2013 IEEE International Conference on Control System, Computing and Engineering 2013
DOI: 10.1109/iccsce.2013.6720027
|View full text |Cite
|
Sign up to set email alerts
|

Secure Force: A low-complexity cryptographic algorithm for Wireless Sensor Network (WSN)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
14
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
3
3

Relationship

1
5

Authors

Journals

citations
Cited by 37 publications
(14 citation statements)
references
References 7 publications
0
14
0
Order By: Relevance
“…Overall, the process of SF algorithm consists of 4 major blocks. The detail description of search block of the proposed algorithm can be found in [1].…”
Section: The Secure Force Algorithmmentioning
confidence: 99%
See 3 more Smart Citations
“…Overall, the process of SF algorithm consists of 4 major blocks. The detail description of search block of the proposed algorithm can be found in [1].…”
Section: The Secure Force Algorithmmentioning
confidence: 99%
“…The top level entity named SF combines all three modules together to form a complete single-unit to implement it on Altera DE2 board. First, a 64-bit key passes through the key generator which generates K1, K2, K3, K4, and K5 that are also 64-bit keys for all five rounds as mentioned in [1]. These five keys (K1 to K5) will be used by the encryption block which takes the plain text from the IOs and converts it into a cipher text of 64-bits by applying the encryption process, which consists of five rounds.…”
Section: Proposed Secure Force Architecture For Fpga Implementationmentioning
confidence: 99%
See 2 more Smart Citations
“…Various cryptographic algorithms can be used to encrypt an image [10] but, for WMSN we require an algorithm with less computational complexity and high reliability. For this purpose, we have chosen Secured Force encryption technique [11]. This technique performs well on the grounds of code complexity and complex key expansion where, it takes only five rounds for the encryption and performs the expansion process at data sink which, in turn, saves a lot of energy at the sensor nodes.…”
Section: Introductionmentioning
confidence: 99%