University of Bahrain
Scientific Journals

Comparative Analysis of Encryption and Decryption for Securing Environmental Sector Telemetry Data

Show simple item record

dc.contributor.author Abdullah, Abdullah
dc.contributor.author Hafeez, Nida
dc.contributor.author Ur Rehman, Ateeq
dc.contributor.author Saqib, Najmus
dc.contributor.author Hamam, Habib
dc.date.accessioned 2024-05-14T15:56:46Z
dc.date.available 2024-05-14T15:56:46Z
dc.date.issued 2024-05-14
dc.identifier.issn 2210-142X
dc.identifier.uri https://journal.uob.edu.bh:443/handle/123456789/5683
dc.description.abstract This work investigates the encryption and decoding strategies for getting ecological sensor telemetry information. The review assesses both symmetric and awry encryption calculations considering their encryption and decoding times. The point is to distinguish the most reasonable encryption procedures that give harmony between security and execution for safeguarding delicate natural sensor information. The examination incorporates famous symmetric calculations like Blowfish, Twofish, RC4, AES, and ChaCha20, as well as topsy-turvy and crossbreed encryption approaches like ECC + AES, 3DES, 3DES + RSA, AES + RSA, and ChaCha-20 + RSA. This examination makes a huge commitment by directing a far-reaching near investigation of symmetric encryption calculations, in particular Blowfish, Twofish, RC4, AES, and ChaCha20, with a particular spotlight on their encryption and decoding times. By assessing the exhibition and security qualities of both uneven calculations and crossbreed encryption draws near, like ECC + AES, 3DES, 3DES + RSA, AES + RSA, and ChaCha-20 + RSA, the review gives important experiences into their appropriateness for getting natural sensor telemetry information. The examination reaches out to investigate the compromises among security and execution innate in various encryption and unscrambling methods, offering a nuanced comprehension of their suggestions about ecological sensor information assurance. The outcomes feature the qualities and shortcomings of every calculation, empowering analysts, and experts to pursue informed choices with information security in ecological sensor telemetry. en_US
dc.language.iso en en_US
dc.publisher University of Bahrain en_US
dc.subject Encryption and decryption; Symmetric algorithms Asymmetric algorithms; Environmental sensor Telemetry data; Data security. en_US
dc.title Comparative Analysis of Encryption and Decryption for Securing Environmental Sector Telemetry Data en_US
dc.identifier.doi http://dx.doi.org/10.12785/ijcds/XXXXXX
dc.volume 16 en_US
dc.issue 1 en_US
dc.pagestart 1 en_US
dc.pageend 17 en_US
dc.contributor.authorcountry Pakistan en_US
dc.contributor.authorcountry China en_US
dc.contributor.authorcountry Republic of Korea en_US
dc.contributor.authorcountry China en_US
dc.contributor.authorcountry Canada en_US
dc.contributor.authoraffiliation Department of Computer Science, Bahria University en_US
dc.contributor.authoraffiliation Department of Computer Science and Technology, University of Science and Technology of China en_US
dc.contributor.authoraffiliation School of Computing, Gachon University en_US
dc.contributor.authoraffiliation Department of Computer Science and Technology, University of Science and Technology of China en_US
dc.contributor.authoraffiliation Faculty of Engineering, University de Moncton & School of Electrical Engineering, University of Johannesburg en_US
dc.source.title International Journal of Computing and Digital Systems en_US
dc.abbreviatedsourcetitle IJCDS en_US


Files in this item

This item appears in the following Issue(s)

Show simple item record

All Journals


Advanced Search

Browse

Administrator Account