2009
DOI: 10.7763/ijcte.2009.v1.48
|View full text |Cite
|
Sign up to set email alerts
|

Evaluating the Effects of Cryptography Algorithms on Power Consumption for Wirelessdevices

Abstract: the increasing of wireless systems provides malicious entities greater incentives to step up their efforts to gain unauthorized access to the information being exchanged over the wireless link. As the world becomes more dependent on wireless networks, it needs to improve the ways that protect them. Security is important for wireless networks, mainly because the communications signals are openly available as they propagate through the air. The security settings can be different in many factors, but the main fac… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0
1

Year Published

2015
2015
2023
2023

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(12 citation statements)
references
References 10 publications
(7 reference statements)
0
11
0
1
Order By: Relevance
“…The first part is the architecture of Rasefiberry as well as hardware and software specifications. The second part is the research evaluation methods to test the security of Rasefiberry IDS with Kali Linux tools and power efficiency of Rasefiberry available encryption algorithm based on [23,24] research. Figure 2…”
Section: Methodsmentioning
confidence: 99%
“…The first part is the architecture of Rasefiberry as well as hardware and software specifications. The second part is the research evaluation methods to test the security of Rasefiberry IDS with Kali Linux tools and power efficiency of Rasefiberry available encryption algorithm based on [23,24] research. Figure 2…”
Section: Methodsmentioning
confidence: 99%
“…It does not reproduce real ant's performance. In [11], Minaam, Abdul-Kader, Hadhoud, proved that DES has better performance than 3DES. T. Muthumanickam [12] proposed that the Rijndael's SBoxes are the dominant element of the round function in terms of required logic resources.…”
Section: Background and Related Workmentioning
confidence: 99%
“…Thus, Alice and Bob generate the same key K = K A = K B = A L B L P B R A R mod p. Now, Alice and Bob can use the shared key in any cryptographic systems discussed in [14], [15] according to their needs.…”
Section: Alice Computes the Keymentioning
confidence: 99%