2023
DOI: 10.3390/electronics12041011
|View full text |Cite
|
Sign up to set email alerts
|

A Perfect Security Key Management Method for Hierarchical Wireless Sensor Networks in Medical Environments

Abstract: Wireless sensor networks (WSNs) have developed during the past twenty years as a result of the accessibility of inexpensive, short-range, and simple-to-deploy sensors. A WSN technology sends the real-time sense information of a specific monitoring environment to a backend for processing and analysis. Security and management concerns have become hot topics with WSN systems due to the popularity of wireless communication channels. A large number of sensors are dispersed in an unmonitored medical environment, mak… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
9

Relationship

2
7

Authors

Journals

citations
Cited by 13 publications
(7 citation statements)
references
References 41 publications
0
3
0
Order By: Relevance
“…Profesor Ronald Rivest pada bulan Desember 1994 pertama kali mengumumkan Algoritma Rivest Code 5 (RC5) yang ia rancang (Muhajjar et al, 2023). Semenjak diumumkan, RC5 telah menjadi perhatian para peneliti pada bidang enkripsi untuk menguji ketahanan yang diberikan oleh algoritma RC5 dalam mengamankan pesan (RSA Laboratory TR-602).…”
Section: B Rivest Code 5 (Rc5)unclassified
“…Profesor Ronald Rivest pada bulan Desember 1994 pertama kali mengumumkan Algoritma Rivest Code 5 (RC5) yang ia rancang (Muhajjar et al, 2023). Semenjak diumumkan, RC5 telah menjadi perhatian para peneliti pada bidang enkripsi untuk menguji ketahanan yang diberikan oleh algoritma RC5 dalam mengamankan pesan (RSA Laboratory TR-602).…”
Section: B Rivest Code 5 (Rc5)unclassified
“…The challenge lies in achieving quick and reliable communication among multiple devices without interruptions. Comparing algorithms based on key size, message size, and execution time is crucial [18,19]. Vulnerabilities in the long key RSA algorithm lead to encryption delays and complex operations.…”
Section: Literature Review On Commerce Transaction Requests Encryptionmentioning
confidence: 99%
“…Table 11 provides a comprehensive listing of the parameters employed in the proposed method of S-box creation, along with their corresponding ranges and key spaces. The magnitude of the key space offers a significant protection against unauthorized access attempts [73,74]. The sheer number of possible keys makes it highly improbable for an attacker to stumble upon the correct key by random guessing or exhaustive search.…”
Section: J Key Space Analysismentioning
confidence: 99%