Cryptographic algorithms play an important role in the security architecture of wireless sensor networks (WSNs). Choosing the most storage- and energy-efficient block cipher is essential, due to the facts that these networks are meant to operate without human intervention for a long period of time with little energy supply, and that available storage is scarce on these sensor nodes. However, to our knowledge, no systematic work has been done in this area so far.We construct an evaluation framework in which we first identify the candidates of block ciphers suitable for WSNs, based on existing literature and authoritative recommendations. For evaluating and assessing these candidates, we not only consider the security properties but also the ...
Wireless Sensor Network consists of a substantial number of sensors with low computational powers, r...
Modern wireless sensor networks have adopted the IEEE 802.15.4 standard. This standard defines the f...
Analysis of the generic attacks and countermeasures for block cipher based message authentication co...
Cryptographic algorithms play an important role in the security architecture of wireless sensor netw...
Choosing the most storage- and energy-efficient block cipher specifically for wireless sensor networ...
Choosing the most storage- and energy-efficient block cipher specifically for wireless sensor networ...
The energy efficiency requirement of wireless sensor net-works (WSNs) is especially high because the...
International audienceFor security applications in wireless sensor networks (WSNs), choosing best al...
The Wireless Sensor Networks (WSNs) have spread its roots in almost every application. Owing to thei...
Developing effective security solutions for wireless sensor networks (WSN) are not easy due to limit...
In general, Wireless Sensor Networks occur when sensor nodes are randomly left in an unreliable envi...
Modern cryptographic algorithms play an irreplaceable role in data communication systems for various...
Lightweight block ciphers play an indispensable role for the security in the context of pervasive co...
International audienceFor security applications in wireless sensor networks (WSNs), choosing best al...
Encryption and key distribution are important primitives to build secure Wireless Sensor Networks (W...
Wireless Sensor Network consists of a substantial number of sensors with low computational powers, r...
Modern wireless sensor networks have adopted the IEEE 802.15.4 standard. This standard defines the f...
Analysis of the generic attacks and countermeasures for block cipher based message authentication co...
Cryptographic algorithms play an important role in the security architecture of wireless sensor netw...
Choosing the most storage- and energy-efficient block cipher specifically for wireless sensor networ...
Choosing the most storage- and energy-efficient block cipher specifically for wireless sensor networ...
The energy efficiency requirement of wireless sensor net-works (WSNs) is especially high because the...
International audienceFor security applications in wireless sensor networks (WSNs), choosing best al...
The Wireless Sensor Networks (WSNs) have spread its roots in almost every application. Owing to thei...
Developing effective security solutions for wireless sensor networks (WSN) are not easy due to limit...
In general, Wireless Sensor Networks occur when sensor nodes are randomly left in an unreliable envi...
Modern cryptographic algorithms play an irreplaceable role in data communication systems for various...
Lightweight block ciphers play an indispensable role for the security in the context of pervasive co...
International audienceFor security applications in wireless sensor networks (WSNs), choosing best al...
Encryption and key distribution are important primitives to build secure Wireless Sensor Networks (W...
Wireless Sensor Network consists of a substantial number of sensors with low computational powers, r...
Modern wireless sensor networks have adopted the IEEE 802.15.4 standard. This standard defines the f...
Analysis of the generic attacks and countermeasures for block cipher based message authentication co...