Security frameworks for wireless sensor networks-review

G Sharma, S Bala, AK Verma - Procedia Technology, 2012 - Elsevier
Due to significant advances in miniaturization, low power circuit design but reasonably
efficient to carry the sensitive information through wireless communication, wireless sensor …

A PUF-based secure communication protocol for IoT

U Chatterjee, RS Chakraborty… - ACM Transactions on …, 2017 - dl.acm.org
Security features are of paramount importance for the Internet of Things (IoT), and
implementations are challenging given the resource-constrained IoT setup. We have …

Recent trend in wireless sensor network and its applications: a survey

P Prasad - Sensor Review, 2015 - emerald.com
Purpose–This paper aims to review existing wireless sensor network (WSN) setups in
various domains, focusing on affordable WSN so that it can be effectively utilised in solving …

Elliptic-curve-based security processor for RFID

YK Lee, K Sakiyama, L Batina… - IEEE Transactions on …, 2008 - ieeexplore.ieee.org
RFID (Radio Frequency IDentification) tags need to include security functions, yet at the
same time their resources are extremely limited. Moreover, to provide privacy, authentication …

High-performance and lightweight lattice-based public-key encryption

J Buchmann, F Göpfert, T Güneysu, T Oder… - Proceedings of the 2nd …, 2016 - dl.acm.org
In the emerging Internet of Things, lightweight public-key cryptography is an essential
component for many cost-efficient security solutions. Since conventional public-key …

Security issues in wireless mesh networks

MS Siddiqui - 2007 International Conference on Multimedia and …, 2007 - ieeexplore.ieee.org
Wireless mesh network (WMN) is a new wireless networking paradigm. Unlike traditional
wireless networks, WMNs do not rely on any fixed infrastructure. Instead, hosts rely on each …

ECC is Ready for RFID–A Proof in Silicon

D Hein, J Wolkerstorfer, N Felber - … New Brunswick, Canada, August 14-15 …, 2009 - Springer
This paper presents the silicon chip ECCon, an Elliptic Curve Cryptography processor for
application in Radio-Frequency Identification. The circuit is fabricated on a 180 nm CMOS …

A survey of cryptographic primitives and implementations for hardware-constrained sensor network nodes

R Roman, C Alcaraz, J Lopez - Mobile Networks and Applications, 2007 - Springer
In a wireless sensor network environment, a sensor node is extremely constrained in terms
of hardware due to factors such as maximizing lifetime and minimizing physical size and …

[PDF][PDF] GDPR privacy implications for the Internet of Things

D Bastos, F Giubilo, M Shackleton… - 4th Annual IoT Security …, 2018 - researchgate.net
Starting on May 25th of 2018 all EU countries began to apply the General Data Protection
Regulation (GDPR). This piece of legislation aims to protect and regulate data privacy and …

[BOOK][B] Security in RFID and sensor networks

P Kitsos - 2016 - taylorfrancis.com
In the past several years, there has been an increasing trend in the use of Radio Frequency
Identification (RFID) and Wireless Sensor Networks (WSNs) as well as in the integration of …