2020
DOI: 10.1016/j.iot.2020.100208
|View full text |Cite
|
Sign up to set email alerts
|

Improved lightweight security approach routing protocol in internet of things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 27 publications
0
5
0
Order By: Relevance
“…The proposed SHECC's performance is evaluated by comparing its encryption and computational times to some baseline algorithms. IRSA, 51 AES KDSB, 52 IBFA, 53 and AES 54 are the techniques used for comparison. The previously proposed IRSA is unsuitable for environments with limited resources, and the model performance is poor when considering more nodes.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…The proposed SHECC's performance is evaluated by comparing its encryption and computational times to some baseline algorithms. IRSA, 51 AES KDSB, 52 IBFA, 53 and AES 54 are the techniques used for comparison. The previously proposed IRSA is unsuitable for environments with limited resources, and the model performance is poor when considering more nodes.…”
Section: Resultsmentioning
confidence: 99%
“…The framework achieved superior outcomes, particularly regarding EC, latency and security strength. Mostafa et al 52 proposed an RSA‐based approach and the advanced encryption standard key dependent S box (AES KDSB) algorithm for IoT. The presented approach used the key‐dependent S‐Box identification to enhance the performance of conventional AES.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The suggested technique outperforms the current methods, as shown by the data below, and this distinction lengthened the lifespan of the network. The approach suggested in [14] was using the S-Box that is key-dependent identi cation eliminates the dynamic S-limitations. box's The subkey was created based on the data block to increase protection against hacking.…”
Section: Related Workmentioning
confidence: 99%
“…Farhan Ahmad et al [9] focused on Cloud integrity and privacy mechanisms relying on hardware tamper-proof and cryptographic data structures that were energy-efficient and proved these mechanisms were suitable for untrusted Cloud environments [9]. In Mostafa et al [10], it was studied how to achieve a better quality of S-box designing and efficient processing time to reject attacks and thus improve secrecy. A cryptography technique based on the security model that helps the AES-based encryption approach to generate secret keys, which are then used to encrypt or decrypt the messages, was proposed in Awan et al [11].…”
Section: Related Workmentioning
confidence: 99%