QoS-based routing protocol and load balancing in wireless sensor networks using the markov model and the artificial bee colony algorithm

SS Sefati, M Abdi, A Ghaffari - Peer-to-Peer Networking and Applications, 2023 - Springer
Due to resource constraints in wireless sensor networks (WSNs), energy consumption and
networks' lifetime are considered significant challenges. Because sensors have a tiny …

A lightweight block cipher technique for IoT based E-healthcare system security

K Chatterjee, RRK Chaudhary, A Singh - Multimedia Tools and …, 2022 - Springer
All the real and virtual IoT devices are connected to provide intelligent and decision-making
services. Each IoT based application is designed for some specific purpose and function …

An overview of the status, challenges, and trends of the advanced crypto algorithms to enhance the security of wireless networks

RA Al-Kaabi, HF Fakhruldeen… - AIP Conference …, 2023 - pubs.aip.org
In modern applications, such as real-time applications, high-speed end-to-end transmission
sometimes conflicts with the requirements of confidentiality and security. One of the most …

A Lightweight Cryptographic Algorithm Based on DNA Computing for IoT Devices

GRS Qaid, NS Ebrahim - Security and Communication …, 2023 - Wiley Online Library
Internet of Things (IoT) applications are used in almost every part of our life, so it is important
to protect the sensitive data and information that is transmitted over wireless networks such …

Lightweight cryptography concepts and algorithms: A survey

ZA Mohammed, KA Hussein - 2023 Second International …, 2023 - ieeexplore.ieee.org
Evolutionary technologies have been raised under the umbrella of the Internet, such as
Cloud computing, The Internet of Things (IoT), and The Internet of Everything (IoE). All these …

NLBSIT: A new lightweight block cipher design for securing data in IOT devices

A Alahdal, GA AL-Rummana, GN Shinde… - … Journal of Computer …, 2020 - papers.ssrn.com
Modern applications consist of different types of control devices and sensors that connect to
the Internet. These applications are new approved technologies called the Internet of …

ENHANCED BIT DISAGREEMENT FOR THE INTERNET OF THINGS USING PHYSICAL LAYER KEY GENERATION BASED ON MODIFIED WINDOWS

R Singh, SK Tiwari - Machine Intelligence …, 2024 - machineintelligenceresearchs.com
The Internet of Things (IoT) is a paradigm where myriad devices in households, vehicles,
and industrial settings interconnect. The proliferation of interconnected devices poses …

[PDF][PDF] The status, challenges, and future trends of advanced crypto algorithms for wireless network security: An Overview

R Kaabi, H Fakhruldeen, K Alhamami - Proc. EasyChair, 2021 - easychair.org
Modern applications, particularly real-time applications, require high-speed end-to-end
transmission, which regularly conflicts with the requirements of confidentiality and security …

[PDF][PDF] NLBCIT: A Novel Approach for Securing data in IoT devices based on a Lightweight Block Cipher Design Algorithms

A Alahdal, D Sai Kumar, PV Sudha, AHA Al-ahdal… - afjbs.com
Modern applications incorporate various control devices and sensors that connect to the
Internet, collectively known as the Internet of Things (IoT). These innovative technologies …

Simulation of RC5 Algorithm to Provide Security for WLAN, Peer-to-Peer

NA Hussein - Al-Kitab Journal for Pure Sciences, 2024 - isnra.net
Abstract Information security is a significant viewpoint in different areas of correspondence.
This paper manages information encryption as large numbers of data correspondence rely …