By combining the AES algorithm with a threshold-oriented encryption method, this study aims to increase the throughput of secure key sharing in network infrastructure. Instructions and Supplies: The results show the presence of two groups. An encryption technique that is focused toward thresholds is part of Group 1, while a vector routing mechanism is part of Group 2. The iteration count of the threshold-oriented encryption technique was varied; the parameters used were an enrollment ratio of 1.1, alpha and beta values of 0.05 and 0.5, and a 95% confidence level. In this study, the G-power pretest result is 85%. When it comes to safeguarding protected keys, the results show that the AES method achieves 1.76 throughput, while the threshold-oriented encryption strategy only manages 1.49. The two groups are distinct from one another, and this difference is statistically significant (p=0.005, 95% CI). Accordingly, AES with Secret Sharing Key is surpassed in performance by a threshold-oriented encryption method. Based on the results, it can be concluded that threshold-oriented encryption outperforms the AES algorithm in terms of throughput.

1.
Alameri
,
Ibrahim
,
Jitka
Komarkova
,
Tawfik
Al-Hadhrami
, and
Ahmad
Lotfi
.
2022
. “
Systematic Review on Modification to the on-Demand Distance Vector Routing Discovery Mechanics
.”
PeerJ. Computer Science
8
(September):
e1079
.
2.
Amutha
Prabakar
, M.
2014
.
Authentication Scheme for Dynamic Group Using Threshold Cryptography
.
LAP Lambert Academic Publishing
.
3.
S. M.
Lakshmi
and
S. V.
Lakshmi
, “
Effect of Fines on Strength of Granular Soil Reinforced with Geosynthetics
,”
E3S Web of Conferences
, vol.
405
, p.
03010
,
2023
, doi: .
4.
Dobbertin
,
Hans
,
Vincent
Rijmen
, and
Aleksandra
Sowa
.
2005
.
Advanced Encryption Standard - AES: 4th International Conference
, AES 2004,
Bonn, Germany
, May 10-12, 2004,
Revised Selected and Invited Papers. Springer
.
5.
P.
Srinivasaperumal
and
V. L.
Sivakumar
, “
Geospatial Techniques for Quantitative Analysis of Urban Expansion and the Resulting Land Use Change along the Chennai Outer Ring Road (ORR) Corridor
,”
2022 4th International Conference on Advances in Computing, Communication Control and Networking (ICAC3N)
, Dec.
2022
, doi: .
6.
Gurusamy
,
Gobi
.
2006
.
Enhanced Ad Hoc On-Demand Distance Vector Routing Protocol for Mobile Ad Hoc Network Internet Connectivitiy.
7.
Mamdooh
Alwetaishi
et al., “
Pore size variation of nano-porous material fixer on the engine bowl and its combined effects on hybrid nano-fuelled CI engine characteristics
,”
Fuel
, vol.
345
, p.
128149
, Aug.
2023
, doi: .
8.
Joshi
,
Yogesh
.
2012
.
Hardware Encryption of AES Algorithm on Android Platform.
9.
KatipoğLu
,
Okan Mert
, and
Metin
Sarıgöl.
2023
. “
Coupling Machine Learning with Signal Process Techniques and Particle Swarm Optimization for Forecasting Flood Routing Calculations in the Eastern Black Sea Basin, Türkiye
.”
Environmental Science and Pollution Research International
, January. .
10.
N
Ahalya
et al., “
A comprehensive review on the novel approaches using nanomaterials for the remediation of soil and water pollution
,”
Alexandria Engineering Journal
, vol.
86
, pp.
373
385
, Jan.
2024
, doi: .
11.
L.
Kamaraj
,
V.
Mohanavel
,
Y.
Jazaa
,
F.
Qahtani
, and
S.
Althahban
, “
A novel technique implementation to fabricate and analysis of AZ91D with TiN through FSP
,”
The International Journal of Advanced Manufacturing Technology
, Jul.
2023
, doi: .
12.
Maeda
,
Tomoki
,
Osamu
Kobayashi
,
Eriko
Eto
,
Masanori
Inoue
,
Kazuhito
Sekiguchi
, and
Kenji
Ihara
.
2022
. “
An Algorithm for the Detection of General Movements of Preterm Infants Based on the Instantaneous Heart Rate
.”
Children
10
(
1
). .
13.
Okoro
,
Obinna
.
2015
.
An Improved Distance Vector Routing Protocol
.
LAP Lambert Academic Publishing
.
14.
Yan
Li
(doctor of computer science.).
2011
.
Reliability and Security of Vector Routing Protocols.
15.
Yenuguvanilanka
,
Jyothi
.
2008
.
Performance Evaluation of Hardware Models of Advanced Encryption Standard (AES) Algorithm: A Thesis Presented to the Faculty of the Graduate School
,
Tennessee Technological University.
