International audienceFor security applications in wireless sensor networks (WSNs), choosing best algorithms in terms of energy-efficiency and of small memory requirements is a real challenge because the sensor networks must be autonomous. In \cite{EisenbarthGGHIKKNPRSO12,LawDH06}, the authors have benchmarked on a dedicated platform some block-ciphers and have deduced the best candidates to use in the context of small embedded platforms. This article proposes to study on a dedicated platform of sensors most of the recent lightweight block ciphers as well as some conventional block ciphers. First, we describe the design of the chosen block ciphers with a security summary and we then present some implementation tests performed on our platfor...
The Wireless Sensor Networks (WSNs) have spread its roots in almost every application. Owing to thei...
Resource-efficient cryptographic primitives become fundamental for realizing both security and effic...
The nature of constrained resources of sensor nodes, beside of the inherent vulnerability, led ...
International audienceFor security applications in wireless sensor networks (WSNs), choosing best al...
International audienceFor security applications in wireless sensor networks (WSNs), choosing best al...
Choosing the most storage- and energy-efficient block cipher specifically for wireless sensor networ...
Cryptographic algorithms play an important role in the security architecture of wireless sensor netw...
Choosing the most storage- and energy-efficient block cipher specifically for wireless sensor networ...
The energy efficiency requirement of wireless sensor net-works (WSNs) is especially high because the...
Lightweight block ciphers play an indispensable role for the security in the context of pervasive co...
Modern cryptographic algorithms play an irreplaceable role in data communication systems for various...
Developing effective security solutions for wireless sensor networks (WSN) are not easy due to limit...
Wireless Sensor Networks (WSN) aim at linking the cyber and physical worlds. Their security has take...
TinyOS is a major platform broadly used to carry out experiments related to Wireless Sensor Networks...
Security is a critical issue in many sensor network applications. A number of security mechanisms ar...
The Wireless Sensor Networks (WSNs) have spread its roots in almost every application. Owing to thei...
Resource-efficient cryptographic primitives become fundamental for realizing both security and effic...
The nature of constrained resources of sensor nodes, beside of the inherent vulnerability, led ...
International audienceFor security applications in wireless sensor networks (WSNs), choosing best al...
International audienceFor security applications in wireless sensor networks (WSNs), choosing best al...
Choosing the most storage- and energy-efficient block cipher specifically for wireless sensor networ...
Cryptographic algorithms play an important role in the security architecture of wireless sensor netw...
Choosing the most storage- and energy-efficient block cipher specifically for wireless sensor networ...
The energy efficiency requirement of wireless sensor net-works (WSNs) is especially high because the...
Lightweight block ciphers play an indispensable role for the security in the context of pervasive co...
Modern cryptographic algorithms play an irreplaceable role in data communication systems for various...
Developing effective security solutions for wireless sensor networks (WSN) are not easy due to limit...
Wireless Sensor Networks (WSN) aim at linking the cyber and physical worlds. Their security has take...
TinyOS is a major platform broadly used to carry out experiments related to Wireless Sensor Networks...
Security is a critical issue in many sensor network applications. A number of security mechanisms ar...
The Wireless Sensor Networks (WSNs) have spread its roots in almost every application. Owing to thei...
Resource-efficient cryptographic primitives become fundamental for realizing both security and effic...
The nature of constrained resources of sensor nodes, beside of the inherent vulnerability, led ...