메뉴 건너뛰기




Volumn 54, Issue 17, 2010, Pages 2967-2978

The price of security in wireless sensor networks

Author keywords

Block cipher operation modes; Energy consumption analysis; Message authentication code algorithm; Symmetric key encryption algorithm; Wireless sensor network

Indexed keywords

ENERGY CONSUMPTION ANALYSIS; MESSAGE AUTHENTICATION CODES; OPERATION MODE; SYMMETRIC KEYS; WIRELESS SENSOR;

EID: 78049298573     PISSN: 13891286     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.comnet.2010.05.011     Document Type: Article
Times cited : (175)

References (28)
  • 1
    • 26444574670 scopus 로고    scopus 로고
    • TinySec: A link layer security architecture for wireless sensor networks
    • Chris Karlof, Naveen Sastry, David Wagner, TinySec: a link layer security architecture for wireless sensor networks, in: SenSys 2004, pp. 162-175.
    • (2004) SenSys , pp. 162-175
    • Karlof, C.1    Sastry, N.2    Wagner, D.3
  • 2
    • 51249087814 scopus 로고    scopus 로고
    • TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks
    • An Liu, Peng Ning, TinyECC: a configurable library for elliptic curve cryptography in wireless sensor networks, in: IPSN 2008, pp. 245-256.
    • (2008) IPSN , pp. 245-256
    • Liu, A.1    Ning, P.2
  • 3
    • 33750286059 scopus 로고    scopus 로고
    • Power aware design of an elliptic curve coprocessor for 8 bit platforms
    • Guido Bertoni, Luca Breveglieri, Matteo Venturi, Power aware design of an elliptic curve coprocessor for 8 bit platforms, in: PERCOMW 2006, pp. 337.
    • (2006) PERCOMW , pp. 337
    • Bertoni, G.1    Breveglieri, L.2    Venturi, M.3
  • 4
    • 20344381294 scopus 로고    scopus 로고
    • A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography
    • David Malan, Matt Welsh, Michael Smith, A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography, in: IEEE SECON 2004, pp. 71-80.
    • (2004) IEEE SECON , pp. 71-80
    • Malan, D.1    Welsh, M.2    Smith, M.3
  • 5
    • 34547420699 scopus 로고    scopus 로고
    • How public key cryptography influences wireless sensor node lifetime
    • Krzysztof Piotrowski, Peter Langendoerfer, Steffen Peter, How public key cryptography influences wireless sensor node lifetime, SASN 2006, pp. 169-176.
    • (2006) SASN , pp. 169-176
    • Piotrowski, K.1    Langendoerfer, P.2    Peter, S.3
  • 6
    • 33646581008 scopus 로고    scopus 로고
    • Energy analysis of public-key cryptography for wireless sensor networks
    • Arvinderpal S. Wander, Nils Gura, Hans Eberle, Vipul Gupta, Sheueling Chang Shantz, Energy analysis of public-key cryptography for wireless sensor networks, in: PERCOM 2005, pp. 324-328.
    • (2005) PERCOM , pp. 324-328
    • Wander, A.S.1    Gura, N.2    Eberle, H.3    Gupta, V.4    Chang Shantz, S.5
  • 7
    • 33646382089 scopus 로고    scopus 로고
    • A study of the energy consumption characteristics of cryptographic algorithms and security protocols
    • Nachiketh R. Potlapally, Srivaths Ravi, Anand Raghunathan, Niraj K. Jha, A study of the energy consumption characteristics of cryptographic algorithms and security protocols, in: IEEE TMC 2005, pp. 128-143.
    • (2005) IEEE TMC , pp. 128-143
    • Potlapally, N.R.1    Ravi, S.2    Raghunathan, A.3    Jha, N.K.4
  • 8
    • 40949096414 scopus 로고    scopus 로고
    • Measurement of energy costs of security in wireless sensor nodes
    • Chih-Chun Chang, Sead Muftic, David J. Nagel, Measurement of energy costs of security in wireless sensor nodes, in: ICCCN 2007, pp. 95-102.
    • (2007) ICCCN , pp. 95-102
    • Chang, C.1    Muftic, S.2    Nagel, D.J.3
  • 9
    • 33745269795 scopus 로고    scopus 로고
    • Survey and benchmark of block ciphers for wireless sensor networks
    • Yee Wei Law, Jeroen Doumen, and Pieter Hartel Survey and benchmark of block ciphers for wireless sensor networks ACM Transactions on Sensor Networks 2006 65 93
    • (2006) ACM Transactions on Sensor Networks , pp. 65-93
    • Law, Y.W.1    Doumen, J.2    Hartel, P.3
  • 10
    • 58449119430 scopus 로고    scopus 로고
    • Optimizing the block cipher and modes of operations overhead at the link layer security framework in the wireless sensor networks
    • Devesh Jinwala, Dhiren Patel, Kankar Dasgupta, Optimizing the block cipher and modes of operations overhead at the link layer security framework in the wireless sensor networks, in: ICISS 2008, pp. 258-272.
    • (2008) ICISS , pp. 258-272
    • Jinwala, D.1    Patel, D.2    Dasgupta, K.3
  • 11
  • 13
    • 38549122795 scopus 로고    scopus 로고
    • Balancing security and energy consumption in wireless sensor networks
    • Chih-Chun Chang, David J. Nagel, and Sead Muftic Balancing security and energy consumption in wireless sensor networks Mobile Ad-Hoc and Sensor Networks 2007 469 480
    • (2007) Mobile Ad-Hoc and Sensor Networks , pp. 469-480
    • Chang, C.-C.1    Nagel, D.J.2    Muftic, S.3
  • 14
    • 84883897746 scopus 로고    scopus 로고
    • A low-energy key management protocol for wireless sensor networks
    • Gaurav Jolly, Mustafa C. Kusu, Pallavi Kokate, Mohamed Younis, A low-energy key management protocol for wireless sensor networks, in: ISCC 2003, pp. 335-340.
    • (2003) ISCC , pp. 335-340
    • Gaurav, J.1    Mustafa, C.K.2    Pallavi, K.3    Mohamed, Y.4
  • 16
    • 33847120377 scopus 로고    scopus 로고
    • LEAP+: Efficient security mechanisms for large-scale distributed sensor networks
    • Sencun Zhu, Sanjeev Setia, and Sushil Jajodia LEAP+: efficient security mechanisms for large-scale distributed sensor networks ACM Transactions on Sensor Networks 2006 500 528
    • (2006) ACM Transactions on Sensor Networks , pp. 500-528
    • Zhu, S.1    Setia, S.2    Jajodia, S.3
  • 18
    • 84949194630 scopus 로고    scopus 로고
    • A simple algebraic representation of Rijndael, Selected Areas in Cryptography
    • Niels Ferguson, Richard Schroeppel, Doug Whiting, A simple algebraic representation of Rijndael, Selected Areas in Cryptography, LNCS 2001, pp. 103-111.
    • (2001) LNCS , pp. 103-111
    • Ferguson, N.1    Schroeppel, R.2    Whiting, D.3
  • 19
    • 24944505936 scopus 로고    scopus 로고
    • Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials
    • Eli Biham, Alex Biryukov, and Adi Shamir Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials Journal of Cryptology 5 2005 291 311
    • (2005) Journal of Cryptology , vol.5 , pp. 291-311
    • Biham, E.1    Biryukov, A.2    Shamir, A.3
  • 20
    • 78049312040 scopus 로고    scopus 로고
    • RSA Laboratories
    • RSA Laboratories, 2009. .
    • (2009)
  • 25
    • 78049286041 scopus 로고    scopus 로고
    • Survey and benchmark of block ciphers for wireless sensor networks
    • Mihir Bellare, Joe Kilian, Phillip Rogaway, Survey and benchmark of block ciphers for wireless sensor networks, in: JCSS 2006, pp. 362-399.
    • (2006) JCSS , pp. 362-399
    • Bellare, M.1    Kilian, J.2    Rogaway, P.3
  • 27
    • 0242656059 scopus 로고    scopus 로고
    • OMAC: One-key CBC MA, fast software encryption
    • Tetsu Iwata, and Kaoru Kurosawa OMAC: one-key CBC MA, fast software encryption LNCS 2887 2003 129 153
    • (2003) LNCS , vol.2887 , pp. 129-153
    • Iwata, T.1    Kurosawa, K.2
  • 28
    • 78049275568 scopus 로고    scopus 로고
    • Bruce Schneier
    • Bruce Schneier, 2005. .
    • (2005)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.