2022
DOI: 10.1155/2022/8424100
|View full text |Cite|
|
Sign up to set email alerts
|

Optimization of AES-128 Encryption Algorithm for Security Layer in ZigBee Networking of Internet of Things

Abstract: With the rapid development of network and communication technology, the interaction of various information data is more and more frequent, and people pay more and more attention to information security. The information encryption algorithm is a research hotspot in the field of information security. The Advanced Encryption Standard (AES) algorithm has been widely used in the field of information security with its high security and encryption efficiency. This paper mainly introduces the optimization of the AES-1… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
5
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(8 citation statements)
references
References 24 publications
0
5
0
Order By: Relevance
“…In the field, each node employs an attribute‐based access control policy false(ACPfalse)$( {\mathcal{A}\mathcal{C}\mathcal{P}} )$ and an advanced encryption standard scriptAscriptEscriptS128$\mathcal{A}\mathcal{E}\mathcal{S} - 128$ offers 2 128 keys for data integrity verification in the network [31]. Thus, each node maintains private false(Pscriptrscriptkfalse)$( {{\mathcal{P}}_{\mathcal{r}\mathcal{k}}} )$ key while the scriptSscriptBscriptC$\mathcal{S}\mathcal{B}\mathcal{C}$ stores the public false(Pscriptuscriptkfalse)$( {{\mathcal{P}}_{\mathcal{u}\mathcal{k}}} )$ key and expiry time information in the scriptSscriptCPs$\mathcal{S}\mathcal{C}{\mathcal{P}}_{\mathcal{s}}$ such that Pscriptuscriptk0.33emand0.33emPscriptrscriptkscriptSNn|scriptSscriptBscriptC${\mathcal{P}}_{\mathcal{u}\mathcal{k}}\ {\mathrm{and}}\ {\mathcal{P}}_{\mathcal{r}\mathcal{k}} \in \mathcal{S}{\mathcal{N}}_{\mathcal{n}}| {\mathcal{S}\mathcal{B}\mathcal{C}} $ in the network.…”
Section: Network Modelmentioning
confidence: 99%
“…In the field, each node employs an attribute‐based access control policy false(ACPfalse)$( {\mathcal{A}\mathcal{C}\mathcal{P}} )$ and an advanced encryption standard scriptAscriptEscriptS128$\mathcal{A}\mathcal{E}\mathcal{S} - 128$ offers 2 128 keys for data integrity verification in the network [31]. Thus, each node maintains private false(Pscriptrscriptkfalse)$( {{\mathcal{P}}_{\mathcal{r}\mathcal{k}}} )$ key while the scriptSscriptBscriptC$\mathcal{S}\mathcal{B}\mathcal{C}$ stores the public false(Pscriptuscriptkfalse)$( {{\mathcal{P}}_{\mathcal{u}\mathcal{k}}} )$ key and expiry time information in the scriptSscriptCPs$\mathcal{S}\mathcal{C}{\mathcal{P}}_{\mathcal{s}}$ such that Pscriptuscriptk0.33emand0.33emPscriptrscriptkscriptSNn|scriptSscriptBscriptC${\mathcal{P}}_{\mathcal{u}\mathcal{k}}\ {\mathrm{and}}\ {\mathcal{P}}_{\mathcal{r}\mathcal{k}} \in \mathcal{S}{\mathcal{N}}_{\mathcal{n}}| {\mathcal{S}\mathcal{B}\mathcal{C}} $ in the network.…”
Section: Network Modelmentioning
confidence: 99%
“…Seth et al [12] has done the comparative analysis of three algorithms; RSA, DES and AES while considering certain parameters such as computation time, memory usage and output byte. These parameters are the major issues of concern in any encryption algorithms.…”
Section: Related Workmentioning
confidence: 99%
“…Medical image encryption technology is specifically designed to obfuscate the original information contained within medical images, thereby safeguarding the security of patient data. While traditional encryption algorithms used for textual information, such as the Data Encryption Standard (DES), Advanced Encryption Standard (AES), and Rivest-Shamir-Adleman (RSA) algorithm, have demonstrated excellent performance, they face unique challenges when applied to image encryption (Ye et al, 2021 ; Luo et al, 2022 ). The high inter-pixel correlation and redundancy within images hinder the effectiveness of these methods in the context of medical image encryption (Hua et al, 2021 ).…”
Section: Introductionmentioning
confidence: 99%