×
In this paper, we tested different security configurations using the two most used transport protocols (HTTP and MQTT). We measured their effects on five ...
Aug 25, 2021 · In the paper named Hands-on evaluation of the cryptographic overhead on wireless sensor networks [9] , we tested different security ...
The experimental results from long runs (60 hours) reveal the cryptographic solution choice is significant for the message delay and additional message length.
... Hands-on evaluation of the cryptographic overhead on wireless sensor networks}, year={2021}, month={August}, volume={}, pages={-} } Create and download bib ...
Analysis of the Cryptographic Algorithms in IoT Communications. C Silva ... Hands-on evaluation of the cryptographic overhead on wireless sensor networks.
In this paper, we evaluate the overhead of comprehensive cryptography algorithms suitable for wireless sensor networks. All the factors that may affect ...
Jun 1, 2023 · Cryptography along with clustering has been found to be a practical and efficient technique to improve the secure and energy-efficient data transmission in ...
People also ask
The main contribution of this work is to carry out an experimental evaluation of a secure key distribution and storage scheme in a WSN using simulation and ...
In this paper, aiming to close this gap, we identify cipher-based Message Authentication Codes (MACs) and Authenticated Encryption with Associated Data (AEAD) ...
Sep 3, 2014 · The overhead of protection analysis for WSN cryptographic protocols is almost impossible to perform manually. This increases the difficulty to ...