Adaptive Entropy Lightweight Encryption Estimate for Software Defined Network to Mitigate Data Security Threats in Smart Cities

ABSTRACT Traditional networking environments typically configure encryption policies statically on individual devices, but a fast and space‐efficient system for data security is needed. Hence, a novel Adaptive Entropy Lightweight Encryption Estimate for the Software Define Network is introduced to m...

Full description

Saved in:
Bibliographic Details
Published in:Transactions on emerging telecommunications technologies Vol. 36; no. 2
Main Authors: Shah, Sunil Kumar, Sharma, Raghavendra, Shukla, Neeraj
Format: Journal Article
Language:English
Published: Chichester, UK John Wiley & Sons, Ltd 01.02.2025
Subjects:
ISSN:2161-3915, 2161-3915
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract ABSTRACT Traditional networking environments typically configure encryption policies statically on individual devices, but a fast and space‐efficient system for data security is needed. Hence, a novel Adaptive Entropy Lightweight Encryption Estimate for the Software Define Network is introduced to mitigate data security threats. Large‐scale SDN deployments necessitate complex encryption policies, with lightweight algorithms posing limitations due to their lack of high avalanche effects. Thus, a novel Adaptive Entropy Lightweight Encryption Algorithm is proposed that uses Extended Tiny Encryption Algorithm (XTEA) for efficient encryption and decryption and Adaptive Shannon Collision Entropy Estimation to improve the avalanche effect. Moreover, the Conjugate Gradient Trust Region Method within SDN allows controllers to adjust XTEA encryption parameters. Further, maintaining a linear relationship between encoding/decoding time and data size is crucial for efficient resource allocation and processing time estimation in lightweight encryption algorithms. Hence, a novel Shift Register Hill Climbing Security is introduced, which uses Shifted Feedback Register (SFR) to generate pseudo‐random bits, and Beta‐Adapt Hill Climbing algorithm (BAHC) to dynamically adjust SFR parameters. The findings indicate that the suggested model has less execution time, delay, packet loss, and high throughput, compared to other existing models. Traditional networking environments typically configure encryption policies statically on individual devices, but a fast and space‐efficient system for data security is needed. Hence, a novel Adaptive Entropy Lightweight Encryption Estimate for the Software Define Network is introduced to mitigate data security threats. Large‐scale SDN deployments necessitate complex encryption policies, with lightweight algorithms posing limitations due to their lack of high avalanche effects. Thus, a novel Adaptive Entropy Lightweight Encryption Algorithm is proposed that uses Extended Tiny Encryption Algorithm (XTEA) for efficient encryption and decryption and Adaptive Shannon Collision Entropy Estimation to improve the avalanche effect. Moreover, the Conjugate Gradient Trust Region Method within SDN allows controllers to adjust XTEA encryption parameters. Further, maintaining a linear relationship between encoding/decoding time and data size is crucial for efficient resource allocation and processing time estimation in lightweight encryption algorithms. Hence, a novel Shift Register Hill Climbing Security is introduced, which uses Shifted Feedback Register (SFR) to generate pseudo‐random bits, and Beta‐Adapt Hill Climbing algorithm (BAHC) to dynamically adjust SFR parameters. The findings indicate that the suggested model has less execution time, delay, packet loss, and high throughput, compared to other existing models.
