LEACH-based hierarchical energy efficient routing in wireless sensor networks

D Kandris, EA Evangelakos, D Rountos… - … -International Journal of …, 2023 - Elsevier
Abstract Wireless Sensor Networks (WSNs) not only have a constantly increasing range of
applications but also stimulate the amazing growth of 5G mobile communications and the …

Chaos and cellular automata-based substitution box and its application in cryptography

A Shafique, KH Khan, MM Hazzazi, I Bahkali, Z Bassfar… - Mathematics, 2023 - mdpi.com
Substitution boxes are the key factor in symmetric-key cryptosystems that determines their
ability to resist various cryptanalytic attacks. Creating strong substitution boxes that have …

Lightweight Block and Stream Cipher Algorithm: A Review

SA Abead, NHM Ali - Journal of Applied Engineering and …, 2024 - journal.yrpipku.com
Most of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID)
applications need high speed in the execution and processing of data. this is done by …

Lightweight Secure and Scalable Scheme for Data Transmission in the Internet of Things

I Al-Hejri, F Azzedin, S Almuhammadi… - Arabian Journal for …, 2024 - Springer
Abstract The Internet of Things (IoT) is rapidly permeating critical domains, enabling the
interconnection and utilization of diverse devices on a large scale while streaming vast …

Modified Playfair for Text File Encryption and Meticulous Decryption with Arbitrary Fillers by Septenary Quadrate Pattern

N Sugirtham, RS Jenny, B Thiyaneswaran… - International Journal of …, 2024 - Springer
Cryptography secures data and serves to ensure the confidentiality of records. Playfair is a
cryptographic symmetrical algorithm that encrypts statistics based on key costs. This secret …

RETRACTED ARTICLE: Research on privacy and secure storage protection of personalized medical data based on hybrid encryption

J Lv - EURASIP Journal on Information Security, 2024 - Springer
Personalized medical data privacy and secure storage protection face serious challenges,
especially in terms of data security and storage efficiency. Traditional encryption and storage …

[HTML][HTML] ENHANCING SECURITY IN IOT DEVICES: A LIGHTWEIGHT HYBRID CRYPTOGRAPHIC SYSTEM (LCS) APPROACH

A Shah, S Shah, D Parikh, N Shah - Reliability: Theory & …, 2024 - cyberleninka.ru
The escalating connectivity of devices in the Internet of Things (IoT) era necessitates robust
security measures while accommodating resource constraints. Lightweight cryptography …

Dynamic encryption method for MQTT communication

HH Li-Wen, K Yang, LL Fu… - Journal of Physics …, 2024 - iopscience.iop.org
Internet of vehicles (IoV) system is mixed-criticality, and different functions have different
requirements for information security and real-time performance. Thesis aims to design a …

[PDF][PDF] Enabling Efficient Data Transmission in Wireless Sensor Networks-Based IoT Applications

I Al-Hejri, F Azzedin, S Almuhammadi, NF Syed - cdn.techscience.cn
The use of the Internet of Things (IoT) is expanding at an unprecedented scale in many
critical applications due to the ability to interconnect and utilize a plethora of wide range of …

Hybrid key management WSN protocol to enhance network performance using ML Techniques for IoT application in cloud Environment

M Raghini, S Durairaj, S Sasikala - 2024 - researchsquare.com
Abstract As the Internet of Things (IoT) develops, Wireless Sensor Networks (WSNs) must be
used to collect and transmit critical data. Ensuring the security and efficiency of these …