2022
DOI: 10.1007/s11276-022-02903-3
|View full text |Cite
|
Sign up to set email alerts
|

Robust encryption method based on AES-CBC using elliptic curves Diffie–Hellman to secure data in wireless sensor networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 18 publications
(8 citation statements)
references
References 28 publications
0
8
0
Order By: Relevance
“…Information. Through AES encryption method [20], the anti encryption control and structural reorganization of college sports fitness sensitive information are carried out, and the measurement information of college sports fitness sensitive…”
Section: Mixed Encryption Of Sports Fitness Sensitivementioning
confidence: 99%
“…Information. Through AES encryption method [20], the anti encryption control and structural reorganization of college sports fitness sensitive information are carried out, and the measurement information of college sports fitness sensitive…”
Section: Mixed Encryption Of Sports Fitness Sensitivementioning
confidence: 99%
“…The reactive security support system provides a novel solution against various attacks with minimal energy consumption. The attack alert system for each channel works based on the attacker database and rule-based intrusion detection policies [ 49 , 50 ]. These DIDS policies are executed concerning the sensor node’s local decision-making functions and MAC alert functions.…”
Section: Methodsmentioning
confidence: 99%
“…Protecting keys is a significant point in WSNs since messages are communicated/encrypted through channels using these keys wirelessly where adversaries (As) might gain penetration to collected data if the keys are hacked. Some current solutions do not take into account WSN limitations, such as constrained resources when addressing critical resource-constrained nodes [10,11]. Guaranteeing the security of WSN collected data and transmitted remains a real test for developers and researchers [10,12].…”
Section: Introductionmentioning
confidence: 99%
“…Some current solutions do not take into account WSN limitations, such as constrained resources when addressing critical resource-constrained nodes [10,11]. Guaranteeing the security of WSN collected data and transmitted remains a real test for developers and researchers [10,12]. Certainly, the absence of a trustworthy key management protocol does not support applying symmetric cryptographic procedures.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation