2018 7th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO) 2018
DOI: 10.1109/icrito.2018.8748293
|View full text |Cite
|
Sign up to set email alerts
|

Proposing an Encryption/ Decryption Scheme for IoT Communications using Binary-bit Sequence and Multistage Encryption

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(3 citation statements)
references
References 1 publication
0
3
0
Order By: Relevance
“…They also demonstrated that their construction has lower computational costs and smaller ciphertext size. Hussain et al [ 24 ] utilized binary-bit sequence and the XOR operation to design an encryption scheme for IoT communication. In their scheme, the data will be encrypted at multiple stages and the required encryption time is shorter than the traditional RSA system.…”
Section: Research Backgroundsmentioning
confidence: 99%
“…They also demonstrated that their construction has lower computational costs and smaller ciphertext size. Hussain et al [ 24 ] utilized binary-bit sequence and the XOR operation to design an encryption scheme for IoT communication. In their scheme, the data will be encrypted at multiple stages and the required encryption time is shorter than the traditional RSA system.…”
Section: Research Backgroundsmentioning
confidence: 99%
“…The distance based encryption technique is applied for in biometrics where the threshold value can be decrypted with private key of another key [2]. Many algorithms use encryption and decryption using a random key generator in IoT communications ASCII and XOR operations are used [4]. Data hiding of image, to hide extra information of different embedded layers the original image is encrypted with less loss of data [5].…”
Section: Related Workmentioning
confidence: 99%
“…Mainly the security measures are established at the communication channel and/or at the system level. The communication channel security is ensured by encryption techniques [1] such as image encryption [2], data encryption [3], IoT encryption [4] etc. Likewise, the system-level security is equipped with a firewall [5], anti-spyware [6], antivirus [7], and network intrusion detection system(NIDS) [8][9][10][11].…”
Section: Introductionmentioning
confidence: 99%