2021
DOI: 10.37965/jait.2021.12004
|View full text |Cite
|
Sign up to set email alerts
|

A data transmission approach based on ant colony optimization and threshold proxy re-encryption in WSNs

Abstract: Wireless sensor networks have become increasingly popular due to the rapid growth of the Internet of Things. As open wireless transmission mediums are easy to attack, security is one of the primary design concerns for wireless sensor networks. Current solutions consider routing and data encryption as two isolated issues, providing incomplete security. Therefore, in this paper we divide the WSN communication process into a data path selection phase and a data encryption phase. By proposing an improved transmiss… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 17 publications
(12 citation statements)
references
References 18 publications
0
12
0
Order By: Relevance
“…The threshold secret sharing algorithm is introduced to generate a set of reencryption key fragments composed of random numbers at the source node. The performance of the model is confirmed via simulation studies [3].…”
Section: Deployment Of Ai In Application Domainsmentioning
confidence: 68%
“…The threshold secret sharing algorithm is introduced to generate a set of reencryption key fragments composed of random numbers at the source node. The performance of the model is confirmed via simulation studies [3].…”
Section: Deployment Of Ai In Application Domainsmentioning
confidence: 68%
“…So this suggested algorithm shows better results than previously developed ransomware analysis and detection algorithms. ere are various applications of machine learning and deep learning in different applied domains of artificial intelligence [24,25].…”
Section: Literature Reviewmentioning
confidence: 99%
“…(2 When A encrypts the information m with its encryption key, the ciphertext received by B is equivalent to A's unique imprint. Unlike the digital signature B in the usual sense, A's identity cannot be confirmed immediately [11]. The received ciphertext is encrypted with B's encryption key and sent to A .…”
Section: Shamir Agreementmentioning
confidence: 99%