Adaptive Message Authentication Protocol for Performance Improvement in ZigBee Wireless Sensor Network
暂无分享,去创建一个
[1] Myung J. Lee,et al. A Comprehensive Performance Study of IEEE 802 . 15 . 4 , 2004 .
[2] Tat Chee Wan,et al. Performance evaluation of IEEE 802.15.4 wireless multi-hop networks: simulation and testbed approach , 2007, Int. J. Ad Hoc Ubiquitous Comput..
[3] Gianluca Dini,et al. On experimentally evaluating the impact of security on IEEE 802.15.4 networks , 2011, 2011 International Conference on Distributed Computing in Sensor Systems and Workshops (DCOSS).
[4] Gaëtan Leurent,et al. An Analysis of the XSL Algorithm , 2005, ASIACRYPT.
[5] Thomas Peyrin,et al. Super-Sbox Cryptanalysis: Improved Attacks for AES-Like Permutations , 2010, FSE.
[6] Azizol Abdullah,et al. AES and ECC Mixed for ZigBee Wireless Sensor Security , 2011 .
[7] Faiza Charfi,et al. Performance evaluation of beacon enabled IEEE 802.15.4 under NS2 , 2012, ArXiv.
[8] Alex Biryukov,et al. Related-Key Cryptanalysis of the Full AES-192 and AES-256 , 2009, ASIACRYPT.
[9] Andrey Bogdanov,et al. Biclique Cryptanalysis of the Full AES , 2011, ASIACRYPT.
[10] D. Bernstein. Understanding brute force , 2005 .
[11] Sajal K. Das,et al. Reliability and Energy-Efficiency in IEEE 802.15.4/ZigBee Sensor Networks: An Adaptive and Cross-Layer Approach , 2011, IEEE Journal on Selected Areas in Communications.
[12] Azizol Abdullah,et al. Randomness Improvement of AES using MKP , 2013 .
[13] Azizol Abdullah,et al. Authentication Time of IEEE 802.15.4 with Multiple-key Protocol Using Distributed Message Authentication Code Algorithm , 2012 .
[14] Vincent Rijmen. Practical-Titled Attack on AES-128 Using Chosen-Text Relations , 2010, IACR Cryptol. ePrint Arch..