QoS-based routing protocol and load balancing in wireless sensor networks using the markov model and the artificial bee colony algorithm

SS Sefati, M Abdi, A Ghaffari - Peer-to-Peer Networking and Applications, 2023 - Springer
Due to resource constraints in wireless sensor networks (WSNs), energy consumption and
networks' lifetime are considered significant challenges. Because sensors have a tiny …

A lightweight block cipher technique for IoT based E-healthcare system security

K Chatterjee, RRK Chaudhary, A Singh - Multimedia Tools and …, 2022 - Springer
All the real and virtual IoT devices are connected to provide intelligent and decision-making
services. Each IoT based application is designed for some specific purpose and function …

An overview of the status, challenges, and trends of the advanced crypto algorithms to enhance the security of wireless networks

RA Al-Kaabi, HF Fakhruldeen… - AIP Conference …, 2023 - pubs.aip.org
In modern applications, such as real-time applications, high-speed end-to-end transmission
sometimes conflicts with the requirements of confidentiality and security. One of the most …

A Lightweight Cryptographic Algorithm Based on DNA Computing for IoT Devices

GRS Qaid, NS Ebrahim - Security and Communication …, 2023 - Wiley Online Library
Internet of Things (IoT) applications are used in almost every part of our life, so it is important
to protect the sensitive data and information that is transmitted over wireless networks such …

Lightweight cryptography concepts and algorithms: A survey

ZA Mohammed, KA Hussein - 2023 Second International …, 2023 - ieeexplore.ieee.org
Evolutionary technologies have been raised under the umbrella of the Internet, such as
Cloud computing, The Internet of Things (IoT), and The Internet of Everything (IoE). All these …

NLBSIT: A new lightweight block cipher design for securing data in IOT devices

A Alahdal, GA AL-Rummana, GN Shinde… - … Journal of Computer …, 2020 - papers.ssrn.com
Modern applications consist of different types of control devices and sensors that connect to
the Internet. These applications are new approved technologies called the Internet of …

[PDF][PDF] The status, challenges, and future trends of advanced crypto algorithms for wireless network security: An Overview

RA Al-Kaabi, HF Fakhruldeen, KEK Alhamami - Proc. EasyChair, 2021 - easychair.org
Modern applications, particularly real-time applications, require high-speed end-to-end
transmission, which regularly conflicts with the requirements of confidentiality and security …

[PDF][PDF] ENHANCED BIT DISAGREEMENT FOR THE INTERNET OF THINGS USING PHYSICAL LAYER KEY GENERATION BASED ON MODIFIED WINDOWS

R Singh, SK Tiwari - measurements, 2023 - machineintelligenceresearchs.com
Abstract The Internet of Things (IoT) is a paradigm where myriad devices in households,
vehicles, and industrial settings interconnect. The proliferation of interconnected devices …

Simulation of RC5 Algorithm to Provide Security for WLAN, Peer-to-Peer

NA Hussein - Al-Kitab Journal for Pure Sciences, 2024 - isnra.net
Abstract Information security is a significant viewpoint in different areas of correspondence.
This paper manages information encryption as large numbers of data correspondence rely …

[PDF][PDF] Faster Big Data Encryption Technique Using Key Generation

GA Al-Rummana, AHA Al-Ahdal, GN Shinde - International Journal, 2021 - academia.edu
In the present study, an algorithm for big data encryption has been designed which is
concerned with encrypting data in a short time and in a safe manner and difficult to be …