Adaptive Entropy Lightweight Encryption Estimate for Software Defined Network to Mitigate Data Security Threats in Smart Cities
ABSTRACT Traditional networking environments typically configure encryption policies statically on individual devices, but a fast and space‐efficient system for data security is needed. Hence, a novel Adaptive Entropy Lightweight Encryption Estimate for the Software Define Network is introduced to m...
Saved in:
| Published in: | Transactions on emerging telecommunications technologies Vol. 36; no. 2 |
|---|---|
| Main Authors: | , , |
| Format: | Journal Article |
| Language: | English |
| Published: |
Chichester, UK
John Wiley & Sons, Ltd
01.02.2025
|
| Subjects: | |
| ISSN: | 2161-3915, 2161-3915 |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Abstract | ABSTRACT
Traditional networking environments typically configure encryption policies statically on individual devices, but a fast and space‐efficient system for data security is needed. Hence, a novel Adaptive Entropy Lightweight Encryption Estimate for the Software Define Network is introduced to mitigate data security threats. Large‐scale SDN deployments necessitate complex encryption policies, with lightweight algorithms posing limitations due to their lack of high avalanche effects. Thus, a novel Adaptive Entropy Lightweight Encryption Algorithm is proposed that uses Extended Tiny Encryption Algorithm (XTEA) for efficient encryption and decryption and Adaptive Shannon Collision Entropy Estimation to improve the avalanche effect. Moreover, the Conjugate Gradient Trust Region Method within SDN allows controllers to adjust XTEA encryption parameters. Further, maintaining a linear relationship between encoding/decoding time and data size is crucial for efficient resource allocation and processing time estimation in lightweight encryption algorithms. Hence, a novel Shift Register Hill Climbing Security is introduced, which uses Shifted Feedback Register (SFR) to generate pseudo‐random bits, and Beta‐Adapt Hill Climbing algorithm (BAHC) to dynamically adjust SFR parameters. The findings indicate that the suggested model has less execution time, delay, packet loss, and high throughput, compared to other existing models.
Traditional networking environments typically configure encryption policies statically on individual devices, but a fast and space‐efficient system for data security is needed. Hence, a novel Adaptive Entropy Lightweight Encryption Estimate for the Software Define Network is introduced to mitigate data security threats. Large‐scale SDN deployments necessitate complex encryption policies, with lightweight algorithms posing limitations due to their lack of high avalanche effects. Thus, a novel Adaptive Entropy Lightweight Encryption Algorithm is proposed that uses Extended Tiny Encryption Algorithm (XTEA) for efficient encryption and decryption and Adaptive Shannon Collision Entropy Estimation to improve the avalanche effect. Moreover, the Conjugate Gradient Trust Region Method within SDN allows controllers to adjust XTEA encryption parameters. Further, maintaining a linear relationship between encoding/decoding time and data size is crucial for efficient resource allocation and processing time estimation in lightweight encryption algorithms. Hence, a novel Shift Register Hill Climbing Security is introduced, which uses Shifted Feedback Register (SFR) to generate pseudo‐random bits, and Beta‐Adapt Hill Climbing algorithm (BAHC) to dynamically adjust SFR parameters. The findings indicate that the suggested model has less execution time, delay, packet loss, and high throughput, compared to other existing models. |
|---|---|
| AbstractList | ABSTRACT
Traditional networking environments typically configure encryption policies statically on individual devices, but a fast and space‐efficient system for data security is needed. Hence, a novel Adaptive Entropy Lightweight Encryption Estimate for the Software Define Network is introduced to mitigate data security threats. Large‐scale SDN deployments necessitate complex encryption policies, with lightweight algorithms posing limitations due to their lack of high avalanche effects. Thus, a novel Adaptive Entropy Lightweight Encryption Algorithm is proposed that uses Extended Tiny Encryption Algorithm (XTEA) for efficient encryption and decryption and Adaptive Shannon Collision Entropy Estimation to improve the avalanche effect. Moreover, the Conjugate Gradient Trust Region Method within SDN allows controllers to adjust XTEA encryption parameters. Further, maintaining a linear relationship between encoding/decoding time and data size is crucial for efficient resource allocation and processing time estimation in lightweight encryption algorithms. Hence, a novel Shift Register Hill Climbing Security is introduced, which uses Shifted Feedback Register (SFR) to generate pseudo‐random bits, and Beta‐Adapt Hill Climbing algorithm (BAHC) to dynamically adjust SFR parameters. The findings indicate that the suggested model has less execution time, delay, packet loss, and high throughput, compared to other existing models.
