2018
DOI: 10.1504/ijnvo.2018.091575
|View full text |Cite
|
Sign up to set email alerts
|

Parallel AES algorithm for performance improvement in data analytics security for IoT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
5
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(5 citation statements)
references
References 0 publications
0
5
0
Order By: Relevance
“…The researchers Chong Hee Kim and Jean-Jacques Quisquater [15] have shown the effectivity of the measures taken to protect against these types of attacks within low power consumption. A hybrid authentication system with the AES and Elliptic Curve Cryptosystem has been produced in the health-based applications from the researchers Shailja Dahiya and Manoj Bohra by slightly modified ECC system with key expansion scheme of AES [16] which produces better performance and efficiency by time (in seconds) than the existing scheme of ECC, AES. The AES algorithm has been implemented in the same health-based application by using the Copyright © 2022 MECS I.J.…”
Section: Security Through Encryptionmentioning
confidence: 99%
“…The researchers Chong Hee Kim and Jean-Jacques Quisquater [15] have shown the effectivity of the measures taken to protect against these types of attacks within low power consumption. A hybrid authentication system with the AES and Elliptic Curve Cryptosystem has been produced in the health-based applications from the researchers Shailja Dahiya and Manoj Bohra by slightly modified ECC system with key expansion scheme of AES [16] which produces better performance and efficiency by time (in seconds) than the existing scheme of ECC, AES. The AES algorithm has been implemented in the same health-based application by using the Copyright © 2022 MECS I.J.…”
Section: Security Through Encryptionmentioning
confidence: 99%
“…The IoT architecture is generally composed of three layers: the application layer, the network layer, and the perception layer. The perception layer has all of the physical objects that interconnect together and form a network [3]. Wireless Sensor Networks (WSN) are considered one of the main enabling technologies for this layer [3,4].…”
Section: Introductionmentioning
confidence: 99%
“…The perception layer has all of the physical objects that interconnect together and form a network [3]. Wireless Sensor Networks (WSN) are considered one of the main enabling technologies for this layer [3,4]. They are composed of low-power sensor nodes that have limited computational and storing capabilities and a powerful base station (BS) [5].…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations