Abstract:
This work investigates the encryption and decoding strategies for getting ecological sensor telemetry information. The review assesses both symmetric and awry encryption calculations considering their encryption and decoding times. The point is to distinguish the most reasonable encryption procedures that give harmony between security and execution for safeguarding delicate natural sensor information. The examination incorporates famous symmetric calculations like Blowfish, Twofish, RC4, AES, and ChaCha20, as well as topsy-turvy and crossbreed encryption approaches like ECC + AES, 3DES, 3DES + RSA, AES + RSA, and ChaCha-20 + RSA. This examination makes a huge commitment by directing a far-reaching near investigation of symmetric encryption calculations, in particular Blowfish, Twofish, RC4, AES, and ChaCha20, with a particular spotlight on their encryption and decoding times. By assessing the exhibition and security qualities of both uneven calculations and crossbreed encryption draws near, like ECC + AES, 3DES, 3DES + RSA, AES + RSA, and ChaCha-20 + RSA, the review gives important experiences into their appropriateness for getting natural sensor telemetry information. The examination reaches out to investigate the compromises among security and execution innate in various encryption and unscrambling methods, offering a nuanced comprehension of their suggestions about ecological sensor information assurance. The outcomes feature the qualities and shortcomings of every calculation, empowering analysts, and experts to pursue informed choices with information security in ecological sensor telemetry.