2019
DOI: 10.11591/ijece.v9i5.pp3732-3738
|View full text |Cite
|
Sign up to set email alerts
|

Enhanced encryption technique for secure iot data transmission

Abstract: <div class="page" title="Page 1"><div class="section"><div class="layoutArea"><div class="column"><p><span>Internet of things is the latest booming innovation in the current period, which lets the physical entity to process and intervene with the virtual entities. As all the entities are connected with each other, it generates load of data, which lacks proper security and privacy standards. Cryptography is one of the domains of Network Security, which is one such mechanism t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
13
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 21 publications
(13 citation statements)
references
References 2 publications
0
13
0
Order By: Relevance
“…Figure 7 shows the XOR operation to obtain the second column of the new key [32,33]. The traditional processing of the encryption is based on the idea of finishing the encryption of the recent 128 bits before starting the encryption of the new 128 bits [34]. This concept is shown in Figure 8.…”
Section: Figure 5 the Addroundkey Stepmentioning
confidence: 99%
“…Figure 7 shows the XOR operation to obtain the second column of the new key [32,33]. The traditional processing of the encryption is based on the idea of finishing the encryption of the recent 128 bits before starting the encryption of the new 128 bits [34]. This concept is shown in Figure 8.…”
Section: Figure 5 the Addroundkey Stepmentioning
confidence: 99%
“…An efficient and robust data aggregation scheme is used in the work of Swathi and Yogish [30] for achieving data reliability in IoT. Bhandari and kirubanand [31] used a joint approach of symmetric-asymmetric encryption and Public Key Server to offer secure packet forwarding in IoT assisted applications. Similarly, the work of Oh and Lim [32] has presented an efficient routing protocol using the bloom filtering approach and improved rank concept.…”
Section: A the Backgroundmentioning
confidence: 99%
“…The IOT (Internet of Thing) is a device useful for communicate and exchange information between computerize schemes. Rubesh and kirybanand presented a proposal to increase the security level between IOT and clients by integrate the public key, asymmetric and symmetric cryptography system [22].…”
Section: Introductionmentioning
confidence: 99%