Document Type : Review Articles
Authors
1
Informatics Research Department, Electronics Research Institute (ERI), Cairo, Egypt1
2
Electrical Engineering Department, Benha Faculty of Engineering, Benha University, Benha 13511, Egypt
3
Electrical Engineering Department, Benha Faculty of Engineering, Benha University, Benha 13511, Egypt.
4
Informatics and research department,electronic research institute,Cairo,Egypt
Abstract
Securing Wireless Sensor Networks (WSNs) is essential to protect sensitive data and maintain privacy, particularly in applications where security is paramount, such as healthcare, military, and environmental monitoring. Wireless Sensor Networks (WSNs) are vulnerable to a range of security threats such as data manipulation, unauthorized access, eavesdropping, and node compromise, all of which can lead to significant consequences. Ensuring the integrity, authenticity, and confidentiality of data transmitted through WSNs is crucial to maintaining trust in the network's performance. If security measures are not in place, critical services could be disrupted, leading to potential failures in systems like smart cities, agriculture, or disaster response. Additionally, since WSNs often operate in remote and untrusted environments, securing them against both internal and external attacks is vital. By implementing effective security protocols, WSNs can safeguard not only the data they transmit but also their overall functionality, making them reliable and trustworthy for various applications. This paper aims to discuss hybrid encryption methods which used in secure wireless sensor network based on co-operative communication. Hybrid encryption combining both symmetric and asymmetric methods of encryption using hybrid encryption offering balance between security and efficiency. Also has a lot of advantages such as enhanced security by using asymmetric key technique and symmetric block cipher such as Advanced Encryption Standard, for data transmission, hybrid type faster for encryption large amount of data, it supports secure communications between multiple parties without share all of Asymmetric Keys.
Keywords
Main Subjects