﻿<?xml version="1.0" encoding="utf-8"?>
<ArticleSet>
  <ARTICLE>
    <Journal>
      <PublisherName>مرکز منطقه ای اطلاع رسانی علوم و فناوری</PublisherName>
      <JournalTitle>Journal of Information Systems and Telecommunication (JIST) </JournalTitle>
      <ISSN>2322-1437</ISSN>
      <Volume>6</Volume>
      <Issue>23</Issue>
      <PubDate PubStatus="epublish">
        <Year>2019</Year>
        <Month>10</Month>
        <Day>20</Day>
      </PubDate>
    </Journal>
    <ArticleTitle>Security Enhancement of Wireless Sensor Networks: A Hybrid Efficient Encryption Algorithm Approach</ArticleTitle>
    <VernacularTitle>Security Enhancement of Wireless Sensor Networks: A Hybrid Efficient Encryption Algorithm Approach</VernacularTitle>
    <FirstPage>180</FirstPage>
    <LastPage>192</LastPage>
    <ELocationID EIdType="doi">10.7508/jist.2018.03.007</ELocationID>
    <Language>en</Language>
    <AuthorList>
      <Author>
        <FirstName>Omid Mahdi</FirstName>
        <LastName>Ebadati</LastName>
        <Affiliation>Kharazmi University</Affiliation>
      </Author>
      <Author>
        <FirstName>Farshad</FirstName>
        <LastName>Eshghi</LastName>
        <Affiliation>Kharazmi</Affiliation>
      </Author>
      <Author>
        <FirstName>Amin</FirstName>
        <LastName>Zamani</LastName>
        <Affiliation>Kharazmi University</Affiliation>
      </Author>
    </AuthorList>
    <History PubStatus="received">
      <Year>2017</Year>
      <Month>12</Month>
      <Day>5</Day>
    </History>
    <Abstract>Wireless sensor networks are new technologies that are used for various purposes such as environmental monitoring, home security, industrial process monitoring, healthcare programs and etc. Wireless sensor networks are vulnerable to various attacks. Cryptography is one of the methods for secure transmission of information between sensors in wireless sensor networks. A complete and secure encryption system must establish three principles of confidentiality, authentication and integrity. An encryption algorithm alone cannot provide all the principles of encryption. A hybrid encryption algorithm, consisting of symmetric and asymmetric encryption algorithms, provides complete security for a cryptographic system. The papers presented in this area over the last few years, and a new secure algorithm present with regard to the limitations of wireless sensor networks, which establishes three principles of cryptography. The details of the algorithm and basic concepts are presented in such a way that the algorithm can be operational and showed a very high efficiency in compare to the current proposed methods.</Abstract>
    <ObjectList>
      <Object Type="Keyword">
        <Param Name="Value">Wireless sensor network</Param>
      </Object>
      <Object Type="Keyword">
        <Param Name="Value">Cryptography algorithm</Param>
      </Object>
      <Object Type="Keyword">
        <Param Name="Value">Hybrid cryptography</Param>
      </Object>
      <Object Type="Keyword">
        <Param Name="Value">Confidentiality</Param>
      </Object>
      <Object Type="Keyword">
        <Param Name="Value">Integration</Param>
      </Object>
      <Object Type="Keyword">
        <Param Name="Value">Authentication</Param>
      </Object>
    </ObjectList>
    <ArchiveCopySource DocType="Pdf">http://jist.ir/fa/Article/Download/15082</ArchiveCopySource>
  </ARTICLE>
</ArticleSet>