16.
Saravanan
Kathirvel
et al., “
Performance enhancement by tungsten trioxide and silicon dioxide mixed nanofluids in solar collector of evacuated tube type
,”
Case Studies in Thermal Engineering
, vol.
55
, p.
104098
, Mar.
2024
, doi:
17.
Vijayan
,
V.
,
Babu
,
A. K. A.
,
Balasubramanian
,
P. L.
, &
Jeganathan
,
M.
(Eds.). (
2022
, July).
Preface: ICMMNT21
. In
AIP Conference Proceedings
(Vol.
2473
, No.
1
, p.
010001
). AIP Publishing LLC.
18.
Zhang
,
Guomei
, and
Hao
Sun
.
2016
. “
Secure Distributed Detection under Energy Constraint in IoT-Oriented Sensor Networks
.”
Sensors
16
(
12
). .
19.
Sarkar
,
Subir Kumar
,
T. G.
Basavaraju
, and
C.
Puttamadappa
.
2016
.
Ad Hoc Mobile Wireless Networks: Principles, Protocols, and Applications, Second Edition
.
CRC Press
.
20.
Singh
,
Satvir
.
2014
.
International Conference on Communication, Computing & Systems: ICCCS-2014
.
21.
Siva Ram Murthy
,
C.
, and
B. S.
Manoj
.
2004
.
Ad Hoc Wireless Networks: Architectures and Protocols
.
Pearson Education
.
22.
Vijayan
,
V.
,
Dinesh
,
S.
,
Parthiban
,
A.
, &
Srinivasan
,
R.
(Eds.). (
2021
, July).
International Virtual Conference on Recent Materials and Engineering Applications for Sustainable Environment (ICRMESE2020
). In
AIP Conference Proceedings
(Vol.
2378
, No.
1
, p.
010001
). AIP Publishing LLC.
23.
Steinmetz
,
Ralf
.
2005
.
Peer-to-Peer Systems and Applications
.
Springer Science & Business Media
.
24.
Sukiswo
,
Sukiswo
, and
Muhamad Rifqi
Rifquddin
.
2015
. “
Performance of AOMDV Routing Protocol under Rushing and Flooding Attacks in MANET
.”
2015 2nd International Conference on Information Technology, Computer, and Electrical Engineering (ICITACEE)
. .
25.
Srinivasan
,
R.
,
Vijayan
,
V.
,
Babu
,
A. K. A.
,
Balasubramanian
,
P. L.
,
Jeganathan
,
M.
, &
Sathish
,
T.
(Eds.). (
2023
, November).
Preface–ICMSA21
. In
AIP Conference Proceedings
(Vol.
2822
, No.
1
, p.
010001
). AIP Publishing LLC.
26.
Thomson
,
William
.
2000
. “
Rushing, Jimmy (1903-1972), Singer and Composer
.”
American National Biography Online.
.
27.
Cui
,
Qianqian
,
Zhengli
Shi
,
Duman
Yimamaidi
,
Ben Hu
,
Zhuo Zhang
,
Muhammad
Saqib
,
Ali
Zohaib
, et al.
2023
. “
Dynamic Variations in COVID-19 with the SARS-CoV-2 Omicron Variant in Kazakhstan and Pakistan
.”
Infectious Diseases of Poverty
12
(
1
):
18
.
28.
Gurukumaresan
,
D.
,
Duraisamy
,
C.
, &
Srinivasan
,
R.
(
2020
).
On Solving Transportation Problem in Fuzzy Environment Using Ranking Function
.
Gedrag Organ. Rev
,
33
(
02
),
1511
1520
.
29.
Deng
,
Lisha
,
Zheng
Chu
,
Peng
Liu
,
Baijia
Li
,
Gang
Lei
,
Shaofu
Li
,
Yongkang
Ma
, and
Yonghui
Dang
.
2023
. “
Effects of Brain-Derived Neurotrophic Factor and Adeno-Associated Viral Vector on Morphine-Induced Condition through Target Concentration Changes in the Ventral Tegmental Area and Nucleus Accumbens
.”
Behavioural Brain Research
445
(March):
114385
.
30.
Muruganandam
,
S.
, &
Srinivasan
,
R.
(
2016
).
A method of solution to intuitionistic fuzzy transportation problem
.
Asian Journal of Research in Social Sciences and Humanities
,
6
(
5
),
753
761
.
31.
El Kaissi
,
Rouba Zakaria
.
2005
.
DAWWSEN: A Defense Mechanism Against Wormhole Attacks in Wireless Sensor Networks
.
32.
Konduru
,
Satyadeva Prasad
.
2000
.
An Adaptive Distance Vector Routing Algorithm for Mobile, Ad Hoc Networks
.
This content is only available via PDF.
You do not currently have access to this content.