Securing Data Transmission from Adversaries in Cybersecurity WSN Using Efficient Key Management Techniques

Authors

  • Kamlesh Kumar Yadav Assistant Professor, Department of CS & IT, Kalinga University, Raipur, India
  • Dhablia Dharmesh Kirit Research Scholar, Department of CS & IT, Kalinga University, Raipur, India

DOI:

https://doi.org/10.70135/seejph.vi.872

Abstract

Concern over cyber security is becoming more and more prevalent in today's international politics. National security is now evaluated not only in terms of military might or economic might, but also in terms of technological innovation. The fact that today's society is heavily dependent on computer communication and control systems, which opens up infinite opportunities, shows how important technology is in the national security area. By effectively changing the keys, the suggested work aimed to provide WSN with complicated security solutions that would ensure data integrity, security, and genuine transmission for many additional network operations through structured cryptography approaches. The study's protective measures can be applied to a variety of WSN configurations, including heterogeneous WSNs with and without mobility aid and static homogeneous WSNs. Because WSN is more limited to hardware resources, not all applications can be protected using the same method.

Downloads

Published

2024-09-02

How to Cite

Yadav, K. K., & Kirit, D. D. (2024). Securing Data Transmission from Adversaries in Cybersecurity WSN Using Efficient Key Management Techniques. South Eastern European Journal of Public Health, 442–446. https://doi.org/10.70135/seejph.vi.872

Most read articles by the same author(s)