Abstract | ||
---|---|---|
The creation of wireless sensor networks provides a capable solution for a range of ubiquitous information services. Its challenges like, data security and secrecy due to its hostile deployment nature of being flat to physical attacks with restricted source available. In order to competition the security pressure that sensor networks are exposed to, a cryptography algorithm is implemented at sensor nodes for node-to-node encryption, between nodes considering the data redundancy, energy constraint, and security requirement. In this paper, we analyze Dragon stream cipher and propose a new D-MAC secure data scheme which supports node-to-node encryption using Dragon based-privacy [3] for sensor networks. Our procedure regarded the entity verification and message authentication through the performance of authenticated encryption scheme in wireless sensor nodes. |
Year | DOI | Venue |
---|---|---|
2009 | 10.1145/1644993.1645006 | ICHIT |
Keywords | Field | DocType |
data redundancy,security pressure,authenticated encryption scheme,sensor node,data security,wireless sensor network,new d-mac secure data,wireless sensor node,secure ubiquitous sensor network,sensor network,node-to-node encryption,message authentication,stream cipher,authenticated encryption | Sensor node,Key distribution in wireless sensor networks,Data security,Cryptography,Computer science,Computer network,Encryption,Mobile wireless sensor network,Wireless sensor network,Authenticated encryption,Distributed computing | Conference |
Citations | PageRank | References |
0 | 0.34 | 7 |
Authors | ||
3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Pardeep Kumar | 1 | 243 | 24.38 |
Jae Hoon Lee | 2 | 176 | 37.92 |
Wan-Young Chung | 3 | 74 | 28.43 |