With the rise of IoT technology, the usage of IoT devices and systems is steadily increasing. However, concerns over excessive overhead and data security in IoT perceptual layer communication are becoming increasingly...
详细信息
This paper briefly introduces wireless sensor networks (WSNs) and proposes an enhancement to a block encryption algorithm using chaotic mapping principles. The proposed encryption algorithm was tested on an establishe...
详细信息
Our work presents a novel approach to creating new encryption algorithms. We were inspired by genetic algorithms based on the Darwin evolution theory. As the method of invention, we chose the crossover technique. We a...
详细信息
Wireless sensor networks are vulnerable to attacks that can compromise the data transmitted through them. To ensure security and confidentiality, encryption algorithms are necessary. To evaluate the effectiveness of e...
详细信息
The Internet of Things (IoT) consists of a network of resource-constrained devices, sensors, and machines that are interconnected and communicate via the internet. However, these devices often struggle while handling ...
详细信息
The modeling of side channel leaks of power consumption during executing cryptographic algorithms is one of the perspective research areas in the field of security of cyber-physical systems. The use of algorithmically...
详细信息
The rise of quantum computing poses a grave threat to current cryptographic methods. While Quantum Key Distribution (QKD) offers a potential solution, guaranteeing its security in real-world implementations remains ch...
详细信息
The susceptibility of digital image communication is a crucial issue in the domain of digital transfer. The image encryption literature has presented numerous cryptosystems to enhance communication security. Image enc...
详细信息
The use of encryption algorithms is more and more turning into a crucial issue of defensive wireless networks. encryption algorithms may be used to cozy facts that is transferred over a Wi-Fi network while also presen...
详细信息
This study presents a comprehensive performance analysis of symmetric encryption algorithms in the context of time-critical cybersecurity applications. We evaluate a diverse set of algorithms, including established st...
详细信息
暂无评论