Differential Run-Length Encryption in Sensor Networks

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Run-Time Reconfiguration in Wireless Sensor Networks

A wireless sensor network (WSN) consists of multiple small and simple computers (nodes), whose performance is tightly linked to its unpredictable deployment environment. It is nearly impossible to design a WSN that performs well in every scenario; instead they are developed for a specific context, with performance rapidly decreasing when environment properties move away from the optimum. Enabli...

متن کامل

Asymmetric Encryption in Wireless Sensor Networks

A Wireless Sensor Network (WSN) is composed of autonomous devices called sensor nodes that generally have low computational power, limited data transmission and power constraints. AWSN consists of sensor nodes that capturing information from an environment, processing data and transmitting them via radio signals. WSNs are increasingly present in our days and can be found in environmental area (...

متن کامل

TinyTate: Identity-Based Encryption for Sensor Networks

In spite of several years of intense research, the area of security and cryptography in Wireless Sensor Networks (WSNs) still has a number of open problems. On the other hand, the advent of Identity-Based Encryption (IBE) has enabled a wide range of new cryptographic solutions. In this work, we argue that IBE is ideal for WSNs and vice versa. We discuss the synergy between the systems, describe...

متن کامل

Towards Acceptable Public-Key Encryption in Sensor Networks

One of the huge problems for security in sensor networks is the lack of resources. Based on microcontroller architectures with severe limited computing abilities, strong public-key cryptography is commonly seen as infeasible on sensor devices. In contrast to this prejudice this paper presents an efficient and lightweight implementation of public-key cryptography algorithms relying on elliptic c...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Sensors

سال: 2019

ISSN: 1424-8220

DOI: 10.3390/s19143190