ارسل ملاحظاتك

ارسل ملاحظاتك لنا







Enhanced Security System for Encrypting Images Sent over the Internet of Things

المصدر: المجلة العربية للنشر العلمي
الناشر: مركز البحث وتطوير الموارد البشرية - رماح
المؤلف الرئيسي: Saada, Ahmed (Author)
مؤلفين آخرين: Mohamed, Hatem (Co-Author) , Aly, Asmaa (Co-Author)
المجلد/العدد: ع43
محكمة: نعم
الدولة: الأردن
التاريخ الميلادي: 2022
الشهر: أيار
الصفحات: 545 - 562
ISSN: 2663-5798
رقم MD: 1436308
نوع المحتوى: بحوث ومقالات
اللغة: الإنجليزية
قواعد المعلومات: EduSearch, HumanIndex
مواضيع:
كلمات المؤلف المفتاحية:
IoT | Security | Encryption
رابط المحتوى:
صورة الغلاف QR قانون
حفظ في:
LEADER 02702nam a22002537a 4500
001 2183240
041 |a eng 
044 |b الأردن 
100 |9 760014  |a Saada, Ahmed  |e Author 
245 |a Enhanced Security System for Encrypting Images Sent over the Internet of Things 
260 |b مركز البحث وتطوير الموارد البشرية - رماح  |c 2022  |g أيار 
300 |a 545 - 562 
336 |a بحوث ومقالات  |b Article 
520 |b The Internet of Things ( IoT ) is projected to be a promising future technology, connecting billions of items via the internet. The demand for making smart devices more secure is growing as the number of smart devices connected to the Internet that deliver various services in many industries grows. At this time of current and future technological growth, the issue of safety is a major concern. Security threats have become a huge threat to our world, posing a threat to everyone who lives on the planet's surface, making it critical to secure internet-connected devices, particularly those with little resources. As a result, we will discuss how to secure those devices with limited resources In two ways, the first is to secure the network on which these smart devices are connected, and the other isencrypting data sent through those devices using a proposed lightweight algorithm named Enhanced Secure Internet Of Things ( ESIT ) that requires a 128-bit key to encrypt a 128-bit block. The ESIT algorithm is considered an optimizer from the SIT Algorithm. ESIT requires a 128-bit key to encrypt a 128-bit block. To implement the encryption process in the shortest possible time. The type of data that we will apply the algorithm on it is optimized image .We will also apply algorithms to images without optimization and without any reduction in size and the aim is to compare the implementation of the algorithms on the original and optimized images. 
653 |a إنترنت الأشياء  |a الأمن السيبراني  |a نظام التشفير  |a الصور الرقمية 
692 |b IoT  |b Security  |b Encryption 
700 |9 760018  |a Mohamed, Hatem  |e Co-Author 
700 |9 760017  |a Aly, Asmaa  |e Co-Author 
773 |4 العلوم الإنسانية ، متعددة التخصصات  |4 العلوم الاجتماعية ، متعددة التخصصات  |6 Humanities, Multidisciplinary  |6 Social Sciences, Interdisciplinary  |c 025  |e Arab journal for scientific publishing  |f al-Mağallaẗ al-ʿarabiyyaẗ li-l-našr al-ilmī  |l 043  |m ع43  |o 2502  |s المجلة العربية للنشر العلمي  |v 000  |x 2663-5798 
856 |u 2502-000-043-025.pdf 
930 |d y  |p y  |q n 
995 |a EduSearch 
995 |a HumanIndex 
999 |c 1436308  |d 1436308 

عناصر مشابهة