Abstract: To ensure data security during the gateway’s data uploading process, we introduce the advantages of chaotic mapping to AES. We then develop a multi-protocol encrypted gateway architecture ...
Abstract: This paper proposes a clustering data collection protocol for wireless sensor networks based on the genetic algorithm. The network flooding protocol based on constructive interference ...
After a multi-year competition, the U.S. National Institute of Standards and Technology (NIST) selected a suite of algorithms for standardization. For key exchange, the primary choice is the ...