Traditional networking environments typically configure encryption policies statically on individual devices, but a fast and space‐efficient system for data security is needed. Hence, a novel Adaptive Entropy Lightweight Encryption Estimate for the Software Define Network is introduced to mitigate data security threats. Large‐scale SDN deployments necessitate complex encryption policies, with lightweight algorithms posing limitations due to their lack of high avalanche effects. Thus, a novel Adaptive Entropy Lightweight Encryption Algorithm is proposed that uses Extended Tiny Encryption Algorithm (XTEA) for efficient encryption and decryption and Adaptive Shannon Collision Entropy Estimation to improve the avalanche effect. Moreover, the Conjugate Gradient Trust Region Method within SDN allows controllers to adjust XTEA encryption parameters. Further, maintaining a linear relationship between encoding/decoding time and data size is crucial for efficient resource allocation and processing time estimation in lightweight encryption algorithms. Hence, a novel Shift Register Hill Climbing Security is introduced, which uses Shifted Feedback Register (SFR) to generate pseudo‐random bits, and Beta‐Adapt Hill Climbing algorithm (BAHC) to dynamically adjust SFR parameters. The findings indicate that the suggested model has less execution time, delay, packet loss, and high throughput, compared to other existing models. Traditional networking environments typically configure encryption policies statically on individual devices, but a fast and space‐efficient system for data security is needed. Hence, a novel Adaptive Entropy Lightweight Encryption Estimate for the Software Define Network is introduced to mitigate data security threats. Large‐scale SDN deployments necessitate complex encryption policies, with lightweight algorithms posing limitations due to their lack of high avalanche effects. Thus, a novel Adaptive Entropy Lightweight Encryption Algorithm is proposed that uses Extended Tiny Encryption Algorithm (XTEA) for efficient encryption and decryption and Adaptive Shannon Collision Entropy Estimation to improve the avalanche effect. Moreover, the Conjugate Gradient Trust Region Method within SDN allows controllers to adjust XTEA encryption parameters. Further, maintaining a linear relationship between encoding/decoding time and data size is crucial for efficient resource allocation and processing time estimation in lightweight encryption algorithms. Hence, a novel Shift Register Hill Climbing Security is introduced, which uses Shifted Feedback Register (SFR) to generate pseudo‐random bits, and Beta‐Adapt Hill Climbing algorithm (BAHC) to dynamically adjust SFR parameters. The findings indicate that the suggested model has less execution time, delay, packet loss, and high throughput, compared to other existing models. |
