2017 IEEE Wireless Communications and Networking Conference (WCNC) 2017
DOI: 10.1109/wcnc.2017.7925562
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient Lightweight Stream Cipher Algorithm for Wireless Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
12
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 9 publications
(14 citation statements)
references
References 9 publications
0
12
0
Order By: Relevance
“…45 Linear cryptanalysis (LC) is another ultra-lightweight block cipher approach, presented in Patil et al 46 This algorithm is insecure against known-plaintext attack and chosen-plaintext attack. 47 A new lightweight algorithm lightweight pseudorandom number generator (LGA) is introduced in Maity et al 48 With the use of permutation, it is possible to launch a known/chosen-plaintext attack on this technique. 49 Another research in Solomon and Elias 50 introduces ciphertext-policy attribute-based (C-AB) encryption lightweight encryption and authentication code generation scheme.…”
Section: Literature Reviewmentioning
confidence: 99%
“…45 Linear cryptanalysis (LC) is another ultra-lightweight block cipher approach, presented in Patil et al 46 This algorithm is insecure against known-plaintext attack and chosen-plaintext attack. 47 A new lightweight algorithm lightweight pseudorandom number generator (LGA) is introduced in Maity et al 48 With the use of permutation, it is possible to launch a known/chosen-plaintext attack on this technique. 49 Another research in Solomon and Elias 50 introduces ciphertext-policy attribute-based (C-AB) encryption lightweight encryption and authentication code generation scheme.…”
Section: Literature Reviewmentioning
confidence: 99%
“…In this scheme it is "extremely difficult for an eavesdropper to guess any part of the original information from the sub-packets received along a single route as they contain only some selected bits of the original packet. " (Bhattacharya et al 2018) In addition, lightweight cipher algorithms exist that are specifically designed for energy and computational resource constrained devices in wireless networks (Maity et al 2017;Katagi et al 2008). The use of node-disjoint paths in addition to encryption to increase security is discussed in Alwan and Agarwal (2013).…”
Section: Secure Multipath Routing Related Workmentioning
confidence: 99%
“…To guarantee the security of information correspondence sessions in such systems, Stream ciphers algorithms have been used. In particular, hardware stream ciphers and software stream ciphers are the two sorts of stream ciphers each of them contingent upon the stage most suited to their execution [1]. One of the stream ciphers algorithms, Ron Rivest outlined the RC4 algorithm in 1987 but the algorithm kept mystery until the point that it was as often as possible to the cypherpunks mailing list in 1994.…”
Section: Introductionmentioning
confidence: 99%
“…One of the stream ciphers algorithms, Ron Rivest outlined the RC4 algorithm in 1987 but the algorithm kept mystery until the point that it was as often as possible to the cypherpunks mailing list in 1994. RC4 is the most satisfactory stream cipher; it is utilized as a part of numerous web conventions, for example, Wireless Protected Access (WPA), Wired Equivalent Privacy (WEP), and Secure Socket Layer/ Transport Layer Security (SSL/ TLS) [1]. It is likewise utilized as a part of use, for example, Skype.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation