Resources Service Industry
Tao Wang
Wireless Communications and Mobile Computing
Open Access
Published: Jul 2022
7 citations
7 citations
482 days before retraction
Intelligent Deployment and Development Strategy of Agricultural Farmland Based on Improved Architecture of Internet of Things
Xiaofen Li
Mathematical Problems in Engineering
Open Access
Published: Jun 2022
2 citations
2 citations
491 days before retraction
Information Extraction and Knowledge Graph Construction for Enterprises in China’s Free Trade Zone
Lingyan Meng
Security and Communication Networks
Open Access
Published: Jun 2022
2 citations
2 citations
509 days before retraction
Analysis on the Artistic Presentation Effect of 3D Rendering Ink Painting Based on the Evaluation of Deep Learning Model
Yue Pan
Scientific Programming
Open Access
Published: May 2022
2 citations
2 citations
521 days before retraction
Research on Embedded Security Control for Smart Home Based on Improved IBE Algorithm
Siyuan Zhang
Security and Communication Networks
Open Access
Published: May 2022
1 citation
1 citation
530 days before retraction
Effect of Evaluation of Popular Song Creation and Literature Based on RITNN Model
Rui Song
Mathematical Problems in Engineering
Open Access
Published: May 2022
1 citation
1 citation
536 days before retraction
Real-Time Prediction of Cross-Border e-Commerce Spike Performance Based on Neural Network and Decision Tree
Na Li, Chongyi Gong, Dongqin Lv
Wireless Communications and Mobile Computing
Open Access
Published: May 2022
3 citations
3 citations
536 days before retraction
The Combination of Internet of Things Technology Based on Probability Model Network and Mass Education
Meiling Xu
Wireless Communications and Mobile Computing
Open Access
Published: May 2022
5 citations
5 citations
538 days before retraction
Marketing System Construction and Risk Analysis Based on Random Forest of Machine Learning
Kai Wang, Na Wang
Wireless Communications and Mobile Computing
Open Access
Published: May 2022
1 citation
1 citation
541 days before retraction
Research on Intelligent Bodybuilding System Based on Machine Learning
Chen Chen
Journal of Sensors
Open Access
Published: May 2022
6 citations
6 citations
545 days before retraction
Design of Deep Learning Network Model for Personalized Music Emotional Recommendation
Chen Chen
Security and Communication Networks
Open Access
Published: May 2022
3 citations
3 citations
548 days before retraction
Using Identity-Based Cryptography as a Foundation for an Effective and Secure Cloud Model for E-Health
Shikha Mittal, Ankit Bansal, Deepali Gupta et al. (8 authors)
Computational Intelligence and Neuroscience
Open Access
Published: Apr 2022
69 citations
69 citations
555 days before retraction
Software Vulnerability Mining Techniques Based on Data Fusion and Reverse Engineering
Tieming Liu
Wireless Communications and Mobile Computing
Open Access
Published: Apr 2022
3 citations
3 citations
557 days before retraction
Quick Stats
Total Citations:
129
Years Since Retraction:
2.1 years
Open Access:
Yes
Last Checked:
Jul 24, 2025