dc.contributor.author |
Abdullah, Abdullah |
|
dc.contributor.author |
Hafeez, Nida |
|
dc.contributor.author |
Ur Rehman, Ateeq |
|
dc.contributor.author |
Saqib, Najmus |
|
dc.contributor.author |
Hamam, Habib |
|
dc.date.accessioned |
2024-05-14T15:56:46Z |
|
dc.date.available |
2024-05-14T15:56:46Z |
|
dc.date.issued |
2024-05-14 |
|
dc.identifier.issn |
2210-142X |
|
dc.identifier.uri |
https://journal.uob.edu.bh:443/handle/123456789/5683 |
|
dc.description.abstract |
This work investigates the encryption and decoding strategies for getting ecological sensor telemetry information. The review assesses both symmetric and awry encryption calculations considering their encryption and decoding times. The point is to distinguish the most reasonable encryption procedures that give harmony between security and execution for safeguarding delicate natural sensor information. The examination incorporates famous symmetric calculations like Blowfish, Twofish, RC4, AES, and ChaCha20, as well as topsy-turvy and crossbreed encryption approaches like ECC + AES, 3DES, 3DES + RSA, AES + RSA, and ChaCha-20 + RSA. This examination makes a huge commitment by directing a far-reaching near investigation of symmetric encryption calculations, in particular Blowfish, Twofish, RC4, AES, and ChaCha20, with a particular spotlight on their encryption and decoding times. By assessing the exhibition and security qualities of both uneven calculations and crossbreed encryption draws near, like ECC + AES, 3DES, 3DES + RSA, AES + RSA, and ChaCha-20 + RSA, the review gives important experiences into their appropriateness for getting natural sensor telemetry information. The examination reaches out to investigate the compromises among security and execution innate in various encryption and unscrambling methods, offering a nuanced comprehension of their suggestions about ecological sensor information assurance. The outcomes feature the qualities and shortcomings of every calculation, empowering analysts, and experts to pursue informed choices with information security in ecological sensor telemetry. |
en_US |
dc.language.iso |
en |
en_US |
dc.publisher |
University of Bahrain |
en_US |
dc.subject |
Encryption and decryption; Symmetric algorithms Asymmetric algorithms; Environmental sensor Telemetry data; Data security. |
en_US |
dc.title |
Comparative Analysis of Encryption and Decryption for Securing Environmental Sector Telemetry Data |
en_US |
dc.identifier.doi |
http://dx.doi.org/10.12785/ijcds/XXXXXX |
|
dc.volume |
16 |
en_US |
dc.issue |
1 |
en_US |
dc.pagestart |
1 |
en_US |
dc.pageend |
17 |
en_US |
dc.contributor.authorcountry |
Pakistan |
en_US |
dc.contributor.authorcountry |
China |
en_US |
dc.contributor.authorcountry |
Republic of Korea |
en_US |
dc.contributor.authorcountry |
China |
en_US |
dc.contributor.authorcountry |
Canada |
en_US |
dc.contributor.authoraffiliation |
Department of Computer Science, Bahria University |
en_US |
dc.contributor.authoraffiliation |
Department of Computer Science and Technology, University of Science and Technology of China |
en_US |
dc.contributor.authoraffiliation |
School of Computing, Gachon University |
en_US |
dc.contributor.authoraffiliation |
Department of Computer Science and Technology, University of Science and Technology of China |
en_US |
dc.contributor.authoraffiliation |
Faculty of Engineering, University de Moncton & School of Electrical Engineering, University of Johannesburg |
en_US |
dc.source.title |
International Journal of Computing and Digital Systems |
en_US |
dc.abbreviatedsourcetitle |
IJCDS |
en_US |