Prisec: Comparison of symmetric key algorithms for iot devices

DAF Saraiva, VRQ Leithardt, D de Paula… - Sensors, 2019 - mdpi.com
With the growing number of heterogeneous resource-constrained devices connected to the
Internet, it becomes increasingly challenging to secure the privacy and protection of data …

Smart city energy efficient data privacy preservation protocol based on biometrics and fuzzy commitment scheme

VO Nyangaresi, ZA Abduljabbar, KAA Mutlaq… - Scientific Reports, 2024 - nature.com
Advancements in cloud computing, flying ad-hoc networks, wireless sensor networks,
artificial intelligence, big data, 5th generation mobile network and internet of things have led …

Stochastic Bat Optimization Model for Secured WSN with Energy‐Aware Quantized Indexive Clustering

J Paruvathavardhini, B Sargunam - Journal of Sensors, 2023 - Wiley Online Library
The wireless sensor networks (WSNs) with dynamic topology communication among the
sensor nodes is vulnerable to numerous attacks. As they have limited power, there arises a …

[PDF][PDF] A lightweight and secure multilayer authentication scheme for wireless body area networks in healthcare system

M Fareed, AA Yassin - Int. J. Electr. Comput. Eng., 2023 - academia.edu
Wireless body area networks (WBANs) have lately been combined with different healthcare
equipment to monitor patients' health status and communicate information with their …

A review on energy efficient routing protocols and security techniques for wireless sensor networks

J Paruvathavardhini, B Sargunam… - Applied Mechanics and …, 2023 - Trans Tech Publ
Nowadays Wireless Sensor Networks (WSNs) are a very promising device to monitor
environmental events, which are used in many application areas such as agriculture …

A Review on IoTs Applications and Security Threats via Data Transfer over Networks

BM Radhi, MA Hussain, ZA Abduljabbar… - Computer Science On …, 2024 - Springer
The concept of the “Internet of Things,” which states that everything is connected to
everything else and that everything interacts with everything else, is a fascinating …

[HTML][HTML] In-depth study of lightweight block ciphers: Performance assessment and implementation on sensor motes

A Hkiri, M Karmani, FH Alasmary, OB Bahri… - Alexandria Engineering …, 2025 - Elsevier
In the rapidly evolving landscape of the Internet of Things (IoT) and Wireless Sensor
Networks (WSN), the need for secure and efficient data transmission is paramount. Block …

Comprehensive Challenges to E-government in Iraq

HK Abdali, MA Hussain, ZA Abduljabbar… - Computer Science On …, 2024 - Springer
In recent years, governments and commercial organizations all over the world have
endeavored to explore new searches, opportunities, and investments for making their …

Stealing complex network attack detection method considering security situation awareness

B Xi, H Liu, B Hou, Y Wang, Y Guo - Plos one, 2024 - journals.plos.org
Tracking and detection have brought great challenges to network security. Therefore, this
paper proposes a monitoring method of stealthy complex network attacks considering …

[PDF][PDF] Analysis the effect of dynamic clustering and lightweight symmetric encryption approaches on network lifetime in WSNs

T Abu-Ain, R AHMAD, EA Sundararajan - 2021 - scholar.archive.org
Energy consumption and security e ciency are still main challenges in Wireless Sensor
Networks (WSNs) due to their hardware resource-constrained nature. The 6LoWPAN …