2022
DOI: 10.24996/ijs.2022.63.11.38
|View full text |Cite
|
Sign up to set email alerts
|

Encryption Symmetric secret Key in Wireless Sensor Network Using AES Algorithm

Abstract: Wireless sensor network (WSN) security is an important component for protecting data from an attacker. For improving security, cryptography technologies are divided into two kinds: symmetric and asymmetric. Therefore, the implementation of protocols for generating a secret key takes a long time in comparison to the sensor’s limitations, which  decrease network throughput because they are based on an asymmetric method. The asymmetric algorithms are complex and decrease network throughput. In this paper, an encr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(4 citation statements)
references
References 8 publications
0
4
0
Order By: Relevance
“…Key generation technique is one of the most important factors for improving network security [8,15]. Public-key schemes are asymmetric and require two keys, unlike typical one-key encryption based on mathematical functions [2]. Passwords can be lost, stolen, or compromised, which is the main drawback of using a key generation approach to ensure security.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…Key generation technique is one of the most important factors for improving network security [8,15]. Public-key schemes are asymmetric and require two keys, unlike typical one-key encryption based on mathematical functions [2]. Passwords can be lost, stolen, or compromised, which is the main drawback of using a key generation approach to ensure security.…”
Section: Related Workmentioning
confidence: 99%
“…The basis for user authentication in conventional cryptosystems is holding secret keys; this mechanism breaks down if the secrets are shared with unauthorized users. Furthermore, keys cannot offer non-repudiation because they might be misplaced, stolen, or forgotten [2]. The degree of security of a symmetric or asymmetric encryption system depends on how secret the cryptographic key or private key is [1,2].…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations