메뉴 건너뛰기




Volumn 11, Issue 2, 2011, Pages 254-266

A lightweight block cipher based on a multiple recursive generator for wireless sensor networks and RFID

Author keywords

lightweight cipher; RFID; sensor network

Indexed keywords

BASIC OPERATION; BLOCK CIPHERS; LIGHTWEIGHT BLOCKS; LIGHTWEIGHT CIPHER; LINEAR CONGRUENTIAL GENERATOR; MULTIPLE RECURSIVE GENERATORS; PSEUDORANDOM SEQUENCES; QUALITY REQUIREMENTS; RADIOFREQUENCY IDENTIFICATION TAGS; RFID; SPECIAL CLASS;

EID: 79951976646     PISSN: 15308669     EISSN: 15308677     Source Type: Journal    
DOI: 10.1002/wcm.988     Document Type: Article
Times cited : (11)

References (49)
  • 1
    • 85032128552 scopus 로고    scopus 로고
    • The security of the cipher block chaining message authentication code
    • Bellare M, Kilian J, Rogaway P,. The security of the cipher block chaining message authentication code. Journal of Computer and System Sciences 2000; 61 (3): 363-399.
    • (2000) Journal of Computer and System Sciences , vol.61 , Issue.3 , pp. 363-399
    • Bellare, M.1    Kilian, J.2    Rogaway, P.3
  • 3
    • 79951981444 scopus 로고    scopus 로고
    • Multiple recursive random generators and their APL programmes
    • Foulley J-L,. Multiple recursive random generators and their APL programmes, Technical Report, INRA-SGQA, 2005.
    • (2005) Technical Report, INRA-SGQA
    • Foulley, J.-L.1
  • 5
    • 84968513334 scopus 로고
    • Primitive polynomials (mod 2)
    • Watson EJ,. Primitive polynomials (mod 2). Mathematics of Computation 1962; 16: 368-369.
    • (1962) Mathematics of Computation , vol.16 , pp. 368-369
    • Watson, E.J.1
  • 6
    • 56949107218 scopus 로고    scopus 로고
    • Security co-existence of wireless sensor networks and RFID for pervasive computing
    • Special Issue on Secure Multi-Mode Systems and their Applications for Pervasive Computing,; ().
    • Sun B, Xiao Y, Li C-C, Chen H, Yang TA,. Security co-existence of wireless sensor networks and RFID for pervasive computing. Computer Communications Journal Special Issue on Secure Multi-Mode Systems and their Applications for Pervasive Computing, 2008; 31 (18): 4294-4303.
    • (2008) Computer Communications Journal , vol.31 , Issue.18 , pp. 4294-4303
    • Sun, B.1    Xiao, Y.2    Li, C.-C.3    Chen, H.4    Yang, T.A.5
  • 7
    • 44349157008 scopus 로고    scopus 로고
    • Low-cost wireless sensor networks for remote cardiac patients monitoring applications
    • DOI 10.1002/wcm.488
    • Hu F, Jiang M, Xiao Y,. Low-cost wireless sensor networks for remote cardiac patients monitoring applications. Journal of Wireless Communications and Mobile Computing 2008; 8 (4): 513-529. (Pubitemid 351747464)
    • (2008) Wireless Communications and Mobile Computing , vol.8 , Issue.4 , pp. 513-529
    • Hu, F.1    Jiang, M.2    Xiao, Y.3
  • 11
    • 54249117650 scopus 로고    scopus 로고
    • Secure scalable group signature with dynamic joins and separable authorities
    • Kiayias A, Yung M,. Secure scalable group signature with dynamic joins and separable authorities. International Journal of Security and Networks 2006; 1 (1/2): 24-45.
    • (2006) International Journal of Security and Networks , vol.1 , Issue.12 , pp. 24-45
    • Kiayias, A.1    Yung, M.2
  • 15
    • 74549166520 scopus 로고    scopus 로고
    • Wireless networking security: Open issues in trust, management, interoperation and measurement
    • Evans JB, Wang W, Ewy BJ, Wireless networking security: open issues in trust, management, interoperation and measurement. International Journal of Security and Networks 2006; 1 (1/2): 84-94.
    • (2006) International Journal of Security and Networks , vol.1 , Issue.12 , pp. 84-94
    • Evans, J.B.1    Wang, W.2    Ewy, B.J.3
  • 16
    • 72449209394 scopus 로고    scopus 로고
    • Three ways to mount distinguishing attacks on irregularly clocked stream ciphers
