Your English writing platform
Free sign upSuggestions(5)
Exact(8)
Recently, a promising methodology, random key pre-distribution schemes based on symmetric cryptography, has been proposed.
Due to the calculation ability and the storage capacity of sensor nodes, new protocols are specially based on symmetric cryptography.
Most existing key management solutions are based on symmetric cryptography mainly because of its reasonable energy consumption.
There has been significant research on efficient multicast source authentication algorithms based on symmetric cryptography that attempt to minimize the computation expense of the devices.
In this paper, we propose a new key management scheme based on symmetric cryptography which is well adapted to the specific properties of WSNs.
Therefore in hybrid wireless networks it is preferable to use authentication protocols that are based on symmetric cryptography, which expend less node energy.
Similar(52)
In the LEAP protocol, a deterministic key sharing scheme based on symmetric key cryptography [3], the pairwise key establishment process between the neighboring nodes can be described as follows: (1).
The techniques we employ are based on symmetric-key cryptography.
This scheme is based on symmetric design (Section 2).
To meet node's resource constraints, we have based our solution on symmetric cryptography.
Existing service-oriented architectures designed for mobile cloud computing are based on the symmetric encryption cryptography to support different media services.
Write better and faster with AI suggestions while staying true to your unique style.
Since I tried Ludwig back in 2017, I have been constantly using it in both editing and translation. Ever since, I suggest it to my translators at ProSciEditing.
Justyna Jupowicz-Kozak
CEO of Professional Science Editing for Scientists @ prosciediting.com