Enhancing Underwater Sensor Network Security with Coordinated Communications

Author(s):  
Zheng Peng ◽  
Xu Han ◽  
Yun Ye
Author(s):  
Jos-Marcos Nogueira ◽  
Hao-Chi Wong ◽  
Antonio A.F. Loureiro ◽  
Chakib Bekara ◽  
Maryline Laurent-Makanvicius ◽  
...  

2010 ◽  
Vol 4 (11) ◽  
pp. 1257-1273 ◽  
Author(s):  
Oscar Garcia-Morchon ◽  
Thomas Falck ◽  
Klaus Wehrle

2017 ◽  
Vol 13 (11) ◽  
pp. 102 ◽  
Author(s):  
Juan Li

<span style="color: black; font-family: 'Times New Roman',serif; font-size: 10pt; mso-fareast-font-family: 宋体; mso-themecolor: text1; mso-ansi-language: EN-US; mso-fareast-language: ZH-CN; mso-bidi-language: AR-SA;" lang="EN-US">In order to study the symmetric cryptography algorithm, which plays an essential role in ensuring the information security, AES (Advanced Encryption Standard) basic theory is discussed, and AES protocol processor for a small area based on wireless sensor network is designed. In addition, an iterative encryption and decryption AES structure is designed to achieve the non-linear transformation. And then, the wireless sensor network security is analyzed, and the results showed that in the process of encryption and decryption, making use of multiplexing and sharing technologies can help to obtain a low cost compact structure. And more importantly, it has great advantages in the resources compared with the same kind of designed structures. Based on the above findings, it is concluded that AES algorithm has good performances in wireless sensor networks and it can be widely applied.</span>


Sign in / Sign up

Export Citation Format

Share Document