    • Englund H, Johansson T,. Three ways to mount distinguishing attacks on irregularly clocked stream ciphers. International Journal of Security and Networks 2006; 1 (1/2): 95-102.
    • (2006) International Journal of Security and Networks , vol.1 , Issue.12 , pp. 95-102
    • Englund, H.1    Johansson, T.2
  • 22
    • 79951694028 scopus 로고    scopus 로고
    • Analysis of routing security-energy trade-offs in wireless sensor networks
    • Al-Karaki JN,. Analysis of routing security-energy trade-offs in wireless sensor networks. International Journal of Security and Networks 2006; 1 (3/4): 147-157.
    • (2006) International Journal of Security and Networks , vol.1 , Issue.34 , pp. 147-157
    • Al-Karaki, J.N.1
  • 23
    • 49949107235 scopus 로고    scopus 로고
    • Load-balanced key establishment methodologies in wireless sensor networks
    • Araz O, Qi H,. Load-balanced key establishment methodologies in wireless sensor networks. International Journal of Security and Networks 2006; 1 (3/4): 158-166.
    • (2006) International Journal of Security and Networks , vol.1 , Issue.34 , pp. 158-166
    • Araz, O.1    Qi, H.2
  • 24
    • 84890880165 scopus 로고    scopus 로고
    • Limiting DoS attacks during multihop data delivery in wireless sensor networks
    • Deng J, Han R, Mishra S,. Limiting DoS attacks during multihop data delivery in wireless sensor networks. International Journal of Security and Networks 2006; 1 (3/4): 167-178.
    • (2006) International Journal of Security and Networks , vol.1 , Issue.34 , pp. 167-178
    • Deng, J.1    Han, R.2    Mishra, S.3
  • 26
    • 77955716028 scopus 로고    scopus 로고
    • The loop fallacy and deterministic serialisation in tracing intrusion connections through stepping stones
    • Wang X,. The loop fallacy and deterministic serialisation in tracing intrusion connections through stepping stones. International Journal of Security and Networks 2006; 1 (3/4): 184-197.
    • (2006) International Journal of Security and Networks , vol.1 , Issue.34 , pp. 184-197
    • Wang, X.1
  • 30
    • 79951716783 scopus 로고    scopus 로고
    • Low-power authenticated group key agreement for heterogeneous wireless networks
    • Teo JCM, Tan CH, Ng JM,. Low-power authenticated group key agreement for heterogeneous wireless networks. International Journal of Security and Networks 2006; 1 (3/4): 226-236.
    • (2006) International Journal of Security and Networks , vol.1 , Issue.34 , pp. 226-236
    • Teo, J.C.M.1    Tan, C.H.2    Ng, J.M.3
  • 31
    • 77954644745 scopus 로고    scopus 로고
    • A new signature scheme without random oracles
    • Tan CH,. A new signature scheme without random oracles. International Journal of Security and Networks 2006; 1 (3/4): 237-242.
    • (2006) International Journal of Security and Networks , vol.1 , Issue.34 , pp. 237-242
    • Tan, C.H.1
  • 32
    • 67649498303 scopus 로고    scopus 로고
    • Modelling misbehaviour in ad hoc networks: A game theoretic approach for intrusion detection
    • Liu Y, Comaniciu C,., Man H,. Modelling misbehaviour in ad hoc networks: a game theoretic approach for intrusion detection. International Journal of Security and Networks 2006; 1 (3/4): 243-254.
    • (2006) International Journal of Security and Networks , vol.1 , Issue.34 , pp. 243-254
    • Liu, Y.1    Comaniciu, C.2    Man, H.3
  • 35
    • 17644416411 scopus 로고    scopus 로고
    • Efficient and portable multiple recursive generators of large order
    • Deng LY,. Efficient and portable multiple recursive generators of large order. ACM Transactions on Modeling and Computer Simulation 2005; 15 (1): 1-13.
    • (2005) ACM Transactions on Modeling and Computer Simulation , vol.15 , Issue.1 , pp. 1-13
    • Deng, L.Y.1
  • 36
    • 79951997971 scopus 로고    scopus 로고
    • Primitive polynomial. Available at: [16 December 2007]
