2011 International Conference on Recent Trends in Information Technology (ICRTIT) 2011
DOI: 10.1109/icrtit.2011.5972351
|View full text |Cite
|
Sign up to set email alerts
|

An improved AES-ECC hybrid encryption scheme for secure communication in cooperative diversity based Wireless Sensor Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 28 publications
(5 citation statements)
references
References 12 publications
0
5
0
Order By: Relevance
“…The ECC is utilized to encrypt and transfer the Private Keys as AES Private Keys while AES encrypts the plain text (communication data). The process is applied when an entity needs to encrypt/decrypt the message [ 37 , 38 ]. The encryption/decryption processes are shown in Figure 2 , and the steps are explained as follow: Data are the users’ information, i.e., their identities, passwords, and biometrics.…”
Section: Preliminariesmentioning
confidence: 99%
“…The ECC is utilized to encrypt and transfer the Private Keys as AES Private Keys while AES encrypts the plain text (communication data). The process is applied when an entity needs to encrypt/decrypt the message [ 37 , 38 ]. The encryption/decryption processes are shown in Figure 2 , and the steps are explained as follow: Data are the users’ information, i.e., their identities, passwords, and biometrics.…”
Section: Preliminariesmentioning
confidence: 99%
“…The research result speed process 2 Mbps that will be compatible with LTE, more complex and attack resistance system, and of course the round number can be variated. (Ganesh et al, 2011) have conducted research to improve AES-Elliptic Curve Cryptography (ECC) hybrid encryption scheme for secure communication in cooperative diversity based wireless sensor networks. The research was started by power supply limitation on wireless sensor network system, especially for supporting cryptography process.…”
Section: Purposed Cryptography Algorithmmentioning
confidence: 99%
“…Al-Haj, et al [11] Characterized security mindful asset designation as a Constraint fulfillment issue (CSP) which is settled utilizing a Satisfiable Model (SMT) solver. The exploratory investigation uncovers the effective approach in limiting danger and upgrading the tractability of cloud virtual machine security design.…”
Section: Related Workmentioning
confidence: 99%