2018
DOI: 10.1088/1742-6596/1007/1/012037
|View full text |Cite
|
Sign up to set email alerts
|

SMS Security System on Mobile Devices Using Tiny Encryption Algorithm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0
1

Year Published

2018
2018
2024
2024

Publication Types

Select...
9
1

Relationship

0
10

Authors

Journals

citations
Cited by 15 publications
(7 citation statements)
references
References 1 publication
0
6
0
1
Order By: Relevance
“…However, it degrades the strength and efficiency of the security algorithm. In addition, it takes a huge time for the encryption and decryption process [38,39]. A novel tiny symmetric encryption algorithm (NTSA) is suggested to improve the security of IoT networks by providing additional key confusion for each round of encryption [40].…”
Section: Lightweight Cryptography Schemes For Coapmentioning
confidence: 99%
“…However, it degrades the strength and efficiency of the security algorithm. In addition, it takes a huge time for the encryption and decryption process [38,39]. A novel tiny symmetric encryption algorithm (NTSA) is suggested to improve the security of IoT networks by providing additional key confusion for each round of encryption [40].…”
Section: Lightweight Cryptography Schemes For Coapmentioning
confidence: 99%
“…Nonetheless, this method utilized the same key for all encryption rounds which resulted in security reducing. Novelan et al [8] established an SMS security system for mobile devices by the TEA. This system confirms that the securing messages are ciphered in the key to getting the ciphered SMS message directed to the mobile number destination.…”
Section: Related Workmentioning
confidence: 99%
“…In our experiments, we used the TOSSIM simulator which is used for wireless sensor networks (WSNs) [31] to build the vehicle sensor-base station model. To measure the execution time of CPC and other encryption algorithms, we tested a variety of encryption algorithms in the TinyOS [17] system through many experiments, including CPC, TEA [32], XTEA [33], and AES [34], which are all newly proposed algorithms and used for low-resource embedded devices or mobile devices. Novelan et al gave the implementation of the encryption algorithm TEA.…”
Section: Experiments and Analysismentioning
confidence: 99%