AbstractList ABSTRACT Traditional networking environments typically configure encryption policies statically on individual devices, but a fast and space‐efficient system for data security is needed. Hence, a novel Adaptive Entropy Lightweight Encryption Estimate for the Software Define Network is introduced to mitigate data security threats. Large‐scale SDN deployments necessitate complex encryption policies, with lightweight algorithms posing limitations due to their lack of high avalanche effects. Thus, a novel Adaptive Entropy Lightweight Encryption Algorithm is proposed that uses Extended Tiny Encryption Algorithm (XTEA) for efficient encryption and decryption and Adaptive Shannon Collision Entropy Estimation to improve the avalanche effect. Moreover, the Conjugate Gradient Trust Region Method within SDN allows controllers to adjust XTEA encryption parameters. Further, maintaining a linear relationship between encoding/decoding time and data size is crucial for efficient resource allocation and processing time estimation in lightweight encryption algorithms. Hence, a novel Shift Register Hill Climbing Security is introduced, which uses Shifted Feedback Register (SFR) to generate pseudo‐random bits, and Beta‐Adapt Hill Climbing algorithm (BAHC) to dynamically adjust SFR parameters. The findings indicate that the suggested model has less execution time, delay, packet loss, and high throughput, compared to other existing models. Traditional networking environments typically configure encryption policies statically on individual devices, but a fast and space‐efficient system for data security is needed. Hence, a novel Adaptive Entropy Lightweight Encryption Estimate for the Software Define Network is introduced to mitigate data security threats. Large‐scale SDN deployments necessitate complex encryption policies, with lightweight algorithms posing limitations due to their lack of high avalanche effects. Thus, a novel Adaptive Entropy Lightweight Encryption Algorithm is proposed that uses Extended Tiny Encryption Algorithm (XTEA) for efficient encryption and decryption and Adaptive Shannon Collision Entropy Estimation to improve the avalanche effect. Moreover, the Conjugate Gradient Trust Region Method within SDN allows controllers to adjust XTEA encryption parameters. Further, maintaining a linear relationship between encoding/decoding time and data size is crucial for efficient resource allocation and processing time estimation in lightweight encryption algorithms. Hence, a novel Shift Register Hill Climbing Security is introduced, which uses Shifted Feedback Register (SFR) to generate pseudo‐random bits, and Beta‐Adapt Hill Climbing algorithm (BAHC) to dynamically adjust SFR parameters. The findings indicate that the suggested model has less execution time, delay, packet loss, and high throughput, compared to other existing models.
Traditional networking environments typically configure encryption policies statically on individual devices, but a fast and space‐efficient system for data security is needed. Hence, a novel Adaptive Entropy Lightweight Encryption Estimate for the Software Define Network is introduced to mitigate data security threats. Large‐scale SDN deployments necessitate complex encryption policies, with lightweight algorithms posing limitations due to their lack of high avalanche effects. Thus, a novel Adaptive Entropy Lightweight Encryption Algorithm is proposed that uses Extended Tiny Encryption Algorithm (XTEA) for efficient encryption and decryption and Adaptive Shannon Collision Entropy Estimation to improve the avalanche effect. Moreover, the Conjugate Gradient Trust Region Method within SDN allows controllers to adjust XTEA encryption parameters. Further, maintaining a linear relationship between encoding/decoding time and data size is crucial for efficient resource allocation and processing time estimation in lightweight encryption algorithms. Hence, a novel Shift Register Hill Climbing Security is introduced, which uses Shifted Feedback Register (SFR) to generate pseudo‐random bits, and Beta‐Adapt Hill Climbing algorithm (BAHC) to dynamically adjust SFR parameters. The findings indicate that the suggested model has less execution time, delay, packet loss, and high throughput, compared to other existing models.
