2016 2nd International Conference on Advanced Technologies for Signal and Image Processing (ATSIP) 2016
DOI: 10.1109/atsip.2016.7523055
|View full text |Cite
|
Sign up to set email alerts
|

Image encryption with the AES algorithm in wireless sensor network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 9 publications
(11 citation statements)
references
References 3 publications
0
9
0
Order By: Relevance
“…To achieve the objectives of this research, a deep review of the published work has been done to select the most suitable encryption algorithm, and to determine the QoS parameters. The objectives were built upon claims by [15], [4] and [3], stating that AES is not suitable for real time applications and wireless nodes limitations. As we explained, the proposed algorithm uses similar functions with the ones used in AES but with some enhancements.…”
Section: Methodsmentioning
confidence: 99%
See 3 more Smart Citations
“…To achieve the objectives of this research, a deep review of the published work has been done to select the most suitable encryption algorithm, and to determine the QoS parameters. The objectives were built upon claims by [15], [4] and [3], stating that AES is not suitable for real time applications and wireless nodes limitations. As we explained, the proposed algorithm uses similar functions with the ones used in AES but with some enhancements.…”
Section: Methodsmentioning
confidence: 99%
“…Reducing the number of rounds in the new algorithm processes will decrease the power consumption and at the same time reduces the execution time and keeps the complexity the same because the complexity was already increased in the S-Box stage as mentioned in section (A). As explained, [15] suggest five rounds AES, which is still critical in term of security. [4] confirmed that the last successful attack was on seven rounds.…”
Section: Proposed Nine-rounds Iterationmentioning
confidence: 99%
See 2 more Smart Citations
“…However, there is still a high energy consumption in their proposed work which not suit the wireless limitations, also, there is a lack of vital security analysis to prove its strength. Moreover, authors in [15] suggest a 5-rounds AES encryption algorithm for multimedia and real time applications in wireless sensor network. The results show a reduction of the execution time.…”
Section: Literature Reviewmentioning
confidence: 99%