2021
DOI: 10.1109/access.2021.3130005
|View full text |Cite
|
Sign up to set email alerts
|

Improved Blowfish Algorithm-Based Secure Routing Technique in IoT-Based WSN

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 32 publications
(8 citation statements)
references
References 45 publications
0
8
0
Order By: Relevance
“…In recent years, various techniques and algorithms have been developed to enhance data security which include Blowfish, a symmetric encryption algorithm with a 64-bit key where the use of this algorithm in IoT applications during the transmission of data over the internet has an advantage as it protects the encrypted data transmitted over the internet by using XOR operation [4]. A method was used to translate images and text data which is used for security analysis which was conducted as an avalanche effect and correlation coefficient test which meets the required properties of block cipher text condition for security analysis [5].…”
Section: Related Literaturementioning
confidence: 99%
“…In recent years, various techniques and algorithms have been developed to enhance data security which include Blowfish, a symmetric encryption algorithm with a 64-bit key where the use of this algorithm in IoT applications during the transmission of data over the internet has an advantage as it protects the encrypted data transmitted over the internet by using XOR operation [4]. A method was used to translate images and text data which is used for security analysis which was conducted as an avalanche effect and correlation coefficient test which meets the required properties of block cipher text condition for security analysis [5].…”
Section: Related Literaturementioning
confidence: 99%
“…Many different strategies are being utilized by computing professionals in order to advance the field of research in IoT technology [ 52 , 53 , 54 , 55 , 56 ]. In particular, machine learning and artificial intelligence have played key roles in advancing this emerging field of computer science and will continue to do so in new and exciting ways [ 57 ].…”
Section: Introductionmentioning
confidence: 99%
“…The proposed SHECC's performance is evaluated by comparing its encryption and computational times to some baseline algorithms. IRSA, 51 AES KDSB, 52 IBFA, 53 and AES 54 are the techniques used for comparison. The previously proposed IRSA is unsuitable for environments with limited resources, and the model performance is poor when considering more nodes.…”
Section: Resultsmentioning
confidence: 99%
“…The model was efficient in terms of delay, throughput, trustworthiness, false positive, delivery rate, and detection rate. Alotaibi 53 exemplified a secure routing model by selecting an optimal path with a cryptographic approach. Initially, the approach chosen optimal paths for performing transmission securely using the crossover mutated marriage in honey bee (CM‐MH) algorithm.…”
Section: Literature Reviewmentioning
confidence: 99%