Lightweight method of shuffling overlapped data-blocks for data integrity and security in WSNs

[1]  T. C. Maxino,et al.  The Effectiveness of Checksums for Embedded Control Networks , 2009, IEEE Transactions on Dependable and Secure Computing.

[2]  Joaquín Olivares,et al.  Data Communication Optimization for the Evaluation of Multivariate Conditions in Distributed Scenarios , 2019, IEEE Access.

[3]  Kyoung Soo Bok,et al.  An Energy-Efficient Secure Scheme in Wireless Sensor Networks , 2016, J. Sensors.

[4]  Martin Hell,et al.  Electromagnetic Side-Channel Attack on AES using Low-end Equipment , 2020 .

[5]  Alex Koohang,et al.  The Internet of Things: Review and theoretical framework , 2019, Expert Syst. Appl..

[6]  Guanglin Li,et al.  Medical Information Security for Wearable Body Sensor Networks in Smart Healthcare , 2019, IEEE Consumer Electronics Magazine.

[7]  Geovandro C. C. F. Pereira,et al.  Performance Evaluation of Cryptographic Algorithms over IoT Platforms and Operating Systems , 2017, Secur. Commun. Networks.

[8]  Julio Barbancho,et al.  Securing a wireless sensor network for human tracking: a review of solutions , 2014, Int. J. Commun. Syst..

[9]  David E. Culler,et al.  Telos: enabling ultra-low power wireless research , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..

[10]  MinierMarine,et al.  Survey and benchmark of lightweight block ciphers for MSP430 16-bit microcontroller , 2015 .

[11]  David A. Wagner,et al.  TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.

[12]  Mario Gerla,et al.  Measuring effective capacity of IEEE 802.15.4 beaconless mode , 2006, IEEE Wireless Communications and Networking Conference, 2006. WCNC 2006..

[13]  Murat Dener,et al.  TeenySec: a new data link layer security protocol for WSNs , 2016, Secur. Commun. Networks.

[14]  Qiong Zhang,et al.  Improve security of wireless sensor networks through reluctant checksum , 2017, Int. J. Distributed Sens. Networks.

[15]  Youngho Cho,et al.  An Enhanced Trust Mechanism with Consensus-Based False Information Filtering Algorithm against Bad-Mouthing Attacks and False-Praise Attacks in WSNs , 2019, Electronics.

[16]  Abdelkamel Tari,et al.  Lightweight Sharing Scheme for Data Integrity Protection in WSNs , 2016, Wirel. Pers. Commun..

[17]  Selçuk Baktir,et al.  Implementing RSA for Wireless Sensor Nodes , 2019, Sensors.

[18]  Ibrahim Kamel,et al.  A Lightweight Data Integrity Scheme for Sensor Networks , 2011, Sensors.

[19]  Stefano Chessa,et al.  Wireless sensor networks: A survey on the state of the art and the 802.15.4 and ZigBee standards , 2007, Comput. Commun..

[20]  David A. Wagner,et al.  On the Structure of Skipjack , 2001, Discret. Appl. Math..

[21]  P. Vasudeva Reddy,et al.  Efficient and Secure Pairing-Free Certificateless Aggregate Signature Scheme for Healthcare Wireless Medical Sensor Networks , 2019, IEEE Internet of Things Journal.

[22]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[23]  Yong Wang,et al.  A survey of security issues in wireless sensor networks , 2006, IEEE Communications Surveys & Tutorials.

[24]  Ingrid Moerman,et al.  Throughput and Delay Analysis of Unslotted IEEE 802.15.4 , 2006, J. Networks.

[25]  Chao Liu,et al.  A New Digital Watermarking Method for Data Integrity Protection in the Perception Layer of IoT , 2017, Secur. Commun. Networks.

[26]  Joaquín Olivares Bueno,et al.  D2R-TED: Data-Domain Reduction Model for Threshold-Based Event Detection in Sensor Networks. , 2018 .