2023
DOI: 10.1016/j.asej.2022.101866
|View full text |Cite
|
Sign up to set email alerts
|

Enabling secure data transmission for wireless sensor networks based IoT applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
12
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 32 publications
(17 citation statements)
references
References 31 publications
0
12
0
Order By: Relevance
“…IoT devices like Hardware (MICAz mote) and Riverbed (OPNET) Modeler use Camellia. The IoT platform uses hardware (MICAz mote) to enable lowpower and wireless sensor networks [28]. Riverbed (OP-NET) Modeler is a modeling and analysis environment for communication networks and distributed systems [28].…”
Section: Relationship Between Iot Devices and Camellia Algorithmmentioning
confidence: 99%
See 1 more Smart Citation
“…IoT devices like Hardware (MICAz mote) and Riverbed (OPNET) Modeler use Camellia. The IoT platform uses hardware (MICAz mote) to enable lowpower and wireless sensor networks [28]. Riverbed (OP-NET) Modeler is a modeling and analysis environment for communication networks and distributed systems [28].…”
Section: Relationship Between Iot Devices and Camellia Algorithmmentioning
confidence: 99%
“…The IoT platform uses hardware (MICAz mote) to enable lowpower and wireless sensor networks [28]. Riverbed (OP-NET) Modeler is a modeling and analysis environment for communication networks and distributed systems [28]. For security and privacy, hardware (MICAz mote) and Riverbed (OPNET) embed a Camellia algorithm in Random Access Memory (RAM) and Read-Only Memory (ROM) [28].…”
Section: Relationship Between Iot Devices and Camellia Algorithmmentioning
confidence: 99%
“…This study elucidates that symmetric cryptographic algorithms typically require fewer resources and less computational time relative to their asymmetric counterparts. Lastly, Panahi and Bayılmış [26] examines the Camellia algorithm's performance by evaluating the end-toend delay across different payloads. The findings indicate that while the Camellia algorithm is robust, it incurs higher usage of read-only memory (ROM) and longer processing times when juxtaposed with other algorithms within the study.…”
Section: Related Workmentioning
confidence: 99%
“…The sixth pertains to Man-in-The-Middle attacks, where attackers can intercept and potentially modify or steal data [18]. Numerous studies have proposed security mechanisms for IoT to address these vulnerabilities [19][20][21][22][23], but comprehensive solutions that tackle all these challenges remain elusive, with each approach having its strengths and weaknesses.…”
Section: Introductionmentioning
confidence: 99%