    • Primitive polynomial. Available at: [16 December 2007].
  • 37
    • 0034379856 scopus 로고    scopus 로고
    • Random number generation for the new century
    • Deng LY, Lin DKJ,. Random number generation for the new century. American Statistician 2000; 54 (2): 145-150.
    • (2000) American Statistician , vol.54 , Issue.2 , pp. 145-150
    • Deng, L.Y.1    Lin, D.K.J.2
  • 38
    • 4243066342 scopus 로고    scopus 로고
    • A system of high-dimensional, efficient, long-cycle and portable uniform random number generators
    • Deng LY, Xu HQ,. A system of high-dimensional, efficient, long-cycle and portable uniform random number generators. ACM Transactions on Modeling and Computer Simulation 2003; 13 (4): 299-309.
    • (2003) ACM Transactions on Modeling and Computer Simulation , vol.13 , Issue.4 , pp. 299-309
    • Deng, L.Y.1    Xu, H.Q.2
  • 41
    • 59549091540 scopus 로고    scopus 로고
    • Error-resistant RFID-assisted wireless sensor networks for cardiac tele-healthcare
    • Hu F, Celentano L, Xiao Y,. Error-resistant RFID-assisted wireless sensor networks for cardiac tele-healthcare. Wireless Communications and Mobile Computing (WCMC) 2009; 9 (1): 85-101.
    • (2009) Wireless Communications and Mobile Computing (WCMC) , vol.9 , Issue.1 , pp. 85-101
    • Hu, F.1    Celentano, L.2    Xiao, Y.3
  • 42
    • 46449131007 scopus 로고    scopus 로고
    • Robust medical ad hoc sensor networks (MASN) with wavelet-based ECG data mining
    • Hu F, Jiang M, Celentano L, Xiao Y,. Robust medical ad hoc sensor networks (MASN) with wavelet-based ECG data mining. Ad Hoc Networks 2008; 6 (7): 986-1012.
    • (2008) Ad Hoc Networks , vol.6 , Issue.7 , pp. 986-1012
    • Hu, F.1    Jiang, M.2    Celentano, L.3    Xiao, Y.4
  • 43
    • 33646943487 scopus 로고    scopus 로고
    • Security and privacy in RFID and applications in telemedicine
    • DOI 10.1109/MCOM.2006.1632651
    • Xiao Y, Shen X, Sun B, Cai L,. Security and privacy in RFID and applications in telemedicine. IEEE Communications Magazine, Special issue on Quality Assurance and Devices in Telemedicine, 2006; 64-72. (Pubitemid 43792670)
    • (2006) IEEE Communications Magazine , vol.44 , Issue.4 , pp. 64-72
    • Xiao, Y.1    Shen, X.2    Sun, B.3    Cai, L.4
  • 44
    • 33746734206 scopus 로고    scopus 로고
    • A lightweight secure protocol for wireless sensor networks
    • DOI 10.1016/j.comcom.2006.02.006, PII S0140366406000545
    • Sun B, Li C, Wu K, Xiao Y,. A lightweight secure protocol for wireless sensor networks. Computer Communications Journal Special Issue on Wireless Sensor Networks: Performance, Reliability, Security and Beyond, 2006; 29 (13-14): 2556-2568. (Pubitemid 44162986)
    • (2006) Computer Communications , vol.29 , Issue.13-14 , pp. 2556-2568
    • Sun, B.1    Li, C.-C.2    Wu, K.3    Xiao, Y.4
  • 46
    • 0002868910 scopus 로고    scopus 로고
    • Bad lattice structures for vectors of non-successive values produced by some linear recurrences
    • LEcuyer P,. Bad lattice structures for vectors of non-successive values produced by some linear recurrences. INFORMS Journal on Computing 1997; 9: 57-60.
    • (1997) INFORMS Journal on Computing , vol.9 , pp. 57-60
    • Lecuyer, P.1
  • 49
    • 34247512176 scopus 로고    scopus 로고
    • Radio frequency identification: Technologies, applications, and research issues
    • DOI 10.1002/wcm.365
    • Xiao Y, Yu S, Wu K, Ni Q, Janecek C, Nordstad J,. Radio frequency identification: technologies, applications, and research issues. Journal of Wireless Communications and Mobile Computing 2007; 7 (4): 457-472. (Pubitemid 46659482)
    • (2007) Wireless Communications and Mobile Computing , vol.7 , Issue.4 , pp. 457-472
    • Xiao, Y.1    Yu, S.2    Wu, K.3    Ni, Q.4    Janecek, C.5    Nordstad, J.6


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.