SPINS: security protocols for sensor networks
Wireless Networks
Wireless sensor networks: a survey
Computer Networks: The International Journal of Computer and Telecommunications Networking
Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm
ASIACRYPT '00 Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Security in wireless sensor networks
Communications of the ACM - Wireless sensor networks
TinySec: a link layer security architecture for wireless sensor networks
SenSys '04 Proceedings of the 2nd international conference on Embedded networked sensor systems
Security Issues in Wireless Sensor Networks
ICSNC '06 Proceedings of the International Conference on Systems and Networks Communication
Dragon: a fast word based stream cipher
ICISC'04 Proceedings of the 7th international conference on Information Security and Cryptology
Hi-index | 0.00 |
Wireless Sensor Networks are gaining popularity due their wide spread application areas especially military, biomedical and cooperate sectors. Secure and authentic data exchange for sensitive and critical applications is a basic need. European Union's project eSTREAM ciphers have identified set of software implement-able stream ciphers with efficiency and security comparable to AES. Integration of an authentication mechanism with these software implement able stream ciphers remained an open challenge. Situation is further aggravated once target application platform is resource constrained in terms of energy, processing power and memory as in the case of WSNs. In this research work we have analyzed known authenticated encryption mechanisms using eSTREAM ciphers and their implementation in resource limited WSN environment.