Author Sharma, Raghavendra
Shukla, Neeraj
Shah, Sunil Kumar
Author_xml – sequence: 1
  givenname: Sunil Kumar
  orcidid: 0009-0009-1751-2778
  surname: Shah
  fullname: Shah, Sunil Kumar
  email: sunil.ggits@gmail.com
  organization: Amity University Madhya Pradesh
– sequence: 2
  givenname: Raghavendra
  surname: Sharma
  fullname: Sharma, Raghavendra
  organization: Amity University Madhya Pradesh
– sequence: 3
  givenname: Neeraj
  surname: Shukla
  fullname: Shukla, Neeraj
  organization: Gyan Ganga College of Technology
BookMark eNp1kD1Pw0AMhk-oSJTSgX9wK0Pa-2hyyVi1oSAVGBrm6JI47UGbq-4MUSb-OillYMGDbdnPa8nvNRk0tgFCbjmbcMbEFBAnirFIXZCh4BEPZMLDwZ_-ioy9f2N9qFCEs3hIvuaVPqL5BJo26Oyxo2uz3WELp9zPStf1a9vQ1KM5aARaW0c3tsZWO6BLqE0DFX0GbK17p2jpk0GzPYFLjZpuoPxwBjua7Rxo9NQ0dHPQDumi58DfkMta7z2Mf-uIvN6n2eIhWL-sHhfzdVCKWKogCVmcKCWKMClFEUnBRFgluopLrgteSBXHuuKsnBWqkLyqlJiJUEZKMKlqGRdyRO7Od0tnvXdQ50fX_-O6nLP8ZF7em5f_mNez0zPbmj10_4N5mmVnxTfQ7nOh
Cites_doi 10.1109/ACCESS.2023.3260256
10.3390/computers9010008
10.1109/JIOT.2020.2967464
10.1109/ACCESS.2021.3068723
10.1109/ACCESS.2021.3058244
10.1109/JIOT.2021.3098029
10.1016/j.adhoc.2021.102448
10.1016/j.comnet.2021.108075
10.1109/TVT.2020.3000576
10.1016/j.comnet.2020.107119
10.1109/ACCESS.2020.3002815
10.1109/JIOT.2020.2993587
10.1007/s11227-023-05265-5
10.1109/ACCESS.2020.2975208
10.1109/ACCESS.2023.3255646
10.1109/JIOT.2022.3161935
10.1109/JIOT.2020.3038768
10.1109/TNSM.2024.3386404
10.1007/978-3-030-91149-2_6
10.1109/ACCESS.2023.3267718
10.1007/s13369-021-05358-4
10.1109/JIOT.2020.3024058
10.1109/JIOT.2020.3043740
10.1109/TVT.2022.3163960
10.1109/JIOT.2022.3223576
10.1016/j.compeleceng.2020.106738
10.1109/ACCESS.2022.3229899
10.1155/2022/5693962
10.1109/ACCESS.2020.2983117
ContentType Journal Article
Copyright 2025 John Wiley & Sons Ltd.
Copyright_xml – notice: 2025 John Wiley & Sons Ltd.
DBID AAYXX
CITATION
DOI 10.1002/ett.70067
DatabaseName CrossRef
DatabaseTitle CrossRef
DatabaseTitleList
CrossRef
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 2161-3915
EndPage n/a
ExternalDocumentID 10_1002_ett_70067
ETT70067
Genre researchArticle
GroupedDBID .GA
.Y3
05W
1OC
31~
50Z
8-0
8-1
8-3
8-4
8-5
930
A03
AAEVG
AAHHS
AAHQN
AAMNL
AANHP
AANLZ
AAXRX
AAYCA
AAZKR
ABCUV
ACAHQ
ACBWZ
ACCFJ
ACCZN
ACPOU
ACRPL
ACXBN
ACXQS
ACYXJ
ADBBV
ADEOM
ADIZJ
ADKYN
ADMGS
ADMLS
ADNMO
ADOZA
ADXAS
ADZMN
AEEZP
AEGXH
AEIGN
AEIMD
AENEX
AEQDE
AEUQT
AEUYR
AFBPY
AFFPM
AFGKR
AFPWT
AFWVQ
AFZJQ
AHBTC
AITYG
AIURR
AIWBW
AJBDE
AJXKR
ALMA_UNASSIGNED_HOLDINGS
ALUQN
ALVPJ
AMBMR
AMYDB
ATUGU
AUFTA
AZFZN
BDRZF
BFHJK
BHBCM
BMNLL
BMXJE
BRXPI
D-E
D-F
DCZOG
DPXWK
DRFUL
DRSTM
EBS
EJD
F00
F01
F04
F21
G-S
GODZA
HGLYW
IN-
LATKE
LEEKS
LH4
LITHE
LOXES
LUTES
LW6
LYRES
MEWTI
MRFUL
MRSTM
MSFUL
MSSTM
MXFUL
MXSTM
RX1
SUPJJ
V2E
WIH
WIK
WXSBR
AAMMB
AAYXX
AEFGJ
AGHNM
AGQPQ
AGXDD
AGYGG
AIDQK
AIDYY
CITATION
ID FETCH-LOGICAL-c2837-95089772b59c2b632025d9ad8c1ab1b3788ad10c4b7b31dd724253672037f38b3
IEDL.DBID DRFUL
ISICitedReferencesCount 0
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=001422393300001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 2161-3915
IngestDate Sat Nov 29 08:21:28 EST 2025
Tue Feb 18 09:32:31 EST 2025
IsPeerReviewed true
IsScholarly true
Issue 2
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c2837-95089772b59c2b632025d9ad8c1ab1b3788ad10c4b7b31dd724253672037f38b3
Notes The authors received no specific funding for this work.
