Smart City Gnosys

Smart city article details

Title Multi-Stage Cryptography Technique For Wireless Networks
ID_Doc 38416
Authors Alsaraira A.; Alabed S.; Saraereh O.
Year 2024
Published Telkomnika (Telecommunication Computing Electronics and Control), 22, 3
DOI http://dx.doi.org/10.12928/TELKOMNIKA.v22i3.25896
Abstract The security of wireless communication systems has been the focal subject of research for more than a century. It is a topic of vital importance due to its effectiveness in many fields. Besides, the importance of sending data from one point to another without intercepting by unwanted third-party has become an essential requirement in conjunction with the widespread hacking technologies. This research paper is set out to explore a new technique used in internet of things applications that will ensure a secure wireless communication system. Additionally, it clarifies five distinct cryptographic methods: advanced encryption standard, elliptic curve cryptography, transposition, substitution, and Rivest, Shamir, and Adleman. In addition, the secure wireless communication system combines four of the prementioned techniques to build a highly secure system. Moreover, we managed to elucidate the critical points of our work on the long-range systems into a short yet informative and detailed summary. This paper will extensively cover the following topics: cryptography, cryptographic methods and techniques, software implementation, applications, and advantages of the system. © This is an open access article under the CC BY-SA license.
Author Keywords Cryptography; Cyber physical system; Digitalization; Internet of things; Secure communication system; Smart cities; Sustainability


Similar Articles


Id Similarity Authors Title Published
35256 View0.882Rana M.; Mamun Q.; Islam R.Lightweight Cryptography In Iot Networks: A SurveyFuture Generation Computer Systems, 129 (2022)
29755 View0.878Mathews R.; Jose D.V.Hybrid Homomorphic-Asymmetric Lightweight Cryptosystem For Securing Smart Devices: A ReviewTransactions on Emerging Telecommunications Technologies, 35, 1 (2024)
47659 View0.874Awais Javed M.; Alkhathami M.; Almohimeed A.; Almujalli A.Secure Multi-Hop Assisted Iot Communications In Smart CitiesIEEE Access, 12 (2024)
35254 View0.872Rajesh S.M.; Prabha R.Lightweight Cryptographic Approach To Address The Security Issues In Intelligent Applications: A SurveyIDCIoT 2023 - International Conference on Intelligent Data Communication Technologies and Internet of Things, Proceedings (2023)
2150 View0.871Alatawi M.N.A Hybrid Cryptographic Cipher Solution For Secure Communication In Smart CitiesInternational Journal of Computer Networks and Applications, 10, 5 (2023)
9105 View0.868David V.; Ragu H.; Nikhil V.; Sasikumar P.Analysis Of Algorithms For Effective Cryptography For Enhancement Of Iot SecurityLecture Notes in Networks and Systems, 396 (2023)
4954 View0.865Vidwans A.; Ramaiya M.A Study And Comparison Of Cryptographic Mechanisms On Data Communication In Internet Of Things (Iot) Network And DevicesLecture Notes in Networks and Systems, 894 (2024)
47714 View0.856Thirunavukkarasu V.; Senthil Kumar A.; Suresh G.; Suganyadevi K.Securing 5G Wireless Networks With Advanced Key Management And Authentication For Enhanced Data ProtectionInternational Journal of Communication Systems, 38, 7 (2025)
44576 View0.854Pandey S.; Bhushan B.Recent Lightweight Cryptography (Lwc) Based Security Advances For Resource-Constrained Iot NetworksWireless Networks, 30, 4 (2024)
22282 View0.852Pujitha B.; Vani M.S.L.; Arun M.; Sriramam Y.S.S.; Srinivas E.; Krishnan V.G.Efficient Cryptography-Based Multipath Routing Scheme For Wireless Sensor Networks In Iot ApplicationsProceedings of the International Conference on Intelligent Computing and Control Systems, ICICCS 2025 (2025)