2017 International Conference on Computing Intelligence and Information System (CIIS) 2017
DOI: 10.1109/ciis.2017.50
|View full text |Cite
|
Sign up to set email alerts
|

The Best Performance Evaluation of Encryption Algorithms to Reduce Power Consumption in WSN

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 14 publications
(9 citation statements)
references
References 9 publications
0
9
0
Order By: Relevance
“…These tables combine the predefined bits, which are employed in two more tables, C and D. Normally, the C -D function produces four 4 * 4 matrices. Skm1-Skm2-Skm3-Skm4-Skm5-Skm6-Skm7-Skm8-Skm9 The matrices are based on the C and D conversion and are supplemented with bit combinations that result in four keys (Kr) [63].…”
Section: Master Schedule -Time Expansionmentioning
confidence: 99%
“…These tables combine the predefined bits, which are employed in two more tables, C and D. Normally, the C -D function produces four 4 * 4 matrices. Skm1-Skm2-Skm3-Skm4-Skm5-Skm6-Skm7-Skm8-Skm9 The matrices are based on the C and D conversion and are supplemented with bit combinations that result in four keys (Kr) [63].…”
Section: Master Schedule -Time Expansionmentioning
confidence: 99%
“…In [33], the power consumption of the RC4, AES, DES, and RSA algorithms was measured on a WSN (wireless sensor network). The CBC (cipher block chaining) mode of operation was used for AES and DES.…”
Section: Related Workmentioning
confidence: 99%
“…However, in order to verify the registration status of each reply, the network device needs to maintain a status table, which may increase additional storage and management overhead. Reference [3] proposed an encryption algorithm based on WSN (Wireless Sensor Networks) to reduce power consumption, and used asymmetric password RSA to set different key sizes for data blocks to complete information encryption and decryption. However, this method needs to consider the actual capabilities and limitations of nodes.…”
Section: Introductionmentioning
confidence: 99%