A new kind of science
Cryptography: Theory and Practice,Second Edition
Cryptography: Theory and Practice,Second Edition
SPINS: security protocols for sensor networks
Wireless Networks
Security in wireless sensor networks
Communications of the ACM - Wireless sensor networks
TinySec: a link layer security architecture for wireless sensor networks
SenSys '04 Proceedings of the 2nd international conference on Embedded networked sensor systems
Seven cardinal properties of sensor network broadcast authentication
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
A lightweight encryption and authentication scheme for wireless sensor networks
International Journal of Security and Networks
Designing secure sensor networks
IEEE Wireless Communications
IEEE Communications Magazine
A half-key key management scheme for wireless sensor networks
Proceedings of the 2011 ACM Symposium on Research in Applied Computation
A novel key management scheme for wireless embedded systems
ACM SIGAPP Applied Computing Review
Hi-index | 0.00 |
Confidentiality and authenticity are two important security services required for almost every WSN application. However, small memory, weak processor and limited battery power of the sensor nodes are the major obstacles to implement traditional security primitives in them. Owing to both, the requirement as well as the obstacles, this paper proposes a LIghtweight Security Algorithm (LISA) tailored to implement in resource restrained sensor nodes. The novelty of this scheme is that it achieves both, confidentiality and authenticity of data, without using traditional encryption algorithm.