2016
DOI: 10.1016/j.procs.2016.02.082
|View full text |Cite
|
Sign up to set email alerts
|

Symmetric Key Encryption Technique: A Cellular Automata based Approach in Wireless Sensor Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 36 publications
(5 citation statements)
references
References 12 publications
0
5
0
Order By: Relevance
“…end if (38) end if (39) end for (40) that correspond to the target locations located in QR I MWSN are processed based on the exact values of μ t i,x j and/or n t i,x j , where μ t i,x j and n t i,x j denote the total data number and the qualified data number, respectively, corresponding to the location Loc t i,x j , which is supposed to be in the queried region QR I MWSN . During the procedure of processing the Data − proofPackets, the OPE-encrypted items are all removed from the original Data − proofPackets since the only use of them is to make fog nodes find out the qualified Top-k data items encrypted with the pairwise keys.…”
Section: Secure Spatial-temporal Top-k Query Processingmentioning
confidence: 99%
See 2 more Smart Citations
“…end if (38) end if (39) end for (40) that correspond to the target locations located in QR I MWSN are processed based on the exact values of μ t i,x j and/or n t i,x j , where μ t i,x j and n t i,x j denote the total data number and the qualified data number, respectively, corresponding to the location Loc t i,x j , which is supposed to be in the queried region QR I MWSN . During the procedure of processing the Data − proofPackets, the OPE-encrypted items are all removed from the original Data − proofPackets since the only use of them is to make fog nodes find out the qualified Top-k data items encrypted with the pairwise keys.…”
Section: Secure Spatial-temporal Top-k Query Processingmentioning
confidence: 99%
“…us, the computation complexity of the loop body depends on the pairwise-key encryption methods used in STQ-SCS and the total length of the data that need to be encrypted as well as the computation complexity of OPE. Although different pairwise-key cryptography methods, such as [34,37], may have different computation complexities, they are considered lightweight generally and fit for the resource-limited sensor nodes [38,39], let alone the fog nodes which are much more powerful than the sensor nodes. Moreover, OPE also has low computation complexity according to [35].…”
Section: Computation Complexity Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…Recently some good cryptographic algorithms using CA characteristics have been introduced [24]- [26] and they have shown comparatively better behaviors at times with the likes of DES, 2-DES etc. In this paper, a very efficient rule selection algorithm is used to generate a random sequence.…”
Section: A Significance Of Ca In Lightweight Encryptionmentioning
confidence: 99%
“…Cryptography has mainly two types. Symmetric-key cryptography (SKC) and Asymmetric-key cryptography (AKC) (Parikshit N. Mahalle & Poonam N. Railkar, 2015) (Roy & Dey 2016).…”
Section: Introductionmentioning
confidence: 99%