Asset Details
MbrlCatalogueTitleDetail
Do you wish to reserve the book?
Improved Secure Encryption with Energy Optimization Using Random Permutation Pseudo Algorithm Based on Internet of Thing in Wireless Sensor Networks
by
Tyagi, Neha
, Verma, Chaman
, Kathole, Atul B.
, Goyal, S. B.
, Arya, Leena
, Suciu, George
, Rajawat, Anand Singh
, Raboaca, Maria Simona
, Nagaraj, S.
, Mihaltan, Traian Candin
in
Agreements
/ Algorithms
/ attacks
/ cluster mechanism
/ Communication
/ Confidentiality
/ Cryptography
/ Data encryption
/ Data integrity
/ Energy efficiency
/ Internet
/ IoT
/ Mathematical optimization
/ Methods
/ Privacy
/ security
/ Security management
/ Sensors
/ Software
/ time consumption
/ wireless sensor network (WSN)
/ Wireless sensor networks
2023
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
Improved Secure Encryption with Energy Optimization Using Random Permutation Pseudo Algorithm Based on Internet of Thing in Wireless Sensor Networks
by
Tyagi, Neha
, Verma, Chaman
, Kathole, Atul B.
, Goyal, S. B.
, Arya, Leena
, Suciu, George
, Rajawat, Anand Singh
, Raboaca, Maria Simona
, Nagaraj, S.
, Mihaltan, Traian Candin
in
Agreements
/ Algorithms
/ attacks
/ cluster mechanism
/ Communication
/ Confidentiality
/ Cryptography
/ Data encryption
/ Data integrity
/ Energy efficiency
/ Internet
/ IoT
/ Mathematical optimization
/ Methods
/ Privacy
/ security
/ Security management
/ Sensors
/ Software
/ time consumption
/ wireless sensor network (WSN)
/ Wireless sensor networks
2023
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
Improved Secure Encryption with Energy Optimization Using Random Permutation Pseudo Algorithm Based on Internet of Thing in Wireless Sensor Networks
by
Tyagi, Neha
, Verma, Chaman
, Kathole, Atul B.
, Goyal, S. B.
, Arya, Leena
, Suciu, George
, Rajawat, Anand Singh
, Raboaca, Maria Simona
, Nagaraj, S.
, Mihaltan, Traian Candin
in
Agreements
/ Algorithms
/ attacks
/ cluster mechanism
/ Communication
/ Confidentiality
/ Cryptography
/ Data encryption
/ Data integrity
/ Energy efficiency
/ Internet
/ IoT
/ Mathematical optimization
/ Methods
/ Privacy
/ security
/ Security management
/ Sensors
/ Software
/ time consumption
/ wireless sensor network (WSN)
/ Wireless sensor networks
2023
Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
Improved Secure Encryption with Energy Optimization Using Random Permutation Pseudo Algorithm Based on Internet of Thing in Wireless Sensor Networks
Journal Article
Improved Secure Encryption with Energy Optimization Using Random Permutation Pseudo Algorithm Based on Internet of Thing in Wireless Sensor Networks
2023
Request Book From Autostore
and Choose the Collection Method
Overview
The use of wireless and Internet of Things (IoT) devices is growing rapidly. Because of this expansion, nowadays, mobile apps are integrated into low-cost, low-power platforms. Low-power, inexpensive sensor nodes are used to facilitate this integration. Given that they self-organize, these systems qualify as IoT-based wireless sensor networks. WSNs have gained tremendous popularity in recent years, but they are also subject to security breaches from multiple entities. WSNs pose various challenges, such as the possibility of numerous attacks, their innate power, and their unfeasibility for use in standard security solutions. In this paper, to overcome these issues, we propose the secure encryption random permutation pseudo algorithm (SERPPA) for achieving network security and energy consumption. SERPPA contains a major entity known as a cluster head responsible for backing up and monitoring the activities of the nodes in the network. The proposed work performance is compared with other work based on secure IoT devices. The calculation metrics taken for consideration are energy, overheads, computation cost, and time consumption. The obtained results show that the proposed SERPPA is very significant in comparison to the existing works, such as GKA (Group Key Agreement) and MPKE (Multipath Key Establishment), in terms of data transfer rate, energy consumption and throughput.
This website uses cookies to ensure you get the best experience on our website.