SPINS: security protocols for sensor networks
Proceedings of the 7th annual international conference on Mobile computing and networking
TinySec: a link layer security architecture for wireless sensor networks
SenSys '04 Proceedings of the 2nd international conference on Embedded networked sensor systems
MiniSec: a secure sensor network communication architecture
Proceedings of the 6th international conference on Information processing in sensor networks
Structured Design of Substitution-Permutation Encryption Networks
IEEE Transactions on Computers
IEEE Communications Magazine
Hi-index | 0.00 |
The creation of wireless sensor networks provides a capable solution for a range of ubiquitous information services. Its challenges like, data security and secrecy due to its hostile deployment nature of being flat to physical attacks with restricted source available. In order to competition the security pressure that sensor networks are exposed to, a cryptography algorithm is implemented at sensor nodes for node-to-node encryption, between nodes considering the data redundancy, energy constraint, and security requirement. In this paper, we analyze Dragon stream cipher and propose a new D-MAC secure data scheme which supports node-to-node encryption using Dragon based-privacy [3] for sensor networks. Our procedure regarded the entity verification and message authentication through the performance of authenticated encryption scheme in wireless sensor nodes.