| Author | Sharma, Raghavendra Shukla, Neeraj Shah, Sunil Kumar |
| Author_xml | – sequence: 1 givenname: Sunil Kumar orcidid: 0009-0009-1751-2778 surname: Shah fullname: Shah, Sunil Kumar email: sunil.ggits@gmail.com organization: Amity University Madhya Pradesh – sequence: 2 givenname: Raghavendra surname: Sharma fullname: Sharma, Raghavendra organization: Amity University Madhya Pradesh – sequence: 3 givenname: Neeraj surname: Shukla fullname: Shukla, Neeraj organization: Gyan Ganga College of Technology |
| BookMark | eNp1kD1Pw0AMhk-oSJTSgX9wK0Pa-2hyyVi1oSAVGBrm6JI47UGbq-4MUSb-OillYMGDbdnPa8nvNRk0tgFCbjmbcMbEFBAnirFIXZCh4BEPZMLDwZ_-ioy9f2N9qFCEs3hIvuaVPqL5BJo26Oyxo2uz3WELp9zPStf1a9vQ1KM5aARaW0c3tsZWO6BLqE0DFX0GbK17p2jpk0GzPYFLjZpuoPxwBjua7Rxo9NQ0dHPQDumi58DfkMta7z2Mf-uIvN6n2eIhWL-sHhfzdVCKWKogCVmcKCWKMClFEUnBRFgluopLrgteSBXHuuKsnBWqkLyqlJiJUEZKMKlqGRdyRO7Od0tnvXdQ50fX_-O6nLP8ZF7em5f_mNez0zPbmj10_4N5mmVnxTfQ7nOh |
| Cites_doi | 10.1109/ACCESS.2023.3260256 10.3390/computers9010008 10.1109/JIOT.2020.2967464 10.1109/ACCESS.2021.3068723 10.1109/ACCESS.2021.3058244 10.1109/JIOT.2021.3098029 10.1016/j.adhoc.2021.102448 10.1016/j.comnet.2021.108075 10.1109/TVT.2020.3000576 10.1016/j.comnet.2020.107119 10.1109/ACCESS.2020.3002815 10.1109/JIOT.2020.2993587 10.1007/s11227-023-05265-5 10.1109/ACCESS.2020.2975208 10.1109/ACCESS.2023.3255646 10.1109/JIOT.2022.3161935 10.1109/JIOT.2020.3038768 10.1109/TNSM.2024.3386404 10.1007/978-3-030-91149-2_6 10.1109/ACCESS.2023.3267718 10.1007/s13369-021-05358-4 10.1109/JIOT.2020.3024058 10.1109/JIOT.2020.3043740 10.1109/TVT.2022.3163960 10.1109/JIOT.2022.3223576 10.1016/j.compeleceng.2020.106738 10.1109/ACCESS.2022.3229899 10.1155/2022/5693962 10.1109/ACCESS.2020.2983117 |
| ContentType | Journal Article |
| Copyright | 2025 John Wiley & Sons Ltd. |
| Copyright_xml | – notice: 2025 John Wiley & Sons Ltd. |
| DBID | AAYXX CITATION |
| DOI | 10.1002/ett.70067 |
| DatabaseName | CrossRef |
| DatabaseTitle | CrossRef |
| DatabaseTitleList | CrossRef |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EISSN | 2161-3915 |
| EndPage | n/a |
| ExternalDocumentID | 10_1002_ett_70067 ETT70067 |
| Genre | researchArticle |
| GroupedDBID | .GA .Y3 05W 1OC 31~ 50Z 8-0 8-1 8-3 8-4 8-5 930 A03 AAEVG AAHHS AAHQN AAMNL AANHP AANLZ AAXRX AAYCA AAZKR ABCUV ACAHQ ACBWZ ACCFJ ACCZN ACPOU ACRPL ACXBN ACXQS ACYXJ ADBBV ADEOM ADIZJ ADKYN ADMGS ADMLS ADNMO ADOZA ADXAS ADZMN AEEZP AEGXH AEIGN AEIMD AENEX AEQDE AEUQT AEUYR AFBPY AFFPM AFGKR AFPWT AFWVQ AFZJQ AHBTC AITYG AIURR AIWBW AJBDE AJXKR ALMA_UNASSIGNED_HOLDINGS ALUQN ALVPJ AMBMR AMYDB ATUGU AUFTA AZFZN BDRZF BFHJK BHBCM BMNLL BMXJE BRXPI D-E D-F DCZOG DPXWK DRFUL DRSTM EBS EJD F00 F01 F04 F21 G-S GODZA HGLYW IN- LATKE LEEKS LH4 LITHE LOXES LUTES LW6 LYRES MEWTI MRFUL MRSTM MSFUL MSSTM MXFUL MXSTM RX1 SUPJJ V2E WIH WIK WXSBR AAMMB AAYXX AEFGJ AGHNM AGQPQ AGXDD AGYGG AIDQK AIDYY CITATION |
