Proceedings ArticleDOI
Rabbit-MAC: Lightweight Authenticated Encryption in Wireless Sensor Networks
R. Tahir,M.Y. Javed,A.R. Cheema +2 more
- pp 573-577
TLDR
A new lightweight authenticated encryption mechanism based on Rabbit stream cipher referred to as Rabbit-MAC, for wireless sensor networks (WSNs) that fulfils both requirements of security as well as energy efficiency is proposed.Abstract:
In this paper, we propose a new lightweight authenticated encryption mechanism based on Rabbit stream cipher referred to as Rabbit-MAC, for wireless sensor networks (WSNs) that fulfils both requirements of security as well as energy efficiency. Our proposed scheme provides data authentication, confidentiality and integrity in WSNs. We construct a Rabbit based MAC function, which can be used for data authentication and data integrity. Our proposed security protocol is an idea for resource constrained WSNs, and can be widely used in the applications of secure communication where the communication nodes have limited processing and storage capabilities while requiring sufficient levels of security. The features of Rabbit-MAC scheme conclude that this particular scheme might be more efficient than the existing schemes in terms of security and resource consumption.read more
Citations
More filters
[서평]「Applied Cryptography」
TL;DR: The objective of this paper is to give a comprehensive introduction to applied cryptography with an engineer or computer scientist in mind on the knowledge needed to create practical systems which supports integrity, confidentiality, or authenticity.
Journal ArticleDOI
A survey of lightweight stream ciphers for embedded systems
TL;DR: This paper provides the latest survey of stream ciphers for embedded systems, with a focus on lightweight implementations in embedded hardware and software as well as relevant authenticated encryption schemes.
Book ChapterDOI
High speed implementation of authenticated encryption for the MSP430X microcontroller
TL;DR: This work describes an optimized implementation of authenticated encryption for the MSP430X family of microcontrollers and explores the characteristics of the AES accelerator to improve the performance of the implemented modes.
Proceedings ArticleDOI
A Survey on Encryption Schemes in Wireless Sensor Networks
TL;DR: This survey reviews the most significant approaches that have been proposed to provide encryption-based security services for WSNs and emphasizes on the weaknesses of these approaches.
Journal ArticleDOI
Authenticated Encryption Schemes: A Systematic Review
Mohamud Ahmed Jimale,Muhammad Reza Z'aba,Miss Laiha Mat Kiah,Mohd Yamani Idna Idris,Norziana Jamil,Moesfa Soeheila Mohamad,Mohd Saufy Rohmad +6 more
TL;DR: This study proposes a framework for classifying AE schemes and highlights past contributions to help researchers familiarize themselves with the current state and directions for future research in the area.
References
More filters
Journal ArticleDOI
System architecture directions for networked sensors
TL;DR: Key requirements are identified, a small device is developed that is representative of the class, a tiny event-driven operating system is designed, and it is shown that it provides support for efficient modularity and concurrency-intensive operation.
Journal ArticleDOI
Secure routing in wireless sensor networks: attacks and countermeasures
Chris Karlof,David Wagner +1 more
TL;DR: This work proposes security goals for routing in sensor networks, shows how attacks against ad-hoc and peer-to-peer networks can be adapted into powerful attacks against sensors, and introduces two classes of novel attacks against sensor networks sinkholes and HELLO floods.
Journal Article
Security for Sensor Networks
TL;DR: This chapter identifies the vulnerabilities associated with the operational paradigms currently employed by Wireless Sensor Networks and a framework for implementing security in WSNs, which identifies the security measures necessary to mitigate the identified vulnerabilities.
Proceedings ArticleDOI
SPINS: security protocols for sensor networks
TL;DR: A suite of security building blocks optimized for resource-constrained environments and wireless communication, and shows that they are practical even on minimal hardware: the performance of the protocol suite easily matches the data rate of the network.
[서평]「Applied Cryptography」
TL;DR: The objective of this paper is to give a comprehensive introduction to applied cryptography with an engineer or computer scientist in mind on the knowledge needed to create practical systems which supports integrity, confidentiality, or authenticity.