Research Article
Power Adaptive Data Encryption for Energy-Efficient and Secure Communication in Solar-Powered Wireless Sensor Networks
Table 2
The characteristics of symmetric-key and public-key algorithm.
| Algorithm | Reencryption on relaying | Encryption speed | Energy required for encoding | Security level |
| Public-key algorithm (ECIES) | X | Slow | More | Strong | Symmetric-key algorithm (AES) | O | Fast | Less | Weak |
|
|