Handbook of Applied Cryptography
Handbook of Applied Cryptography
The Design of Rijndael
SPINS: security protocols for sensor networks
Wireless Networks
32-Bit Cyclic Redundancy Codes for Internet Applications
DSN '02 Proceedings of the 2002 International Conference on Dependable Systems and Networks
IT Security Project: Implementation of the Advanced Encryption Standard (AES) on a Smart Card
ITCC '04 Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04) Volume 2 - Volume 2
Global identification of storage objects in network attached storage
CompSysTech '04 Proceedings of the 5th international conference on Computer systems and technologies
Establishing pairwise keys in distributed sensor networks
ACM Transactions on Information and System Security (TISSEC)
A survey of key management schemes in wireless sensor networks
Computer Communications
Hi-index | 0.00 |
Security of sensor grids is important especially for surveillance, military and medical applications. The paper addresses methods for two security features. First, an approach for generation of very strong geographically unique identifiers is proposed that is based on cryptography hashing. Second, symmetric key establishment method for every internode communication session is presented. Implementation results are given for ARM8 and AVR32 CPU. The results show that the methods are suitable for nodes with restricted computational and memory resources.