Multi-stage cryptography technique for wireless networks

0Citations
Citations of this article
14Readers
Mendeley users who have this article in their library.

Abstract

The security of wireless communication systems has been the focal subject of research for more than a century. It is a topic of vital importance due to its effectiveness in many fields. Besides, the importance of sending data from one point to another without intercepting by unwanted third-party has become an essential requirement in conjunction with the widespread hacking technologies. This research paper is set out to explore a new technique used in internet of things applications that will ensure a secure wireless communication system. Additionally, it clarifies five distinct cryptographic methods: advanced encryption standard, elliptic curve cryptography, transposition, substitution, and Rivest, Shamir, and Adleman. In addition, the secure wireless communication system combines four of the prementioned techniques to build a highly secure system. Moreover, we managed to elucidate the critical points of our work on the long-range systems into a short yet informative and detailed summary. This paper will extensively cover the following topics: cryptography, cryptographic methods and techniques, software implementation, applications, and advantages of the system.

Cite

CITATION STYLE

APA

Alsaraira, A., Alabed, S., & Saraereh, O. (2024). Multi-stage cryptography technique for wireless networks. Telkomnika (Telecommunication Computing Electronics and Control), 22(3), 499–509. https://doi.org/10.12928/TELKOMNIKA.v22i3.25896

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free