By Topic

On Efficient Data Integrity and Data Origin Authentication for Wireless Sensor Networks Utilising Block Cipher Design Techniques

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
A. A. Adekunle ; Dept. of Comput. & Commun. Eng., Univ. of Greenwich, Chatham, UK ; S. R. Woodhead

Analysis of the generic attacks and countermeasures for block cipher based message authentication code algorithms (MAC) in sensor applications is undertaken; the conclusions are used in the design of two new MAC constructs quicker block chaining MAC1 (QBC-MAC1) and quicker block chaining MAC2 (QBC-MAC2). Using software simulation we show that our new constructs point to improvements in usage of CPU instruction clock cycle and energy requirement when benchmarked against the de facto cipher block chaining MAC (CBC-MAC) based construct used in the TinySec security protocol for wireless sensor networks.

Published in:

2009 Third International Conference on Next Generation Mobile Applications, Services and Technologies

Date of Conference:

15-18 Sept. 2009