| ID | FETCH-LOGICAL-c2837-95089772b59c2b632025d9ad8c1ab1b3788ad10c4b7b31dd724253672037f38b3 |
| IEDL.DBID | DRFUL |
| ISICitedReferencesCount | 0 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=001422393300001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 2161-3915 |
| IngestDate | Sat Nov 29 08:21:28 EST 2025 Tue Feb 18 09:32:31 EST 2025 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 2 |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c2837-95089772b59c2b632025d9ad8c1ab1b3788ad10c4b7b31dd724253672037f38b3 |
| Notes | The authors received no specific funding for this work. Funding |
| ORCID | 0009-0009-1751-2778 |
| PageCount | 19 |
| ParticipantIDs | crossref_primary_10_1002_ett_70067 wiley_primary_10_1002_ett_70067_ETT70067 |
| PublicationCentury | 2000 |
| PublicationDate | February 2025 2025-02-00 |
| PublicationDateYYYYMMDD | 2025-02-01 |
| PublicationDate_xml | – month: 02 year: 2025 text: February 2025 |
| PublicationDecade | 2020 |
| PublicationPlace | Chichester, UK |
| PublicationPlace_xml | – name: Chichester, UK |
| PublicationTitle | Transactions on emerging telecommunications technologies |
| PublicationYear | 2025 |
| Publisher | John Wiley & Sons, Ltd |
| Publisher_xml | – name: John Wiley & Sons, Ltd |
| References | 2020; 8 2021; 9 2020; 7 2021; 46 2023; 79 2023; 11 2022; 2022 2020; 86 2022; 71 2022 2021; 115 2023; 8 2020; 170 2022; 9 2020; 9 2021; 193 2020; 69 2024; 21 2022; 10 2023; 72 e_1_2_7_6_1 e_1_2_7_5_1 e_1_2_7_3_1 e_1_2_7_9_1 Cui J. (e_1_2_7_8_1) 2023; 72 e_1_2_7_7_1 e_1_2_7_19_1 e_1_2_7_18_1 e_1_2_7_17_1 e_1_2_7_16_1 e_1_2_7_2_1 e_1_2_7_15_1 e_1_2_7_14_1 e_1_2_7_13_1 e_1_2_7_12_1 e_1_2_7_11_1 e_1_2_7_10_1 e_1_2_7_26_1 e_1_2_7_27_1 e_1_2_7_28_1 e_1_2_7_29_1 e_1_2_7_30_1 e_1_2_7_25_1 e_1_2_7_31_1 e_1_2_7_24_1 e_1_2_7_32_1 e_1_2_7_23_1 e_1_2_7_22_1 e_1_2_7_21_1 e_1_2_7_20_1 Iqbal W. (e_1_2_7_4_1) 2023; 8 |
| References_xml | – volume: 69 start-page: 9097 issue: 8 year: 2020 end-page: 9111 article-title: Blockchain‐Envisioned Secure Data Delivery and Collection Scheme for 5g‐Based Iot‐Enabled Internet of Drones Environment publication-title: IEEE Transactions on Vehicular Technology – start-page: 125 year: 2022 end-page: 139 – volume: 9 start-page: 8 issue: 1 year: 2020 article-title: Improving Internet of Things (IoT) Security With Software‐Defined Networking (SDN) publication-title: Compute – volume: 9 start-page: 49154 year: 2021 end-page: 49159 article-title: Comments on “ALAM: Anonymous Lightweight Authentication Mechanism for SDN Enabled Smart Homes” publication-title: IEEE Access – volume: 11 start-page: 28934 year: 2023 end-page: 28954 article-title: FMDADM: A Multi‐Layer DDoS Attack Detection and Mitigation Framework Using Machine Learning for Stateful SDN‐Based IoT Networks publication-title: IEEE