Authenticated Encryption in WSN Using eSTREAM Ciphers.
Shakil AhmadMuhammad Arif WahlaFirdous KausarPublished in: ISA (2009)
Keyphrases
- key exchange
- image encryption
- authentication scheme
- wireless sensor networks
- key management
- stream cipher
- key distribution
- secret key
- security analysis
- block cipher
- high security
- advanced encryption standard
- energy efficient
- chosen plaintext attack
- energy consumption
- data aggregation
- encryption algorithms
- key exchange protocol
- security protocols
- smart card
- public key
- elliptic curve cryptography
- resource constrained
- ciphertext
- routing protocol
- encryption scheme
- key agreement protocol
- digital signature
- encryption decryption
- diffie hellman
- private key
- wireless communication
- sensor networks
- hash functions
- sensor nodes
- user authentication
- resource limitations
- data encryption
- pseudorandom
- data streams
- chosen plaintext
- information hiding
- authentication protocol
- security requirements
- ad hoc networks