-
1
Encryption time (sec).
Published 2025“…<div><p>The Internet of Things (IoT) includes vehicles, homes, and integrated sensors and many interconnected physical devices that gather and share data to interact with their environment. Data moving across multiple levels is vulnerable to various security threats, including leaks and unauthorized access. …”
-
2
Encryption time (sec).
Published 2025“…<div><p>The Internet of Things (IoT) includes vehicles, homes, and integrated sensors and many interconnected physical devices that gather and share data to interact with their environment. Data moving across multiple levels is vulnerable to various security threats, including leaks and unauthorized access. …”
-
3
Encryption throughput (Byte/sec).
Published 2025“…<div><p>The Internet of Things (IoT) includes vehicles, homes, and integrated sensors and many interconnected physical devices that gather and share data to interact with their environment. Data moving across multiple levels is vulnerable to various security threats, including leaks and unauthorized access. …”
-
4
Encryption throughput (Kb/sec).
Published 2025“…<div><p>The Internet of Things (IoT) includes vehicles, homes, and integrated sensors and many interconnected physical devices that gather and share data to interact with their environment. Data moving across multiple levels is vulnerable to various security threats, including leaks and unauthorized access. …”
-
5
A sample of original dataset.
Published 2025“…Multi-stage deception (MSD) methods leverage multiple deception strategies, such as complement, swapping, and stack reversal, to improve data protection levels and resistance against decryption attempts. …”
-
6
Attributes classification based on MSD.
Published 2025“…Multi-stage deception (MSD) methods leverage multiple deception strategies, such as complement, swapping, and stack reversal, to improve data protection levels and resistance against decryption attempts. …”
-
7
Privacy-preserving techniques evaluation.
Published 2025“…Multi-stage deception (MSD) methods leverage multiple deception strategies, such as complement, swapping, and stack reversal, to improve data protection levels and resistance against decryption attempts. …”
-
8
A sample of the dataset after applying MSD.
Published 2025“…Multi-stage deception (MSD) methods leverage multiple deception strategies, such as complement, swapping, and stack reversal, to improve data protection levels and resistance against decryption attempts. …”
-
9
Comparison of cryptographic systems [66,67].
Published 2025“…The encryption process uses modular multiplication: . This changes plaintext into ciphertext. …”
-
10
Overview of LWLCM.
Published 2025“…<div><p>The Internet of Things (IoT) includes vehicles, homes, and integrated sensors and many interconnected physical devices that gather and share data to interact with their environment. Data moving across multiple levels is vulnerable to various security threats, including leaks and unauthorized access. …”
-
11
Key initialization.
Published 2025“…<div><p>The Internet of Things (IoT) includes vehicles, homes, and integrated sensors and many interconnected physical devices that gather and share data to interact with their environment. Data moving across multiple levels is vulnerable to various security threats, including leaks and unauthorized access. …”
-
12
Decryption Time(sec).
Published 2025“…<div><p>The Internet of Things (IoT) includes vehicles, homes, and integrated sensors and many interconnected physical devices that gather and share data to interact with their environment. Data moving across multiple levels is vulnerable to various security threats, including leaks and unauthorized access. …”
-
13
Key-Keystream Avalanche effect.
Published 2025“…<div><p>The Internet of Things (IoT) includes vehicles, homes, and integrated sensors and many interconnected physical devices that gather and share data to interact with their environment. Data moving across multiple levels is vulnerable to various security threats, including leaks and unauthorized access. …”
-
14
Memory usage (Kb).
Published 2025“…<div><p>The Internet of Things (IoT) includes vehicles, homes, and integrated sensors and many interconnected physical devices that gather and share data to interact with their environment. Data moving across multiple levels is vulnerable to various security threats, including leaks and unauthorized access. …”
-
15
Key-Cipher Text Avalanche effect.
Published 2025“…<div><p>The Internet of Things (IoT) includes vehicles, homes, and integrated sensors and many interconnected physical devices that gather and share data to interact with their environment. Data moving across multiple levels is vulnerable to various security threats, including leaks and unauthorized access. …”
-
16
Average Avalanche effect for Key-Cipher text.
Published 2025“…<div><p>The Internet of Things (IoT) includes vehicles, homes, and integrated sensors and many interconnected physical devices that gather and share data to interact with their environment. Data moving across multiple levels is vulnerable to various security threats, including leaks and unauthorized access. …”
-
17
Bifurcation diagram of logistic map.
Published 2025“…<div><p>The Internet of Things (IoT) includes vehicles, homes, and integrated sensors and many interconnected physical devices that gather and share data to interact with their environment. Data moving across multiple levels is vulnerable to various security threats, including leaks and unauthorized access. …”
-
18
Decryption time (sec).
Published 2025“…<div><p>The Internet of Things (IoT) includes vehicles, homes, and integrated sensors and many interconnected physical devices that gather and share data to interact with their environment. Data moving across multiple levels is vulnerable to various security threats, including leaks and unauthorized access. …”
-
19
A comparative analysis of existing work.
Published 2025“…<div><p>The Internet of Things (IoT) includes vehicles, homes, and integrated sensors and many interconnected physical devices that gather and share data to interact with their environment. Data moving across multiple levels is vulnerable to various security threats, including leaks and unauthorized access. …”
-
20
Key issues with traditional cryptography.
Published 2025“…<div><p>The Internet of Things (IoT) includes vehicles, homes, and integrated sensors and many interconnected physical devices that gather and share data to interact with their environment. Data moving across multiple levels is vulnerable to various security threats, including leaks and unauthorized access. …”