2022
DOI: 10.11591/ijeecs.v25.i1.pp347-357
|View full text |Cite
|
Sign up to set email alerts
|

Data transmitted encryption for clustering protocol in heterogeneous wireless sensor networks

Abstract: In this paper, elliptic curves Diffie Hellman-Rivest Shamir Adleman algorithm (ECDH-RSA) is a novel encryption method was proposed, which based on ECDH and RSA algorithm to secure transmitted data in heterogeneous wireless sensor networks (HWSNs). The proposed encryption is built under cheesboard clustering routing method (CCRM). The CCRM used to regulate energy consumption of the nodes. To achieve good scalability and performance by using limited powerful max-end sensors besides a large powerful of min-end se… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
5
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 19 publications
0
5
0
Order By: Relevance
“…Likewise, the same costly assumption was made by [6] in the establishment of communication between two nodes. The author in [41] suggested the encryption algorithm Elliptic-Curves-Diffie Hellman-Rivest-Shamir-Adleman (ECDH-RSA). The suggested encryption is used under the chessboard clustering routing method (CCRM).…”
Section: Related Workmentioning
confidence: 99%
“…Likewise, the same costly assumption was made by [6] in the establishment of communication between two nodes. The author in [41] suggested the encryption algorithm Elliptic-Curves-Diffie Hellman-Rivest-Shamir-Adleman (ECDH-RSA). The suggested encryption is used under the chessboard clustering routing method (CCRM).…”
Section: Related Workmentioning
confidence: 99%
“…Public key cryptography (PKC) is one key encryption that is used for encryption and another one for decryption; also called asymmetric encryption. Hash Functions is a mathematical transformation that is used to irreversibly "encrypt" information, which is used for message integrity [7], [8]. Another methodology in the domain of cryptography is based on deoxyribonucleic acid (DNA) sequences.…”
Section: Cryptographic Backgroundmentioning
confidence: 99%
“…The private key-based encryption techniques (such as AES, DES, etc.) don't require a lot of compute or memory, but they do demand that the keys be pre-stored on nodes that are vulnerable to attack when left in unguarded situations [4][5][6].…”
Section: Introductionmentioning
confidence: 99%