The rebirth of one-time pads—Secure data transmission from ban to sink

F Büsching, L Wolf - IEEE Internet of Things Journal, 2014 - ieeexplore.ieee.org
Body area networks (BANs) consisting of small sensing and computing devices can help to
improve medical care and well-being of humans. Obviously, the data recorded in BANs such …

Design Considerations of Mission-Oriented Sensor Node Architectures

F Büsching, K Garlichs, U Kulau, S Rottmann… - Mission-Oriented Sensor …, 2019 - Springer
In research and education, a Wireless Sensor Network (WSN) may exist for its own sake and
also the specific nodes used in such networks might be considered as study objects …

[PDF][PDF] ADAPTATION OF THE HUMAN NERVOUS SYSTEM FOR SELF-AWARE SECURE MOBILE AND IOT SYSTEMS

NK Thanigaivelan - utupub.fi
ABSTRACT IT systems have been deployed across several domains, such as hospitals and
industries, for the management of information and operations. These systems will soon be …

[PDF][PDF] A study on wireless sensor networks and the concepts of encryption and key exchange

G Gayatri, V Bansal - allengineeringjournal.in
Encryption and key distribution are important primitives to build secure Wireless Sensor
Networks (WSN). Different block ciphers were proposed in literature to provide encryption in …

Low-complexity, low-area computer architectures for cryptographic application in resource constrained environments

JH Kong - 2018 - eprints.nottingham.ac.uk
RCE (Resource Constrained Environment) is known for its stringent hardware design
requirements. With the rise of Internet of Things (IoT), low-complexity and low-area designs …

[PDF][PDF] Improving the security of wireless sensor networks

M Tellez Nava - 2016 - core.ac.uk
The Internet of Things (IoT) has become a popular subject in the industry and will soon
reach the popularity level of smartphones. With the rapid technological advancements of …

[引用][C] Survey secured data transmission from WBAN to sink

A Subbarayadu, G Radhika, R Vedhavathi - Int J Comput Sci Mob Comput, 2016

[引用][C] Encryption and Key Exchange in Wireless Sensor Networks

D Schürmann - 2013