2010 15th CSI International Symposium on Computer Architecture and Digital Systems 2010
DOI: 10.1109/cads.2010.5623530
|View full text |Cite
|
Sign up to set email alerts
|

High throughput low power CCMP architecture for very high speed wireless LANs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2011
2011
2022
2022

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 13 publications
0
2
0
Order By: Relevance
“…Our approach is based on the widely-adopted Counter with Cipher Block Chaining-Message Authentication Code (CCM) mode [21], used in a number of protocols such as Bluetooth Mesh [10], ZigBee [11], and WiFi [8] (with minor variations for each). Its implementation allows both authenticity and confidentiality to be achieved with a single algorithm.…”
Section: Wireless Security For Sfmentioning
confidence: 99%
See 1 more Smart Citation
“…Our approach is based on the widely-adopted Counter with Cipher Block Chaining-Message Authentication Code (CCM) mode [21], used in a number of protocols such as Bluetooth Mesh [10], ZigBee [11], and WiFi [8] (with minor variations for each). Its implementation allows both authenticity and confidentiality to be achieved with a single algorithm.…”
Section: Wireless Security For Sfmentioning
confidence: 99%
“…The problem with SF protocols is the tight time synchronisation required between the devices. All current solutions found in Bluetooth Mesh [10], ZigBee [11] and WiFi [8] introduce increased overhead that leads to network desynchronisation and thus reduced reliability. Our solution will tackle this problem and provide secure communications without compromising the network performance.…”
Section: Introductionmentioning
confidence: 99%