Access – volume: 8 start-page: 113498 year: 2020 end-page: 113511 article-title: Scalable and Secure Big Data IoT System Based on Multifactor Authentication and Lightweight Cryptography publication-title: IEEE Access – volume: 9 start-page: 17989 issue: 18 year: 2022 end-page: 18001 article-title: SDN‐Based Privacy and Functional Authentication Scheme for Fog Nodes of Smart Healthcare publication-title: IEEE Internet of Things Journal – volume: 170 year: 2020 article-title: Towards Trusted and Efficient SDN Topology Discovery: A Lightweight Topology Verification Scheme publication-title: Computer Networks – volume: 11 start-page: 28645 year: 2023 end-page: 28657 article-title: EN‐LAKP: Lightweight Authentication and Key Agreement Protocol for Emerging Networks publication-title: IEEE Access – volume: 2022 issue: 1 year: 2022 article-title: Intelligent Blockchain‐Based Secure Routing for Multidomain SDN‐Enabled IoT Networks publication-title: Wireless Communications and Mobile Computing – volume: 11 start-page: 43019 year: 2023 end-page: 43040 article-title: A Robust Security Scheme Based on Enhanced Symmetric Algorithm for MQTT in the Internet of Things publication-title: IEEE Access – volume: 115 year: 2021 article-title: An Automated Lightweight Encryption Scheme for Secure and Energy‐Efficient Communication in Wireless Sensor Networks publication-title: Ad Hoc Networks – volume: 9 start-page: 28361 year: 2021 end-page: 28376 article-title: Smartblock‐Sdn: An Optimized Blockchain‐Sdn Framework for Resource Management in Iot publication-title: IEEE Access – volume: 8 start-page: 60539 year: 2020 end-page: 60551 article-title: Lightweight Authenticated‐Encryption Scheme for Internet of Things Based on Publish‐Subscribe Communication publication-title: IEEE Access – volume: 71 start-page: 5983 issue: 6 year: 2022 end-page: 5994 article-title: Lbsv: Lightweight Blockchain Security Protocol for Secure Storage and Communication in Sdn‐Enabled Iov publication-title: IEEE Transactions on Vehicular Technology – volume: 9 start-page: 3612 issue: 5 year: 2021 end-page: 3630 article-title: A Time‐Efficient Approach Toward DDoS Attack Detection in IoT Network Using SDN publication-title: IEEE Internet of Things Journal – volume: 7 start-page: 3349 issue: 4 year: 2020 end-page: 3362 article-title: DTLShps: SDN‐Based DTLS Handshake Protocol Simplification for IoT publication-title: IEEE Internet of Things Journal – volume: 8 start-page: 3057 issue: 5 year: 2020 end-page: 3065 article-title: SDN‐Enabled Adaptive and Reliable Communication in IoT‐Fog Environment Using Machine Learning and Multiobjective Optimization publication-title: IEEE Internet of Things Journal – volume: 86 year: 2020 article-title: Near Real‐Time Security System Applied to SDN Environments in IoT Networks Using Convolutional Neural Network