Securing Data Transmission from Adversaries in Cybersecurity WSN Using Efficient Key Management Techniques
DOI:
https://doi.org/10.70135/seejph.vi.872Abstract
Concern over cyber security is becoming more and more prevalent in today's international politics. National security is now evaluated not only in terms of military might or economic might, but also in terms of technological innovation. The fact that today's society is heavily dependent on computer communication and control systems, which opens up infinite opportunities, shows how important technology is in the national security area. By effectively changing the keys, the suggested work aimed to provide WSN with complicated security solutions that would ensure data integrity, security, and genuine transmission for many additional network operations through structured cryptography approaches. The study's protective measures can be applied to a variety of WSN configurations, including heterogeneous WSNs with and without mobility aid and static homogeneous WSNs. Because WSN is more limited to hardware resources, not all applications can be protected using the same method.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-NoDerivatives 4.0 International License.