Funding
ORCID 0009-0009-1751-2778
PageCount 19
ParticipantIDs crossref_primary_10_1002_ett_70067
wiley_primary_10_1002_ett_70067_ETT70067
PublicationCentury 2000
PublicationDate February 2025
2025-02-00
PublicationDateYYYYMMDD 2025-02-01
PublicationDate_xml – month: 02
  year: 2025
  text: February 2025
PublicationDecade 2020
PublicationPlace Chichester, UK
PublicationPlace_xml – name: Chichester, UK
PublicationTitle Transactions on emerging telecommunications technologies
PublicationYear 2025
Publisher John Wiley & Sons, Ltd
Publisher_xml – name: John Wiley & Sons, Ltd
References 2020; 8
2021; 9
2020; 7
2021; 46
2023; 79
2023; 11
2022; 2022
2020; 86
2022; 71
2022
2021; 115
2023; 8
2020; 170
2022; 9
2020; 9
2021; 193
2020; 69
2024; 21
2022; 10
2023; 72
e_1_2_7_6_1
e_1_2_7_5_1
e_1_2_7_3_1
e_1_2_7_9_1
Cui J. (e_1_2_7_8_1) 2023; 72
e_1_2_7_7_1
e_1_2_7_19_1
e_1_2_7_18_1
e_1_2_7_17_1
e_1_2_7_16_1
e_1_2_7_2_1
e_1_2_7_15_1
e_1_2_7_14_1
e_1_2_7_13_1
e_1_2_7_12_1
e_1_2_7_11_1
e_1_2_7_10_1
e_1_2_7_26_1
e_1_2_7_27_1
e_1_2_7_28_1
e_1_2_7_29_1
e_1_2_7_30_1
e_1_2_7_25_1
e_1_2_7_31_1
e_1_2_7_24_1
e_1_2_7_32_1
e_1_2_7_23_1
e_1_2_7_22_1
e_1_2_7_21_1
e_1_2_7_20_1
Iqbal W. (e_1_2_7_4_1) 2023; 8
References_xml – volume: 69
  start-page: 9097
  issue: 8
  year: 2020
  end-page: 9111
  article-title: Blockchain‐Envisioned Secure Data Delivery and Collection Scheme for 5g‐Based Iot‐Enabled Internet of Drones Environment
  publication-title: IEEE Transactions on Vehicular Technology
– start-page: 125
  year: 2022
  end-page: 139
– volume: 9
  start-page: 8
  issue: 1
  year: 2020
  article-title: Improving Internet of Things (IoT) Security With Software‐Defined Networking (SDN)
  publication-title: Compute
– volume: 9
  start-page: 49154
  year: 2021
  end-page: 49159
  article-title: Comments on “ALAM: Anonymous Lightweight Authentication Mechanism for SDN Enabled Smart Homes”
  publication-title: IEEE Access
– volume: 11
  start-page: 28934
  year: 2023
  end-page: 28954
  article-title: FMDADM: A Multi‐Layer DDoS Attack Detection and Mitigation Framework Using Machine Learning for Stateful SDN‐Based IoT Networks
  publication-title: IEEE Access
– volume: 8
  start-page: 113498
  year: 2020
  end-page: 113511
  article-title: Scalable and Secure Big Data IoT System Based on Multifactor Authentication and Lightweight Cryptography
  publication-title: IEEE Access
– volume: 9
  start-page: 17989
  issue: 18
  year: 2022
  end-page: 18001
  article-title: SDN‐Based Privacy and Functional Authentication Scheme for Fog Nodes of Smart Healthcare
  publication-title: IEEE Internet of Things Journal
– volume: 170
  year: 2020
  article-title: Towards Trusted and Efficient SDN Topology Discovery: A Lightweight Topology Verification Scheme
