Towards the enhancement of AES IP security using hardware obfuscation technique: A practical approach for secure data transmission in IoT.
Surbhi ChhabraKusum LataPublished in: Secur. Priv. (2022)
Keyphrases
- security policies
- data transmission
- security requirements
- data acquisition
- advanced encryption standard
- network security
- computer networks
- security analysis
- security mechanisms
- wireless sensor networks
- cryptographic algorithms
- key management
- real time
- low cost
- routing protocol
- energy consumption
- ip networks
- communication networks
- encryption algorithm
- encryption algorithms
- multi hop
- security protocols
- base station
- network layer
- s box
- data collection
- monitoring system
- cloud computing
- data processing
- data mining
- encryption decryption
- block cipher
- sensor nodes
- intrusion detection
- encryption scheme
- energy efficiency
- sensor networks
- security level
- private key
- secret key
- end to end
- mobile devices
- data analysis
- information security
- hash functions