Resource optimized security coding in light weight security protocol

2Citations
Citations of this article
1Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The overhead for resource utilization in the round coding operation of security coding is large. Though lightweight protocols are used as a measure of provisioning, higher level of security in many real time applications, the need of key scheduling, key generation and s-box operation leads to large resource utilization. This resource consumption intern leads to large power consumption and area overhead. To minimize the resource utilization in this paper, a new resource optimization technique following resource reutilization scheme is proposed. The resource utilization is synchronized by the delay term instruction application in cryptography coding.

Cite

CITATION STYLE

APA

Tappari, S., & Sridevi, K. (2019). Resource optimized security coding in light weight security protocol. International Journal of Innovative Technology and Exploring Engineering, 8(10), 2645–2651. https://doi.org/10.35940/ijitee.J9393.0881019

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free