DMCA
resource constrained devices
Citations
995 | Cryptography and Network Security, Principles and Practice, Third editionPearsonEducation - Stallings - 2003 |
520 | TinySec: A Link Layer Security Architecture for Wireless Sensor Networks
- Karlof, Sastry, et al.
- 2004
(Show Context)
Citation Context ...oadcast authentication. SPINS provides data confidentiality by RC5 block cipher and it avoids using asymmetric cryptography, which is normally very heavy, to achieve broadcast authentication. TinySec =-=[8]-=- is a generic security package that can be integrated into WSNs applications. TinySec achieves data confidentiality through block cipher and achieves data authentication and data integrity through the... |
359 | Security in wireless sensor networks
- Perrig, Stankovic, et al.
(Show Context)
Citation Context ... receives packets in the order of P1 → P2 → P4 → P3. S2 decrypts P1 and P2 first. Since P4 is received prior to P3,S2 calculates the CRS to decrypt P4 first and then calculates the CRS to decrypt P3. =-=(4)-=- S4 receives packets in the order of P1 → P3 → P4 → P2.S4 decrypts P1 first and then calculates the CRS to decrypt P3. After that, S4 decrypts P4 in regular process and then calculates the CRS to decr... |
316 | The design space of wireless sensor networks,"
- Romer, Mattern
- 2004
(Show Context)
Citation Context ... S4 receives packets in the order of P1 → P3 → P4 and P2 is lost. S4 decrypts P1 first. Since P3 is received prior to P2, S4 adds P2 to its PMPL and then calculates the CRS to decrypt P3 and then P4. =-=(5)-=- After P3 stays in S2’s PMPL and P2 stays in S4’s PMPL longer than a period of time, S2 and S4 send requests to B for resending P3 and P2, respectively. (6) B receives the requests and holds them for ... |
270 | Weakness in the Key Scheduling Algorithm of RC4, - FLUHRER, —SHAMIR - 2001 |
123 | Using the Fluhrer, Mantin, and Shamir attack to break WEP, - Stubblefield, Ioannidis, et al. - 2001 |
33 |
Analysis of the stream cipher RC4,
- Mantin
- 2001
(Show Context)
Citation Context ...the message authentication code (MAC). The default block cipher for TinySec is Skipjack. Both SPINS and TinySec achieve data confidentiality through block ciphers. However, as indicated by References =-=[8,9]-=- stream ciphers are almost always faster and use far less code than block ciphers. For this reason, we consider an efficient stream cipher should be considered to design a secure protocol for resource... |
17 | On the security of wireless sensor networks,”
- Roman, Zhou, et al.
- 2005
(Show Context)
Citation Context ...service, and nature resource management [2]. Since resource constrained devices are highly constrained in terms of resources, how to implement security to those devices is one of the major challenges =-=[3]-=-. Generally speaking, in order to implement security, extra resources including processor and memory usage, overhead generation and transmission, power consumption, and process time are required. Howe... |
15 | State Based Key Hop Protocol: A Lightweight Security Protocol for Wireless Networks,”
- Michell, Srinivasan
- 2004
(Show Context)
Citation Context ...ol in Section 4. From the comparison, we can see that the proposed protocol improves the process time significantly. We also notice that there is a research called State Based Key Hop protocol (SBKH) =-=[11]-=-, which attempts to design a security solution for WSNs through stream cipher. However, SBKH requires strong synchronization and maintains two to four RC4 states for each node. The strong synchronizat... |
14 |
Sensor networks,” GFDL Wireless Sensor Network textbook
- Haenselmann
- 2006
(Show Context)
Citation Context ...lculates the CRS to decrypt P3 and then P4. (5) After P3 stays in S2’s PMPL and P2 stays in S4’s PMPL longer than a period of time, S2 and S4 send requests to B for resending P3 and P2, respectively. =-=(6)-=- B receives the requests and holds them for a period of time, and then processes all requests to retrieve the lost packet(s) by CRS and then resend them with resending indication. (7) S2 receives the ... |
14 |
J.D.: SPINS: Security protocols for sensor networks. In:
- Perrig, Szewczyk, et al.
- 2001
(Show Context)
Citation Context ... systems to WSNs. An affordable and efficient security approach is desired to reduce the computational time, to minimize the overhead size, and to limit the consumption of the power and memory. SPINS =-=[7]-=- is a secure data transmission scheme for WSNs which contains two parts: SNEP provides data confidentiality, two-party data authentication, and data freshness, and µTESLA provides broadcast authentica... |
12 | Cryptography on a Speck of Dust.
- Kaps, Gaubatz, et al.
- 2007
(Show Context)
Citation Context ...s) and radio frequency identification devices (RFIDs), have been applied to a large number of areas. Security is a critical factor for any application due to the impact on privacy, trust, and control =-=[1]-=-. It is also very important for many applications powered by resource constrained devices, such as battlefield control, emergency response, building monitoring, eHealth and eHome service, and nature r... |
2 |
using RC4 Fast Packet Keying
- Fix
- 2002
(Show Context)
Citation Context ...ctical with a reasonable key length, such as 128 bits [9]. So far, the practical RC4 attacks (e.g., References [11--13]) remain with WEP attacks, which aim to a key derivation problem in WEP standard =-=[14]-=-. WEP encryption is based on the RC4 stream cipher so each packet has a different WEP key. The key derivation function used by WEP was flawed. In essence, this issue is in the generation of secure key... |