2013 International Conference on Information Communication and Embedded Systems (ICICES) 2013
DOI: 10.1109/icices.2013.6508249
|View full text |Cite
|
Sign up to set email alerts
|

Dynamic router selection and encryption for data secure in Wireless Sensor Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 11 publications
0
4
0
Order By: Relevance
“…https://www.indjst.org/ According to Figure 5 and Figure 6, the proposed lightweight key generation method required minimum time and energy for data encryption and decryption. It shows almost 20.50% lower energy consumption than other encryption mechanisms such as (10,12) .…”
Section: Resultsmentioning
confidence: 95%
See 3 more Smart Citations
“…https://www.indjst.org/ According to Figure 5 and Figure 6, the proposed lightweight key generation method required minimum time and energy for data encryption and decryption. It shows almost 20.50% lower energy consumption than other encryption mechanisms such as (10,12) .…”
Section: Resultsmentioning
confidence: 95%
“…Standard and Rivest Shamir Adleman algorithm: (10) 1 to 10 23 64 Tropea M. (12) 1 to 12 25 and 46 64 and 128 Anurag Yadav (11) 1 to 8 21 and 39 64 and 128 Zhou L. (9) 1 to 5 9 and 17 32 and 64 Lightweight (proposed) 1 to 5, 10 8, 13 and 34 32,64 and 128…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations