2021
DOI: 10.3390/jsan11010002
|View full text |Cite
|
Sign up to set email alerts
|

A Dynamic Light-Weight Symmetric Encryption Algorithm for Secure Data Transmission via BLE Beacons

Abstract: Pervasive sensing with Body Sensor Networks (BSNs) is a promising technology for continuous health monitoring. Since the sensor nodes are resource-limited, on-node processing and advertisement of digested information via BLE beacon is a promising technique that can enable a node gateway to communicate with more sensor nodes and extend the sensor node’s lifetime before requiring recharging. This study proposes a Dynamic Light-weight Symmetric (DLS) encryption algorithm designed and developed to address the chal… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
10
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
4
2

Relationship

0
10

Authors

Journals

citations
Cited by 16 publications
(10 citation statements)
references
References 73 publications
0
10
0
Order By: Relevance
“…By using secure communication protocols such as HTTPS, data is encrypted before being sent over the network, thus minimizing the risk of eavesdropping or falsification of data during transmission (Munjal & Bhatia, 2023) Companies can increase security and protect their financial information by implementing robust encryption methods when storing and transmitting financial data. However, it is also essential to ensure that proper security policies are followed, encryption keys are stored securely, and other security measures are implemented thoroughly to maintain the integrity and confidentiality of financial data in a cloud computing environment (Banani et al, 2021)…”
Section: Discussionmentioning
confidence: 99%
“…By using secure communication protocols such as HTTPS, data is encrypted before being sent over the network, thus minimizing the risk of eavesdropping or falsification of data during transmission (Munjal & Bhatia, 2023) Companies can increase security and protect their financial information by implementing robust encryption methods when storing and transmitting financial data. However, it is also essential to ensure that proper security policies are followed, encryption keys are stored securely, and other security measures are implemented thoroughly to maintain the integrity and confidentiality of financial data in a cloud computing environment (Banani et al, 2021)…”
Section: Discussionmentioning
confidence: 99%
“…Banani et al (23) employed the standard performance measures (memory occupied, execution time, and power consumption) to trade off among the various algorithms, including TEA. They did this by referring to the security and performance evaluation criteria.…”
Section: Related Workmentioning
confidence: 99%
“…1)Two different methods are used in this evaluation(Banani et al, 2021) (Zakaria et al, 2022), the plaintext sensitivity test and the key sensitivity test. To evaluate the produced ciphertext, the plaintext sensitivity test is used.…”
mentioning
confidence: 99%