Skip navigation

On efficient data integrity and data origin authentication for wireless sensor networks utilising block cipher design techniques

On efficient data integrity and data origin authentication for wireless sensor networks utilising block cipher design techniques

Adekunle, A.A. and Woodhead, S.R. (2009) On efficient data integrity and data origin authentication for wireless sensor networks utilising block cipher design techniques. In: Al-Begain, Khalid, (ed.) NGMAST 2009: the Third International Conference on Next Generation Mobile Applications, Services and Technologies. IEEE Computer Society Press, Cardiff, UK, pp. 419-424. ISBN 978-0-7695-3786-3 (doi:https://doi.org/10.1109/NGMAST.2009.78)

Full text not available from this repository.

Abstract

Analysis of the generic attacks and countermeasures for block cipher based message authentication code algorithms (MAC) in sensor applications is undertaken; the conclusions are used in the design of two new MAC constructs Quicker Block Chaining MAC1 (QBC-MAC1) and Quicker Block Chaining MAC2 (QBC-MAC2). Using software simulation we show that our new constructs point to improvements in usage of CPU instruction clock cycle and energy requirement when benchmarked against the de facto Cipher Block Chaining MAC (CBC-MAC) based construct used in the TinySec security protocol for wireless sensor networks.

Item Type: Book Section
Additional Information: Paper presented at the Third International Conference on Next Generation Mobile Applications, Services and Technologies, held 16-18 September 2009, at Wales Millennium Centre, Cardiff, Wales, UK.
Uncontrolled Keywords: message authentication code, data integrity, data origin authentication, skipjack, wireless sensor networks
Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Faculty / School / Research Centre / Research Group: Faculty of Engineering & Science > Internet Security Research Laboratory
Related URLs:
Last Modified: 17 Dec 2019 16:12
URI: http://gala.gre.ac.uk/id/eprint/1597

Actions (login required)

View Item View Item