  publication-title: Computer Networks
– volume: 11
  start-page: 28645
  year: 2023
  end-page: 28657
  article-title: EN‐LAKP: Lightweight Authentication and Key Agreement Protocol for Emerging Networks
  publication-title: IEEE Access
– volume: 2022
  issue: 1
  year: 2022
  article-title: Intelligent Blockchain‐Based Secure Routing for Multidomain SDN‐Enabled IoT Networks
  publication-title: Wireless Communications and Mobile Computing
– volume: 11
  start-page: 43019
  year: 2023
  end-page: 43040
  article-title: A Robust Security Scheme Based on Enhanced Symmetric Algorithm for MQTT in the Internet of Things
  publication-title: IEEE Access
– volume: 115
  year: 2021
  article-title: An Automated Lightweight Encryption Scheme for Secure and Energy‐Efficient Communication in Wireless Sensor Networks
  publication-title: Ad Hoc Networks
– volume: 9
  start-page: 28361
  year: 2021
  end-page: 28376
  article-title: Smartblock‐Sdn: An Optimized Blockchain‐Sdn Framework for Resource Management in Iot
  publication-title: IEEE Access
– volume: 8
  start-page: 60539
  year: 2020
  end-page: 60551
  article-title: Lightweight Authenticated‐Encryption Scheme for Internet of Things Based on Publish‐Subscribe Communication
  publication-title: IEEE Access
– volume: 71
  start-page: 5983
  issue: 6
  year: 2022
  end-page: 5994
  article-title: Lbsv: Lightweight Blockchain Security Protocol for Secure Storage and Communication in Sdn‐Enabled Iov
  publication-title: IEEE Transactions on Vehicular Technology
– volume: 9
  start-page: 3612
  issue: 5
  year: 2021
  end-page: 3630
  article-title: A Time‐Efficient Approach Toward DDoS Attack Detection in IoT Network Using SDN
  publication-title: IEEE Internet of Things Journal
– volume: 7
  start-page: 3349
  issue: 4
  year: 2020
  end-page: 3362
  article-title: DTLShps: SDN‐Based DTLS Handshake Protocol Simplification for IoT
  publication-title: IEEE Internet of Things Journal
– volume: 8
  start-page: 3057
  issue: 5
  year: 2020
  end-page: 3065
  article-title: SDN‐Enabled Adaptive and Reliable Communication in IoT‐Fog Environment Using Machine Learning and Multiobjective Optimization
  publication-title: IEEE Internet of Things Journal
– volume: 86
  year: 2020
  article-title: Near Real‐Time Security System Applied to SDN Environments in IoT Networks Using Convolutional Neural Network
  publication-title: Computers and Electrical Engineering
– volume: 72
  start-page: 14756
  issue: 11
  year: 2023
  end-page: 14770
  article-title: Lightweight Encryption and Authentication for Controller Area Network of Autonomous Vehicles
  publication-title: IEEE Transactions on Vehicular Technology
– volume: 193
  year: 2021
  article-title: A Dynamic and Lightweight Framework to Secure Source Addresses in the SDN‐Based Networks
