2021
DOI: 10.21533/pen.v10i1.2608
|View full text |Cite
|
Sign up to set email alerts
|

Secure wireless sensor network using cryptographic technique based hybrid genetic firefly algorithm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 0 publications
0
2
0
Order By: Relevance
“…The phrase "Internet of Things" is made up of two words: "Internet," which refers to protocols, communication, and networks; and "things," which refers to hardware components such as sensors and actuators [3]. The goal of the IoT is to improve people's lives by making everything in the world such as smart phone, smart TV, robots, motor vehicles, light bulbs, air conditioners, shelf space in your grocery store that are connected, monitored, actuating, and interacting among themselves without human intervention to perform actions that affect [4,5]. IoT is a solution that improves the medical outcome, make shopping safe and enjoyable, or make products faster, IoT entered in several domains [6].…”
mentioning
confidence: 99%
“…The phrase "Internet of Things" is made up of two words: "Internet," which refers to protocols, communication, and networks; and "things," which refers to hardware components such as sensors and actuators [3]. The goal of the IoT is to improve people's lives by making everything in the world such as smart phone, smart TV, robots, motor vehicles, light bulbs, air conditioners, shelf space in your grocery store that are connected, monitored, actuating, and interacting among themselves without human intervention to perform actions that affect [4,5]. IoT is a solution that improves the medical outcome, make shopping safe and enjoyable, or make products faster, IoT entered in several domains [6].…”
mentioning
confidence: 99%
“…By using the action on a modular group on a projective line and finite field Siddiqui et al in [12] construct the S-box while Arshad et al in [13] used mobius group over finite field to construct the secure substitution box. Chaotic permutation [14], optimization technique [15], graph theory [16], Hilbert curve [17], elliptic curve [18,19], the action of matrices on Galois field [20], Cubic Modular Transform and the Sine Function [21] and firefly algorithm [22] are other techniques to construct the Sboxes with reasonable cryptographic properties of Sbox.…”
Section: Introductionmentioning
confidence: 99%