TriSec: A Secure Data Framework for Wireless Sensor Networks Using Authenticated Encryption |
Kumar, Pardeep
(Ubiquitous-IT, Dongseo University)
Cho, Sang-Il (Dongseo University) Lee, Dea-Seok (Regional Innovation Center for Uniquitous Appliance, Dongseo University) Lee, Young-Dong (BK21 Project Team for U-Healthcare Technology Development, Dongseo University) Lee, Hoon-Jae (Division of Computer and Information Engineering, Dongseo University) |
1 | P. Kumar, S-I Cho and H. J. Lee, "PingPong-MAC: Secure Ubiquitous Sensor Network with Authenticated Encryption." In proc. of 2nd International Conference on Interaction Sciences, 2009, pp. 256-261. |
2 | I. F. Akyildiz, W. Su, Y. Sankarasubramamiam and E. Cayirci, "A Survey on Sensor Networks," IEEE Communication Magazine, August 2002, pp. 102-114. |
3 | H. J. Lee and K. Chen, "A New Stream Cipher for Ubiquitous Application," ICCIT, 2007, South Korea. |
4 | C-C Chang, D. J. Nagel and S. Muftic, "Balancing Security and Energy Consumption in Wireless Sensor Networks" MSN 2007, LNCS 4864, pp 469-480. |
5 | A. Perrig, R. Szewczyk, V. Wen, D. Culler and J. D. Tygar, "SPINS: Security Protocols for Sensor Networks", Proceedings of 7th Annual International Conference on Mobile Computing and Networks (MOBICOM 2001), Rome, Italy July 2001. |
6 | C. Karloff, N. Sastry and D. Wagner, "TinySec: A Link Layer Security Architecture for Wireless Sensor Networks", Proceedings of the 2nd ACM Conference on Embedded Networked Sensor Systems (SenSys 2004), Baltimore, MD, November 2004. |
7 | M. Luk, G. Mezzour, A. Perrig, and V. Gligor, "MiniSec: A Secure Sensor Network Communication Architecture" IPSN'07, April 2007, Cambridge, Massachusetts, USA. |
8 | R. Watro, D. Kong, S-F Cuti, C. Gardiner, C. Lynn and P. Kruus, "TinyPK: Securing Sensor Networks with Public Key Technology", Workshop on Security of Ad-hoc and Sensor Networks, Washington DC, USA 2004. |
9 | P. Kumar and H. J. Lee, "A Secure Data Mechanism for Ubiquitous Sensor Network with Dragon Cipher", 2009, IEEE 5th International Joint Conference on INC, IMS and IDC. |
10 | S. Y. Lim, C. C. Pu, H. T. Lim, and H. J. Lee, "Dragon-MAC: Securing Wireless Sensor Networks with Authenticated Encryption", 2007. [http://eprint.iacr.org/2007/204.pdf] |
11 | K. Chen, M. Henricksen, W. Millan, J. fuller, L. Simpson, E. Dawson, H. J. Lee and S. Moon, "Dragon: A fast word based stream cipher". 2005/006, ECRYPT Stream Cipher Project Report. |
12 | S. Ahmad, A. Wahla and F. Kausar, "Authenticated Encryption in WSN Using eSTREAM Ciphers", ISA 2009, LNCS 5576, pp. 741-749. |
13 | S. Mahlknecht, "Energy-Self-Sufficient Wireless Sensor Networks for the Home and Building Environment", Doctor's thesis, Technical University of Vienna, 2004. |
14 | B. Zoltak, "An Efficient Message Authentication Scheme for Stream Cipher", Cryptology ePrint Archive 2004. |
15 | T. Ylonen, "SSH-Secure login connection over the Internet", 1996, 6th USENIX Security Symposium. |
16 | Security Architecture for the Internet Protocol. RFC2401, 1998. |
17 | OpenSSL. http://www.openssl.org |
18 | http://www.maxfor.co.kr/online%20brochure.pdf |
19 | http://www.tinyos.net/ |
20 | http://www.tinyos.net/tinyos-1.x/doc/nesc/ref.pdf. |
21 | F. Kausar and A. Naureen, "A Comparative Analysis of HC-128 and Rabbit Encryption Schemes for Pervasive Computing in WSN Environment", 2009, ISA 2009, LNCS 5576, pp.682-691. |
![]() |