Security frameworks for wireless sensor networks-review
Due to significant advances in miniaturization, low power circuit design but reasonably
efficient to carry the sensitive information through wireless communication, wireless sensor …
efficient to carry the sensitive information through wireless communication, wireless sensor …
A PUF-based secure communication protocol for IoT
Security features are of paramount importance for the Internet of Things (IoT), and
implementations are challenging given the resource-constrained IoT setup. We have …
implementations are challenging given the resource-constrained IoT setup. We have …
Recent trend in wireless sensor network and its applications: a survey
P Prasad - Sensor Review, 2015 - emerald.com
Purpose–This paper aims to review existing wireless sensor network (WSN) setups in
various domains, focusing on affordable WSN so that it can be effectively utilised in solving …
various domains, focusing on affordable WSN so that it can be effectively utilised in solving …
Elliptic-curve-based security processor for RFID
RFID (Radio Frequency IDentification) tags need to include security functions, yet at the
same time their resources are extremely limited. Moreover, to provide privacy, authentication …
same time their resources are extremely limited. Moreover, to provide privacy, authentication …
High-performance and lightweight lattice-based public-key encryption
In the emerging Internet of Things, lightweight public-key cryptography is an essential
component for many cost-efficient security solutions. Since conventional public-key …
component for many cost-efficient security solutions. Since conventional public-key …
Security issues in wireless mesh networks
MS Siddiqui - 2007 International Conference on Multimedia and …, 2007 - ieeexplore.ieee.org
Wireless mesh network (WMN) is a new wireless networking paradigm. Unlike traditional
wireless networks, WMNs do not rely on any fixed infrastructure. Instead, hosts rely on each …
wireless networks, WMNs do not rely on any fixed infrastructure. Instead, hosts rely on each …
ECC is Ready for RFID–A Proof in Silicon
D Hein, J Wolkerstorfer, N Felber - … New Brunswick, Canada, August 14-15 …, 2009 - Springer
This paper presents the silicon chip ECCon, an Elliptic Curve Cryptography processor for
application in Radio-Frequency Identification. The circuit is fabricated on a 180 nm CMOS …
application in Radio-Frequency Identification. The circuit is fabricated on a 180 nm CMOS …
A survey of cryptographic primitives and implementations for hardware-constrained sensor network nodes
In a wireless sensor network environment, a sensor node is extremely constrained in terms
of hardware due to factors such as maximizing lifetime and minimizing physical size and …
of hardware due to factors such as maximizing lifetime and minimizing physical size and …
[PDF][PDF] GDPR privacy implications for the Internet of Things
D Bastos, F Giubilo, M Shackleton… - 4th Annual IoT Security …, 2018 - researchgate.net
Starting on May 25th of 2018 all EU countries began to apply the General Data Protection
Regulation (GDPR). This piece of legislation aims to protect and regulate data privacy and …
Regulation (GDPR). This piece of legislation aims to protect and regulate data privacy and …
[BOOK][B] Security in RFID and sensor networks
P Kitsos - 2016 - taylorfrancis.com
In the past several years, there has been an increasing trend in the use of Radio Frequency
Identification (RFID) and Wireless Sensor Networks (WSNs) as well as in the integration of …
Identification (RFID) and Wireless Sensor Networks (WSNs) as well as in the integration of …