2007
DOI: 10.1088/1742-6596/76/1/012063
|View full text |Cite
|
Sign up to set email alerts
|

Efficiently securing data on a wireless sensor network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
12
0

Year Published

2008
2008
2016
2016

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 25 publications
(15 citation statements)
references
References 3 publications
1
12
0
Order By: Relevance
“…Finally, Table 9 and Table 10 depict a comparison of the main operations (PM, ECDH, ECIES and AES-128 encryption) between the proposed design and software implementations tested by [3436]. …”
Section: Resultsmentioning
confidence: 99%
“…Finally, Table 9 and Table 10 depict a comparison of the main operations (PM, ECDH, ECIES and AES-128 encryption) between the proposed design and software implementations tested by [3436]. …”
Section: Resultsmentioning
confidence: 99%
“…Different types of microcontroller are available which have different internal architecture, power consumption, speed and instruction set [7] [8]. Also, sensors vary in their power consumption.…”
Section: Block Diagrammentioning
confidence: 99%
“…Most schemes provide encrypting capabilities based on a secret key shared among nodes, either in software [43] or hardware level [44], [45]. In addition, notable advances have been observed in the implementation of Elliptic Curve Cryptography (ECC) [46], [47], which has emerged as a promising alternative to RSA-based algorithms, guaranteeing the same level of security, 18 while employing a much smaller key size.…”
Section: ) Challengesmentioning
confidence: 99%