  publication-title: Computer Networks
– volume: 46
  start-page: 4015
  issue: 4
  year: 2021
  end-page: 4037
  article-title: Performance Evaluation of Lightweight Encryption Algorithms for IoT‐Based Applications
  publication-title: Arabian Journal for Science and Engineering
– volume: 8
  issue: 12
  year: 2023
  article-title: ALAM: Anonymous Lightweight Authentication Mechanism for SDN Enabled Smart Homes
  publication-title: Journal of Network and Computer Applications
– volume: 10
  start-page: 130233
  year: 2022
  end-page: 130252
  article-title: LINK‐GUARD: An Effective and Scalable Security Framework for Link Discovery in SDN Networks
  publication-title: IEEE Access
– volume: 8
  start-page: 38995
  year: 2020
  end-page: 39012
  article-title: A Secure Energy‐Saving Communication and Encrypted Storage Model Based on RC4 for EHR
  publication-title: IEEE Access
– volume: 21
  start-page: 3636
  issue: 3
  year: 2024
  end-page: 3655
  article-title: Towards Automated Attack Discovery in SDN Controllers Through Formal Verification
  publication-title: IEEE Transactions on Network and Service Management
– volume: 8
  start-page: 6549
  issue: 8
  year: 2020
  end-page: 6564
  article-title: SDN‐Enabled Secure IoT Architecture
  publication-title: IEEE Internet of Things Journal
– volume: 10
  start-page: 6074
  issue: 7
  year: 2022
  end-page: 6081
  article-title: Security Framework for Internet‐Of‐Things‐Based Software‐Defined Networks Using Blockchain
  publication-title: IEEE Internet of Things Journal
– volume: 7
  start-page: 7967
  issue: 9
  year: 2020
  end-page: 7981
  article-title: Secure Data Transportation With Software‐Defined Networking and Kn Secret Sharing for High‐Confidence IoT Services
  publication-title: IEEE Internet of Things Journal
– volume: 8
  start-page: 9622
  issue: 12
  year: 2020
  end-page: 9633
  article-title: ALAM: Anonymous Lightweight Authentication Mechanism for SDN‐Enabled Smart Homes
  publication-title: IEEE Internet of Things Journal
– volume: 79
  start-page: 15324
  issue: 14
  year: 2023
  end-page: 15357
  article-title: FSCN: A Novel Forwarding Method Based on Shannon Entropy and COPRAS Decision Process in Named Data Networking
  publication-title: Journal of Supercomputing
– ident: e_1_2_7_25_1
  doi: 10.1109/ACCESS.2023.3260256
– ident: e_1_2_7_3_1
  doi: 10.3390/computers9010008
– ident: e_1_2_7_13_1
  doi: 10.1109/JIOT.2020.2967464
– ident: e_1_2_7_15_1
  doi: 10.1109/ACCESS.2021.3068723
– ident: e_1_2_7_18_1
  doi: 10.1109/ACCESS.2021.3058244
– ident: e_1_2_7_20_1
  doi: 10.1109/JIOT.2021.3098029
– ident: e_1_2_7_28_1
  doi: 10.1016/j.adhoc.2021.102448
– ident: e_1_2_7_22_1
  doi: 10.1016/j.comnet.2021.108075
– ident: e_1_2_7_2_1