publication-title: Computers and Electrical Engineering – volume: 72 start-page: 14756 issue: 11 year: 2023 end-page: 14770 article-title: Lightweight Encryption and Authentication for Controller Area Network of Autonomous Vehicles publication-title: IEEE Transactions on Vehicular Technology – volume: 193 year: 2021 article-title: A Dynamic and Lightweight Framework to Secure Source Addresses in the SDN‐Based Networks publication-title: Computer Networks – volume: 46 start-page: 4015 issue: 4 year: 2021 end-page: 4037 article-title: Performance Evaluation of Lightweight Encryption Algorithms for IoT‐Based Applications publication-title: Arabian Journal for Science and Engineering – volume: 8 issue: 12 year: 2023 article-title: ALAM: Anonymous Lightweight Authentication Mechanism for SDN Enabled Smart Homes publication-title: Journal of Network and Computer Applications – volume: 10 start-page: 130233 year: 2022 end-page: 130252 article-title: LINK‐GUARD: An Effective and Scalable Security Framework for Link Discovery in SDN Networks publication-title: IEEE Access – volume: 8 start-page: 38995 year: 2020 end-page: 39012 article-title: A Secure Energy‐Saving Communication and Encrypted Storage Model Based on RC4 for EHR publication-title: IEEE Access – volume: 21 start-page: 3636 issue: 3 year: 2024 end-page: 3655 article-title: Towards Automated Attack Discovery in SDN Controllers Through Formal Verification publication-title: IEEE Transactions on Network and Service Management – volume: 8 start-page: 6549 issue: 8 year: 2020 end-page: 6564 article-title: SDN‐Enabled Secure IoT Architecture publication-title: IEEE Internet of Things Journal – volume: 10 start-page: 6074 issue: 7 year: 2022 end-page: 6081 article-title: Security Framework for Internet‐Of‐Things‐Based Software‐Defined Networks Using Blockchain publication-title: IEEE Internet of Things Journal – volume: 7 start-page: 7967 issue: 9 year: 2020 end-page: 7981 article-title: Secure Data Transportation With Software‐Defined Networking and Kn Secret Sharing for High‐Confidence IoT Services publication-title: IEEE Internet of Things Journal – volume: 8 start-page: 9622 issue: 12 year: 2020 end-page: 9633 article-title: ALAM: Anonymous Lightweight Authentication Mechanism for SDN‐Enabled Smart Homes publication-title: IEEE Internet of Things Journal – volume: 79 start-page: 15324 issue: 14 year: 2023 end-page: 15357 article-title: FSCN: A Novel Forwarding Method Based on Shannon Entropy and COPRAS Decision Process in Named Data Networking publication-title: Journal of Supercomputing – ident: e_1_2_7_25_1 doi: 10.1109/ACCESS.2023.3260256 – ident: e_1_2_7_3_1 doi: 10.3390/computers9010008 – ident: e_1_2_7_13_1 doi: 10.1109/JIOT.2020.2967464 – ident: e_1_2_7_15_1 doi: 10.1109/ACCESS.2021.3068723 – ident: e_1_2_7_18_1 doi: 10.1109/ACCESS.2021.3058244 – ident: