[HTML][HTML] Cryptographic data security for reliable wireless sensor network

S Urooj, S Lata, S Ahmad, S Mehfuz… - Alexandria Engineering …, 2023 - Elsevier
Abstract Wireless Sensor Networks (WSNs) are widely utilized in a variety of applications.
Attackers might interfere with equipment, and eavesdrop on conversations. Attackers can …

[PDF][PDF] A survey and analysis of the image encryption methods

OF Mohammad, MSM Rahim… - International Journal of …, 2017 - academia.edu
At the present time, the protection of multimedia data has become a very important process
which can be achieved by encryption. Basically, so many different techniques have been …

Improved authentication and computation of medical data transmission in the secure IoT using hyperelliptic curve cryptography

B Prasanalakshmi, K Murugan, K Srinivasan… - The Journal of …, 2022 - Springer
Data transmission is a great challenge in any network environment. However, medical data
collected from IoT devices need to be transmitted at high speed to ensure that the …

[PDF][PDF] Research on various cryptography techniques

Y Alemami, MA Mohamed, S Atiewi - International Journal of …, 2019 - researchgate.net
Security plays a critical position in preserving information privacy and secrecy. Many
encryption strategies are available to protect data during transmission or storage. These …

Harris Hawk optimization driven adaptive image encryption integrating Hilbert vibrational decomposition and chaos

VK Sharma, JB Sharma - Applied Soft Computing, 2024 - Elsevier
Image encryption is a technique used to protect the confidentiality of digital images. Existing
encryption algorithms use chaotic maps for generating random sequences. These …

[HTML][HTML] Security for wireless sensor networks using cryptography

P Ramadevi, S Ayyasamy, Y Suryaprakash… - Measurement …, 2023 - Elsevier
Abstract WSNs (Wireless Sensor Networks) are becoming more and more capable with
each passing day. Widespread usage of WSNs is helping mitigate many dangers. Protecting …

The performance of cover image steganography for hidden information within image file using least significant bit algorithm

E Gedkhaw, N Soodtoetong… - 2018 18th International …, 2018 - ieeexplore.ieee.org
The Protection of information with steganography is the art and science of writing hidden is a
hidden data method in various data type to conceal data and unauthorized person or …

LWE: An energy-efficient lightweight encryption algorithm for medical sensors and IoT devices

S Toprak, A Akbulut, MA Aydın, AH Zaim - 2020 - openaccess.iku.edu.tr
In today's world, systems generate and exchange digital data frequently and face a much
broader range of threats than in the past. Within the context of this unsafe ecosystem, it is …

Evaluating the Performance Parameters of Cryptographic Algorithms for IOT-based Devices

U Iftikhar, K Asrar, M Waqas, SA Ali - Engineering, Technology & Applied …, 2021 - etasr.com
Nowadays, terabytes of digital data are generated and sent online every second. However,
securing this extent of information has always been a challenging task. Cryptography is a …

Performance analysis of symmetric key cryptographic algorithms

S Vyakaranal, S Kengond - 2018 international conference on …, 2018 - ieeexplore.ieee.org
Data's security being important aspect of the today's internet is gaining more importance day
by day. With the increase in online data exchange, transactions and payments; secure …