  doi: 10.1109/TVT.2020.3000576
– ident: e_1_2_7_10_1
  doi: 10.1016/j.comnet.2020.107119
– ident: e_1_2_7_6_1
  doi: 10.1109/ACCESS.2020.3002815
– volume: 72
  start-page: 14756
  issue: 11
  year: 2023
  ident: e_1_2_7_8_1
  article-title: Lightweight Encryption and Authentication for Controller Area Network of Autonomous Vehicles
  publication-title: IEEE Transactions on Vehicular Technology
– ident: e_1_2_7_17_1
  doi: 10.1109/JIOT.2020.2993587
– ident: e_1_2_7_32_1
  doi: 10.1007/s11227-023-05265-5
– ident: e_1_2_7_19_1
  doi: 10.1109/ACCESS.2020.2975208
– ident: e_1_2_7_9_1
  doi: 10.1109/ACCESS.2023.3255646
– ident: e_1_2_7_14_1
  doi: 10.1109/JIOT.2022.3161935
– ident: e_1_2_7_21_1
  doi: 10.1109/JIOT.2020.3038768
– ident: e_1_2_7_26_1
  doi: 10.1109/TNSM.2024.3386404
– ident: e_1_2_7_31_1
  doi: 10.1007/978-3-030-91149-2_6
– volume: 8
  issue: 12
  year: 2023
  ident: e_1_2_7_4_1
  article-title: ALAM: Anonymous Lightweight Authentication Mechanism for SDN Enabled Smart Homes
  publication-title: Journal of Network and Computer Applications
– ident: e_1_2_7_30_1
  doi: 10.1109/ACCESS.2023.3267718
– ident: e_1_2_7_27_1
  doi: 10.1007/s13369-021-05358-4
– ident: e_1_2_7_29_1
  doi: 10.1109/JIOT.2020.3024058
– ident: e_1_2_7_12_1
  doi: 10.1109/JIOT.2020.3043740
– ident: e_1_2_7_11_1
  doi: 10.1109/TVT.2022.3163960
– ident: e_1_2_7_24_1
  doi: 10.1109/JIOT.2022.3223576
– ident: e_1_2_7_16_1
  doi: 10.1016/j.compeleceng.2020.106738
– ident: e_1_2_7_7_1
  doi: 10.1109/ACCESS.2022.3229899
– ident: e_1_2_7_23_1
  doi: 10.1155/2022/5693962
– ident: e_1_2_7_5_1
  doi: 10.1109/ACCESS.2020.2983117
SSID ssj0000752548
Score 2.3044057
Snippet ABSTRACT Traditional networking environments typically configure encryption policies statically on individual devices, but a fast and space‐efficient system...
Traditional networking environments typically configure encryption policies statically on individual devices, but a fast and space‐efficient system for data...
SourceID crossref
wiley
SourceType Index Database
Publisher
SubjectTerms data security threats
extended tiny encryption algorithm
lightweight encryption technique
shifted feedback register
software define network
Title Adaptive Entropy Lightweight Encryption Estimate for Software Defined Network to Mitigate Data Security Threats in Smart Cities
URI https://onlinelibrary.wiley.com/doi/abs/10.1002%2Fett.70067
Volume 36
WOSCitedRecordID wos001422393300001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVWIB
  databaseName: Wiley Online Library Full Collection 2020
  customDbUrl:
  eissn: 2161-3915
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0000752548
  issn: 2161-3915
  databaseCode: DRFUL
  dateStart: 20120101
  isFulltext: true
  titleUrlDefault: https://onlinelibrary.wiley.com