e_1_2_7_20_1 doi: 10.1109/JIOT.2021.3098029 – ident: e_1_2_7_28_1 doi: 10.1016/j.adhoc.2021.102448 – ident: e_1_2_7_22_1 doi: 10.1016/j.comnet.2021.108075 – ident: e_1_2_7_2_1 doi: 10.1109/TVT.2020.3000576 – ident: e_1_2_7_10_1 doi: 10.1016/j.comnet.2020.107119 – ident: e_1_2_7_6_1 doi: 10.1109/ACCESS.2020.3002815 – volume: 72 start-page: 14756 issue: 11 year: 2023 ident: e_1_2_7_8_1 article-title: Lightweight Encryption and Authentication for Controller Area Network of Autonomous Vehicles publication-title: IEEE Transactions on Vehicular Technology – ident: e_1_2_7_17_1 doi: 10.1109/JIOT.2020.2993587 – ident: e_1_2_7_32_1 doi: 10.1007/s11227-023-05265-5 – ident: e_1_2_7_19_1 doi: 10.1109/ACCESS.2020.2975208 – ident: e_1_2_7_9_1 doi: 10.1109/ACCESS.2023.3255646 – ident: e_1_2_7_14_1 doi: 10.1109/JIOT.2022.3161935 – ident: e_1_2_7_21_1 doi: 10.1109/JIOT.2020.3038768 – ident: e_1_2_7_26_1 doi: 10.1109/TNSM.2024.3386404 – ident: e_1_2_7_31_1 doi: 10.1007/978-3-030-91149-2_6 – volume: 8 issue: 12 year: 2023 ident: e_1_2_7_4_1 article-title: ALAM: Anonymous Lightweight Authentication Mechanism for SDN Enabled Smart Homes publication-title: Journal of Network and Computer Applications – ident: e_1_2_7_30_1 doi: 10.1109/ACCESS.2023.3267718 – ident: e_1_2_7_27_1 doi: 10.1007/s13369-021-05358-4 – ident: e_1_2_7_29_1 doi: 10.1109/JIOT.2020.3024058 – ident: e_1_2_7_12_1 doi: 10.1109/JIOT.2020.3043740 – ident: e_1_2_7_11_1 doi: 10.1109/TVT.2022.3163960 – ident: e_1_2_7_24_1 doi: 10.1109/JIOT.2022.3223576 – ident: e_1_2_7_16_1 doi: 10.1016/j.compeleceng.2020.106738 – ident: e_1_2_7_7_1 doi: 10.1109/ACCESS.2022.3229899 – ident: e_1_2_7_23_1 doi: 10.1155/2022/5693962 – ident: e_1_2_7_5_1 doi: 10.1109/ACCESS.2020.2983117 |
| SSID | ssj0000752548 |
| Score | 2.3044057 |
| Snippet | ABSTRACT
Traditional networking environments typically configure encryption policies statically on individual devices, but a fast and space‐efficient system... Traditional networking environments typically configure encryption policies statically on individual devices, but a fast and space‐efficient system for data... |
| SourceID | crossref wiley |
| SourceType | Index Database Publisher |
| SubjectTerms | data security threats extended tiny encryption algorithm lightweight encryption technique shifted feedback register software define network |
| Title | Adaptive Entropy Lightweight Encryption Estimate for Software Defined Network to Mitigate Data Security Threats in Smart Cities |
| URI | https://onlinelibrary.wiley.com/doi/abs/10.1002%2Fett.70067 |
| Volume | 36 |
