2021
DOI: 10.11591/ijeecs.v22.i1.pp361-368
|View full text |Cite
|
Sign up to set email alerts
|

Adaptive security approach for wireless sensor network using RSA algorithm

Abstract: A type of distributed and self-regulating network is the wireless sensor network (WSN). The sensor nodes have limited computing capabilities, memory, battery power are needed to ensure a strong security design. In this paper, an adaptive cryptographic scheme for WSN that is operating on routing ad hoc on-demand vector routing (AODV) protocol. The adaptive term refers to the adopted mechanism between heavy and light asymmetric cryptography techniques of RSA. The heavy technique adopts the complete version of RS… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 10 publications
(10 reference statements)
0
2
0
Order By: Relevance
“…Its advantage is that the algorithm has high performance, because its time complexity is 0, where n is all the data, h is the number of clusters, t is the number of iterations of the algorithm (t <n) and the geometric properties of the data all affect the process of the K-means algorithm. Selection of the initial value optimization algorithm, Bradley optimization algorithm, Lichuan genetic algorithm , proposed many optimization algorithms, such as combining antivirus with K-means optimization, o re algorithm, etc [1][2].…”
Section: Literature Reviewmentioning
confidence: 99%
“…Its advantage is that the algorithm has high performance, because its time complexity is 0, where n is all the data, h is the number of clusters, t is the number of iterations of the algorithm (t <n) and the geometric properties of the data all affect the process of the K-means algorithm. Selection of the initial value optimization algorithm, Bradley optimization algorithm, Lichuan genetic algorithm , proposed many optimization algorithms, such as combining antivirus with K-means optimization, o re algorithm, etc [1][2].…”
Section: Literature Reviewmentioning
confidence: 99%
“…This model will definitely assure safe delivery especially for high budget products like electronic equipment and it can be designed in various sizes suiting Indonesian J Elec Eng & Comp Sci ISSN: 2502-4752  the majorly ordered expensive products [21]- [23]. A survey has been conducted among hundreds of people including customers faced scam issues, delivering agencies and workers of the delivering companies [24]- [26]. The result Figure 7 showed that most people think that this system could prevent scam in product delivery and prove beneficial to customers as well as to the companies.…”
Section: Benefits Of the Modelmentioning
confidence: 99%