  providerName: Wiley-Blackwell
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV07T8MwELZKywADb0R5yUIMLKF1nKeYqjYVQ6kQTaVuke0kogNp1QaqTvx17py0lAEJiS1KnCi-2Hffd7G_I-QWKYEUnBnStBzDUq5jAKhPDc-xUwhX3OFK68z23H7fG4385wp5WO2FKfQh1gk3nBnaX-MEF3Le-BYNTfL83kVnu0VquKkKmFet89Id9tYpFoiGQH90TTqGWRaf2SttoabZWN__IyJtIlQdYrr7_3q5A7JXIkvaKobCIakk2RHZ3dAbPCafrVhM0b_RABeoT5e0h9x8odOjcE7NltqD0AAmPkDZhAKkpQPw1AsxS2gnSeFZMe0XS8dpPqFPY63RAddELuigLIZHw1fEonM6zujgDQYnbWvh1hMy7AZh-9EoKzAYClVxDCwRCwDRlLavTOlgrXU79kXsKSYkk6hFL2LWVJZ0JWdx7CKB4Q7-2nVT7kl-SqrZJEvOCDUVA66U-rFppZad-J7DLddqekLYQO6ZWyc3q68QTQuhjaiQVDYjsGakrVknd9rqv7eIgjDUB-d_b3pBdrBjxVrsS1LNZ-_JFdlWH_l4PrsuR9UXOa7PiQ
linkProvider Wiley-Blackwell
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1LT4NAEJ7UaqIefBvrc2M8eEG7LLCQeGlsG43YGItJb2R3gdiD2LRo05N_3Z2lrXowMfFGYCEwzOObYfgG4AxTAikYtaTteJajuGdpUJ9ZvudmOlwxjynDMxvyTsfv9YKHClzN_oUp-SHmBTe0DOOv0cCxIH35xRqaFsUFR2-7AIuOx7hfhcXmY_spnNdYdDjU-Y8ZSkexzBJQd0YuVLcv5-f_CEnfIaqJMe31_93dBqxNsSVplMqwCZU034LVb4yD2_DRSMQAPRxpYYv6YEJCzM7HpkCq96nhxPgQ0tKmr8FsSjSoJV3tq8dimJJmmulrJaRTNo-T4pXc9w1Lhz4mCkG603F4JHpGNDoi_Zx0X7R6kmtD3boDT-1WdH1jTWcwWAp5cSwcEqshoi3dQNnSw2nrbhKIxFdUSCqRjV4ktK4cySWjScIxhWEeftzlGfMl24Vq_pqne0BsRXW2lAWJ7WSOmwa-xxzu1H0hXJ3eU16D09lriAcl1UZckirbsZZmbKRZg3Mj9t9XxK0oMhv7f196Ass30X0Yh7eduwNYwYcsO7MPoVoM39IjWFLvRX80PJ6q2CexodN5
linkToPdf http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1LS8NAEB5qK6IH32J9LuLBS2w32bzAS-kDxRqKbcFb2FewB9uSRktP_nV3N22tB0HwFpJNSCbz-GYy-QbgWqcEjDrYYjbxLMJ9z1KgPrECz01UuHI8hxue2bYfRcHLS9gpwN3iX5icH2JZcNOWYfy1NnA5FknlmzVUZtmtr73tGpSIG7qkCKXGc6vfXtZYVDhU-Y8ZSod1mSXE7oJcqGpXluf_CEmrENXEmNbO_-5uF7bn2BLVcmXYg4Ic7sPWCuPgAXzWBB1rD4eaukV9PENtnZ1PTYFU7ePpzPgQ1FSmr8CsRArUoq7y1VOaStSQibqWQFHePI6yEXoaGJYOdYxmFHXn4_BQ71Wj0QkaDFH3Taknqhvq1kPot5q9-r01n8Fgcc2LY-khsQoi2swNuc08PW3dFSEVAceUYabZ6KnAVU6YzxwshK9TGMfTH3f9xAmYcwTF4WgojwHZHKtsKQmFTRLiyjDwHOKTakCpq9J77JfhavEa4nFOtRHnpMp2rKQZG2mW4caI_fcVcbPXMxsnf196CRudRituP0SPp7CpnzFvzD6DYpa-y3NY5x_ZYJJezDXsC3120vQ
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Adaptive+Entropy+Lightweight+Encryption+Estimate+for+Software+Defined+Network+to+Mitigate+Data+Security+Threats+in+Smart+Cities&rft.jtitle=Transactions+on+emerging+telecommunications+technologies&rft.au=Shah%2C+Sunil+Kumar&rft.au=Sharma%2C+Raghavendra&rft.au=Shukla%2C+Neeraj&rft.date=2025-02-01&rft.pub=John+Wiley+%26+Sons%2C+Ltd&rft.issn=2161-3915&rft.eissn=2161-3915&rft.volume=36&rft.issue=2&rft.epage=n%2Fa&rft_id=info:doi/10.1002%2Fett.70067&rft.externalDBID=10.1002%252Fett.70067&rft.externalDocID=ETT70067
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2161-3915&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2161-3915&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2161-3915&client=summon