References
- P. Kumar, S-I Cho and H. J. Lee, "PingPong-MAC: Secure Ubiquitous Sensor Network with Authenticated Encryption." In proc. of 2nd International Conference on Interaction Sciences, 2009, pp. 256-261.
- I. F. Akyildiz, W. Su, Y. Sankarasubramamiam and E. Cayirci, "A Survey on Sensor Networks," IEEE Communication Magazine, August 2002, pp. 102-114.
- H. J. Lee and K. Chen, "A New Stream Cipher for Ubiquitous Application," ICCIT, 2007, South Korea.
- C-C Chang, D. J. Nagel and S. Muftic, "Balancing Security and Energy Consumption in Wireless Sensor Networks" MSN 2007, LNCS 4864, pp 469-480.
- A. Perrig, R. Szewczyk, V. Wen, D. Culler and J. D. Tygar, "SPINS: Security Protocols for Sensor Networks", Proceedings of 7th Annual International Conference on Mobile Computing and Networks (MOBICOM 2001), Rome, Italy July 2001.
- C. Karloff, N. Sastry and D. Wagner, "TinySec: A Link Layer Security Architecture for Wireless Sensor Networks", Proceedings of the 2nd ACM Conference on Embedded Networked Sensor Systems (SenSys 2004), Baltimore, MD, November 2004.
- M. Luk, G. Mezzour, A. Perrig, and V. Gligor, "MiniSec: A Secure Sensor Network Communication Architecture" IPSN'07, April 2007, Cambridge, Massachusetts, USA.
- R. Watro, D. Kong, S-F Cuti, C. Gardiner, C. Lynn and P. Kruus, "TinyPK: Securing Sensor Networks with Public Key Technology", Workshop on Security of Ad-hoc and Sensor Networks, Washington DC, USA 2004.
- P. Kumar and H. J. Lee, "A Secure Data Mechanism for Ubiquitous Sensor Network with Dragon Cipher", 2009, IEEE 5th International Joint Conference on INC, IMS and IDC.
- S. Y. Lim, C. C. Pu, H. T. Lim, and H. J. Lee, "Dragon-MAC: Securing Wireless Sensor Networks with Authenticated Encryption", 2007. [http://eprint.iacr.org/2007/204.pdf]
- K. Chen, M. Henricksen, W. Millan, J. fuller, L. Simpson, E. Dawson, H. J. Lee and S. Moon, "Dragon: A fast word based stream cipher". 2005/006, ECRYPT Stream Cipher Project Report.
- S. Ahmad, A. Wahla and F. Kausar, "Authenticated Encryption in WSN Using eSTREAM Ciphers", ISA 2009, LNCS 5576, pp. 741-749.
- S. Mahlknecht, "Energy-Self-Sufficient Wireless Sensor Networks for the Home and Building Environment", Doctor's thesis, Technical University of Vienna, 2004.
- B. Zoltak, "An Efficient Message Authentication Scheme for Stream Cipher", Cryptology ePrint Archive 2004.
- T. Ylonen, "SSH-Secure login connection over the Internet", 1996, 6th USENIX Security Symposium.
- Security Architecture for the Internet Protocol. RFC2401, 1998.
- OpenSSL. http://www.openssl.org
- http://www.maxfor.co.kr/online%20brochure.pdf
- http://www.tinyos.net/
- http://www.tinyos.net/tinyos-1.x/doc/nesc/ref.pdf.
- F. Kausar and A. Naureen, "A Comparative Analysis of HC-128 and Rabbit Encryption Schemes for Pervasive Computing in WSN Environment", 2009, ISA 2009, LNCS 5576, pp.682-691.
Cited by
- Improved Security Patch on Secure Communication among Cell Phones and Sensor Networks vol.9, pp.4, 2010, https://doi.org/10.1155/2013/348783