2009
DOI: 10.1002/sec.140
|View full text |Cite
|
Sign up to set email alerts
|

A lightweight secure data transmission protocol for resource constrained devices

Abstract: In this paper we present a lightweight but robust security protocol based on the forward and backward property of RC4 stream cipher. The proposed protocol offers data confidentiality, data authentication, data integrity, and data freshness with less operation and low overhead. Also, it allows data packets to be received in any arbitrary order and achieves semantic security. Furthermore, it eliminates the requirement of frequent key renewal to overcome a special limitation of the stream ciphers. Due to the comp… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2011
2011
2016
2016

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 10 publications
0
2
0
Order By: Relevance
“…In the following we present how we achieve the secure multicast in the tree [20], after all multicast members share the same multicast key as we described above. Figure 3 depicts the operations executed by the BS.…”
Section: ) For Each Sn or Psn Bs Retrieves Its Device Id Andmentioning
confidence: 99%
“…In the following we present how we achieve the secure multicast in the tree [20], after all multicast members share the same multicast key as we described above. Figure 3 depicts the operations executed by the BS.…”
Section: ) For Each Sn or Psn Bs Retrieves Its Device Id Andmentioning
confidence: 99%
“…Multicast security is one of the most important security services in WSN [1][2][3][4][5][6]. Over the years, multicast in WSN has been the topic of many research areas such as multicast routing, reliable multicast [7], secure multicast, and so on.…”
Section: Introductionmentioning
confidence: 99%