| WOSCitedRecordID | wos001422393300001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVWIB databaseName: Wiley Online Library Full Collection 2020 customDbUrl: eissn: 2161-3915 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0000752548 issn: 2161-3915 databaseCode: DRFUL dateStart: 20120101 isFulltext: true titleUrlDefault: https://onlinelibrary.wiley.com providerName: Wiley-Blackwell |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV07T8MwELZKywADb0R5yUIMLKF1nKeYqjYVQ6kQTaVuke0kogNp1QaqTvx17py0lAEJiS1KnCi-2Hffd7G_I-QWKYEUnBnStBzDUq5jAKhPDc-xUwhX3OFK68z23H7fG4385wp5WO2FKfQh1gk3nBnaX-MEF3Le-BYNTfL83kVnu0VquKkKmFet89Id9tYpFoiGQH90TTqGWRaf2SttoabZWN__IyJtIlQdYrr7_3q5A7JXIkvaKobCIakk2RHZ3dAbPCafrVhM0b_RABeoT5e0h9x8odOjcE7NltqD0AAmPkDZhAKkpQPw1AsxS2gnSeFZMe0XS8dpPqFPY63RAddELuigLIZHw1fEonM6zujgDQYnbWvh1hMy7AZh-9EoKzAYClVxDCwRCwDRlLavTOlgrXU79kXsKSYkk6hFL2LWVJZ0JWdx7CKB4Q7-2nVT7kl-SqrZJEvOCDUVA66U-rFppZad-J7DLddqekLYQO6ZWyc3q68QTQuhjaiQVDYjsGakrVknd9rqv7eIgjDUB-d_b3pBdrBjxVrsS1LNZ-_JFdlWH_l4PrsuR9UXOa7PiQ |
| linkProvider | Wiley-Blackwell |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1LT4NAEJ7UaqIefBvrc2M8eEG7LLCQeGlsG43YGItJb2R3gdiD2LRo05N_3Z2lrXowMfFGYCEwzOObYfgG4AxTAikYtaTteJajuGdpUJ9ZvudmOlwxjynDMxvyTsfv9YKHClzN_oUp-SHmBTe0DOOv0cCxIH35xRqaFsUFR2-7AIuOx7hfhcXmY_spnNdYdDjU-Y8ZSkexzBJQd0YuVLcv5-f_CEnfIaqJMe31_93dBqxNsSVplMqwCZU034LVb4yD2_DRSMQAPRxpYYv6YEJCzM7HpkCq96nhxPgQ0tKmr8FsSjSoJV3tq8dimJJmmulrJaRTNo-T4pXc9w1Lhz4mCkG603F4JHpGNDoi_Zx0X7R6kmtD3boDT-1WdH1jTWcwWAp5cSwcEqshoi3dQNnSw2nrbhKIxFdUSCqRjV4ktK4cySWjScIxhWEeftzlGfMl24Vq_pqne0BsRXW2lAWJ7WSOmwa-xxzu1H0hXJ3eU16D09lriAcl1UZckirbsZZmbKRZg3Mj9t9XxK0oMhv7f196Ass30X0Yh7eduwNYwYcsO7MPoVoM39IjWFLvRX80PJ6q2CexodN5 |
| linkToPdf | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1LS8NAEB5qK6IH32J9LuLBS2w32bzAS-kDxRqKbcFb2FewB9uSRktP_nV3N22tB0HwFpJNSCbz-GYy-QbgWqcEjDrYYjbxLMJ9z1KgPrECz01UuHI8hxue2bYfRcHLS9gpwN3iX5icH2JZcNOWYfy1NnA5FknlmzVUZtmtr73tGpSIG7qkCKXGc6vfXtZYVDhU-Y8ZSod1mSXE7oJcqGpXluf_CEmrENXEmNbO_-5uF7bn2BLVcmXYg4Ic7sPWCuPgAXzWBB1rD4eaukV9PENtnZ1PTYFU7ePpzPgQ1FSmr8CsRArUoq7y1VOaStSQibqWQFHePI6yEXoaGJYOdYxmFHXn4_BQ71Wj0QkaDFH3Taknqhvq1kPot5q9-r01n8Fgcc2LY-khsQoi2swNuc08PW3dFSEVAceUYabZ6KnAVU6YzxwshK9TGMfTH3f9xAmYcwTF4WgojwHZHKtsKQmFTRLiyjDwHOKTakCpq9J77JfhavEa4nFOtRHnpMp2rKQZG2mW4caI_fcVcbPXMxsnf196CRudRituP0SPp7CpnzFvzD6DYpa-y3NY5x_ZYJJezDXsC3120vQ |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Adaptive+Entropy+Lightweight+Encryption+Estimate+for+Software+Defined+Network+to+Mitigate+Data+Security+Threats+in+Smart+Cities&rft.jtitle=Transactions+on+emerging+telecommunications+technologies&rft.au=Shah%2C+Sunil+Kumar&rft.au=Sharma%2C+Raghavendra&rft.au=Shukla%2C+Neeraj&rft.date=2025-02-01&rft.pub=John+Wiley+%26+Sons%2C+Ltd&rft.issn=2161-3915&rft.eissn=2161-3915&rft.volume=36&rft.issue=2&rft.epage=n%2Fa&rft_id=info:doi/10.1002%2Fett.70067&rft.externalDBID=10.1002%252Fett.70067&rft.externalDocID=ETT70067 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2161-3915&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2161-3915&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2161-3915&client=summon |