Aly Mohamed El-Semary

Learn More
Recently,Wireless SensorNetworks (WSNs) have been deployed into a variety of applications including homeland security, military systems, and health care. Sensor nodes deployed in such networks are subject to several attacks such as sinkhole and select forwarding, wormhole, Hello flood, and replication attacks. Therefore, developing secure and(More)
The recent advancements in electronics and communications technology have enabled the extensive deployment of wireless sensor networks (WSNs) into a variety of areas including homeland security, military systems, industrial, and health care. WSNs are typically deployed in unattended, hostile and harsh environment which makes them subject to several attacks(More)
In this paper, we propose a novel block cipher mode of operation, which is known as the counter chain (CC) mode. The proposed CC mode integrates the cipher block chaining (CBC) block cipher mode of operation with the counter (CTR) mode in a consistent fashion. In the CC mode, the confidentiality and authenticity of data are assured by the CBC mode, while(More)
Recently, Wireless Sensor Networks (WSNs) have been deployed into a variety of applications including homeland security, military systems, and health care. Sensor nodes deployed in such networks are subject to several attacks such as sinkhole and select forwarding. Therefore, developing secure and energy-efficient routing protocols to protect WSNs against(More)
This paper cryptanalyses the hyper-chaotic image encryption scheme developed by Norouzi et al and presents a chosenplain-image attack scenario to reveal its generated key stream. The recovered key stream can be used to decrypt any future related cipher-image without having the secret key. In addition, the paper introduces an advanced version of the(More)
  • 1