Wireless Sensor Networks: An Information Processing Approach
Wireless Sensor Networks: An Information Processing Approach
TinyPK: securing sensor networks with public key technology
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
TinySec: a link layer security architecture for wireless sensor networks
SenSys '04 Proceedings of the 2nd international conference on Embedded networked sensor systems
PingPong-128, A New Stream Cipher for Ubiquitous Application
ICCIT '07 Proceedings of the 2007 International Conference on Convergence Information Technology
IEEE Communications Magazine
Hi-index | 0.00 |
In this paper, we are proposing a new PingPong-MAC Authenticated Encryption scheme based on PingPong stream cipher. This newly proposed scheme fulfills the security parameters to secure data in ubiquitous sensor network. The new scheme provides data authentication, confidentiality and data integration in USN applications. The new PingPong-MAC scheme can be widely used as secure point-to-point encryption between sensor nodes. Disclosure, disruption and deception threats can be defeated by authenticating data sources as well as encrypting data in transmission. The new PingPong-MAC is an ideal solution for USN and other resource-constrained devices, where the communication nodes have limited power and computational capabilities. The features of new PingPong-MAC scheme conclude that it might be more efficient than existing schemes.