LEACH-based hierarchical energy efficient routing in wireless sensor networks
D Kandris, EA Evangelakos, D Rountos… - … -International Journal of …, 2023 - Elsevier
Abstract Wireless Sensor Networks (WSNs) not only have a constantly increasing range of
applications but also stimulate the amazing growth of 5G mobile communications and the …
applications but also stimulate the amazing growth of 5G mobile communications and the …
Chaos and cellular automata-based substitution box and its application in cryptography
Substitution boxes are the key factor in symmetric-key cryptosystems that determines their
ability to resist various cryptanalytic attacks. Creating strong substitution boxes that have …
ability to resist various cryptanalytic attacks. Creating strong substitution boxes that have …
Lightweight Block and Stream Cipher Algorithm: A Review
SA Abead, NHM Ali - Journal of Applied Engineering and …, 2024 - journal.yrpipku.com
Most of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID)
applications need high speed in the execution and processing of data. this is done by …
applications need high speed in the execution and processing of data. this is done by …
Lightweight Secure and Scalable Scheme for Data Transmission in the Internet of Things
Abstract The Internet of Things (IoT) is rapidly permeating critical domains, enabling the
interconnection and utilization of diverse devices on a large scale while streaming vast …
interconnection and utilization of diverse devices on a large scale while streaming vast …
Modified Playfair for Text File Encryption and Meticulous Decryption with Arbitrary Fillers by Septenary Quadrate Pattern
Cryptography secures data and serves to ensure the confidentiality of records. Playfair is a
cryptographic symmetrical algorithm that encrypts statistics based on key costs. This secret …
cryptographic symmetrical algorithm that encrypts statistics based on key costs. This secret …
RETRACTED ARTICLE: Research on privacy and secure storage protection of personalized medical data based on hybrid encryption
J Lv - EURASIP Journal on Information Security, 2024 - Springer
Personalized medical data privacy and secure storage protection face serious challenges,
especially in terms of data security and storage efficiency. Traditional encryption and storage …
especially in terms of data security and storage efficiency. Traditional encryption and storage …
[HTML][HTML] ENHANCING SECURITY IN IOT DEVICES: A LIGHTWEIGHT HYBRID CRYPTOGRAPHIC SYSTEM (LCS) APPROACH
The escalating connectivity of devices in the Internet of Things (IoT) era necessitates robust
security measures while accommodating resource constraints. Lightweight cryptography …
security measures while accommodating resource constraints. Lightweight cryptography …
Dynamic encryption method for MQTT communication
HH Li-Wen, K Yang, LL Fu… - Journal of Physics …, 2024 - iopscience.iop.org
Internet of vehicles (IoV) system is mixed-criticality, and different functions have different
requirements for information security and real-time performance. Thesis aims to design a …
requirements for information security and real-time performance. Thesis aims to design a …
[PDF][PDF] Enabling Efficient Data Transmission in Wireless Sensor Networks-Based IoT Applications
The use of the Internet of Things (IoT) is expanding at an unprecedented scale in many
critical applications due to the ability to interconnect and utilize a plethora of wide range of …
critical applications due to the ability to interconnect and utilize a plethora of wide range of …
Hybrid key management WSN protocol to enhance network performance using ML Techniques for IoT application in cloud Environment
M Raghini, S Durairaj, S Sasikala - 2024 - researchsquare.com
Abstract As the Internet of Things (IoT) develops, Wireless Sensor Networks (WSNs) must be
used to collect and transmit critical data. Ensuring the security and efficiency of these …
used to collect and transmit critical data. Ensuring the security and efficiency of these …