2022 International Conference on Computer Science and Software Engineering (CSASE) 2022
DOI: 10.1109/csase51777.2022.9759589
|View full text |Cite
|
Sign up to set email alerts
|

A Lightweight Hybrid Cryptographic Algorithm for WSNs Tested by the Diehard Tests and the Raspberry Pi

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
2
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 7 publications
0
2
0
Order By: Relevance
“…Recognizing these challenges, this paper explores a novel streetthe mixing of encryption, virtual signatures, and watermarking algorithmsto forge a comprehensive framework for the security of digital files. When a sender 'A' uploads a record digitally, a digital signature is generated using the SHA-256 integrated digital signature algorithm [11]. In parallel, records is encrypted by using the proposed hybrid encryption approach Enhanced DES RSA algorithm.…”
Section: Methodsmentioning
confidence: 99%
“…Recognizing these challenges, this paper explores a novel streetthe mixing of encryption, virtual signatures, and watermarking algorithmsto forge a comprehensive framework for the security of digital files. When a sender 'A' uploads a record digitally, a digital signature is generated using the SHA-256 integrated digital signature algorithm [11]. In parallel, records is encrypted by using the proposed hybrid encryption approach Enhanced DES RSA algorithm.…”
Section: Methodsmentioning
confidence: 99%
“…Abdulhameed et al [7] proposed a hybrid algorithm. The authors claimed that their protocol provides confidentiality, authentication and integrity.…”
Section: Keys Exchange Studies Of Related Workmentioning
confidence: 99%
“…Second, key information over-burden ought to be limited since each data item moved consumes energy, decreasing the sensors' lifetime. Because of the nature of the radio frequency for wireless, anybody can eavesdrop or take part in the connection [7]. Thirdly, the randomization of the key should be appropriate to secure the network connection [8].…”
Section: Introductionmentioning
confidence: 99%
“…The researchers examined the proposed system's security level but not its performance in terms of throughput or packet delivery ratio. In [17], the authors suggested a hybrid security algorithm. It makes use of both symmetric and asymmetric key techniques to offer high-security encryption and decryption processes that are quick.…”
Section: Literature Review and Problem Statementmentioning
confidence: 99%