Preferred Language
Articles
/
OxaTwosBVTCNdQwCFtyN
Security In Wireless Sensor Networks Based On Lightweight Algorithms : An Effective Survey
...Show More Authors

At the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range of applications and uses. Sensors are used in a wide range of industries, including agriculture, transportation, health, and many more. Many technologies, such as wireless communication protocols, the Internet of Things, cloud computing, mobile computing, and other emerging technologies, are connected to the usage of sensors. In many circumstances, this contact necessitates the transmission of crucial data, necessitating the need to protect that data from potential threats. However, as the WSN components often have constrained computation and power capabilities, protecting the communication in WSNs comes at a significant performance penalty. Due to the massive calculations required by conventional public-key and secret encryption methods, information security in this limited context calls for light encryption techniques. In many applications involving sensor networks, security is a crucial concern. On the basis of traditional cryptography, a number of security procedures are created for wireless sensor networks. Some symmetric-key encryption techniques used in sensor network setups include AES, RC5, SkipJack, and XXTEA. These algorithms do, however, have several flaws of their own, including being susceptible to chosen-plaintext assault, brute force attack, and computational complexity.

Crossref
View Publication
Publication Date
Sun Jan 01 2023
Journal Name
International Conference Of Computational Methods In Sciences And Engineering Iccmse 2021
Survey of histeridae beetles with forensic important in Kerbela Province-Iraq
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Sun Feb 25 2018
Journal Name
Advances In Bioresearch
Survey of field crickets (Orthoptera, Grylidae) in different regions of Iraq
...Show More Authors

Publication Date
Sun Nov 01 2015
Journal Name
Al-qadisiyah Medical Journal
A survey of dermatophytes isolated from Iraqi patients in Baghdad City
...Show More Authors

SJ Mohammed, AA Noaimi, KE Sharquie, JM Karhoot, MS Jebur, JR Abood, A Al-Hamadani, Al-Qadisiyah Medical Journal, 2015 - Cited by 20

View Publication
Publication Date
Thu Feb 01 2024
Journal Name
Iop Conference Series: Earth And Environmental Science
Survey of Insects Associated with some Species of Cucurbitaceae in Iraq
...Show More Authors
Abstract<p>Due to the spread of insect pests that destroys the crops belonging to the Cucurbitaceae family and led to deterioration in crop productivity in Iraq due to various reasons, the most important of which is Climate fluctuation and extreme weather events have a major impact on this problem. So, this paper was proposed to identify those species pests and prevalence. Insects were collected during the period from March 1. 2022 to October 30, 2022 from the several regions of Iraq, including: Baghdad, Babylon, Basra, Karbala, Wasit, Diyala, Saladin, and Duhok Provinces. The results showed 19 important species under 17 genera with 13 families, and five orders. The most common synonyms and dist</p> ... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Sat Jan 01 2011
Journal Name
Iraqi Journal Of Physics
Natural radioactivity survey in Al-Jabal Al-Gharbi Mountain Region Libya
...Show More Authors

The measurement of natural radioactivity in a given region or country is essential to provide a reference base-line map to follow up a possible variation in future. In order to perform such measurement, the natural radioactivity was measured in different locations. The locations (50 sites) were distributed over Al-Jabal Al-Gharbi Mountain, starting from the city Al-Azeeziah in the eastern part to Wazen on the Tunisian border in the west. The measurements showed obvious variation from one site to another. The levels were fluctuating from (12.8 counts/minute) in Bir-Ayad to (45.7 counts/minute) in Gherian.
In order to investigate the cause for such variation, samples were collected from (27) sites for detailed study. The levels of natur

... Show More
View Publication Preview PDF
Publication Date
Fri Jun 30 2017
Journal Name
International Journal Of Science And Research
Survey to the Species of Family Sepsidae (Insecta: Diptera) in Iraq
...Show More Authors

Publication Date
Thu Aug 22 2024
Journal Name
Indian Journal Of Ecology
Survey of Insects Fauna of Al-Tar Caves in Karbala, Iraq
...Show More Authors

Publication Date
Fri Dec 11 2020
Journal Name
2020 Ieee 8th Conference On Systems, Process And Control (icspc)
A Survey of Different DC Faults in a Solar Power System
...Show More Authors

View Publication
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Sun Dec 29 2024
Journal Name
Muthanna Journal Of Pure Science
Two-Fold Cryptography: Enhancing Image Security with Henon Map
...Show More Authors

This paper introduces an innovative method for image encryption called "Two-Fold Cryptography," which leverages the Henon map in a dual-layer encryption framework. By applying two distinct encryption processes, this approach offers enhanced security for images. Key parameters generated by the Henon map dynamically shape both stages of encryption, creating a sophisticated and robust security system. The findings reveal that Two-Fold Cryptography provides a notable improvement in image protection, outperforming traditional single-layer encryption techniques.

View Publication Preview PDF
Crossref
Publication Date
Thu Jun 07 2012
Journal Name
Scientific Research And Essays
Security verification of the return routability protocol by Murphi
...Show More Authors

View Publication Preview PDF
Crossref