2011
DOI: 10.5120/1767-2424
|View full text |Cite
|
Sign up to set email alerts
|

Novel and Efficient Cellular Automata Based Symmetric Key Encryption Algorithm for Wireless Sensor Networks

Abstract: Our proposed method L2D-CASKE, the lightweight 2-dimensional (2-D) Cellular Automata (CA) based symmetric key encryption algorithm is a 128 bit length that allows a key length of 128 bits. It is designed as a lightweight encryption algorithm. As being light weight, it can be easily applied on small devices such as wireless sensor motes, smart cards and other PDAs. An encryption algorithm having simple loop operations, based on iterative parameters is used in this work. A number of sequences and operations are … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
5
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(12 citation statements)
references
References 18 publications
(23 reference statements)
0
5
0
Order By: Relevance
“…In this paper, the diffusion (propagation and redistribution) of metabolic factors has been simulated relying on Block Cellular Automata (BCA) paradigm [ 45 47 ] which implements simple rules. First, the lattice is split up into 3 × 3 nonoverlapping blocks ( Figure 2 ).…”
Section: Methodsmentioning
confidence: 99%
“…In this paper, the diffusion (propagation and redistribution) of metabolic factors has been simulated relying on Block Cellular Automata (BCA) paradigm [ 45 47 ] which implements simple rules. First, the lattice is split up into 3 × 3 nonoverlapping blocks ( Figure 2 ).…”
Section: Methodsmentioning
confidence: 99%
“…For comparative discussions, a few implementations results of block ciphersL2DCASKE [10], SEA [19] [20], AES [17] [18] [21], DESXL [22], PRESENT [23], XTEA [24] are presented in Table 2. The symbol # denotes the block ciphers that are implemented straightforwardly in to the same FPGA device to aid precise comparative analysis.…”
Section: Hardware Implementation and Synthesis Resultsmentioning
confidence: 99%
“…A new generation is created according to some mathematical fixed rule called local update rule function or simply rule function. This local update rule function is applied to the whole grid simultaneously and the new state of each cell in terms of the current state of the cell and the states of the cells in its neighbourhood is determined [8]- [10].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…These methods include disambiguation-based, disambiguation-disambiguation network, hash-based methods, etc., each of which has its unique advantages and limitations [3]. Some traditional image encryption methods rely heavily on disambiguation techniques, such as disrupting the order of pixels or performing pixel substitution [4][5][6].…”
Section: Introductionmentioning
confidence: 99%