Light-Weight Addressing and Routing Schemes for Resource-Constrained WPAN Devices
نویسندگان
چکیده
منابع مشابه
Light-Weight Addressing and Routing Schemes for Resource-Constrained WPAN Devices
Traditional heavyweight routing algorithms are not suitable for resource constrained IEEE 802.15.4 [15] complaint devices. Although, ZigBee [21] provided an addressing scheme and a table-free Tree routing algorithm for such devices, it has several limitations [6, 7, 8, 9]. In this paper, we have proposed a flexible, variable-length addressing scheme together with a new lightweight, table-free r...
متن کاملA Light Weight Enhancement to RC4 Based Security for Resource Constrained Wireless Devices
The Wired Equivalent Privacy (WEP) uses the 64 bit RC4 secret key stream cipher as its layer 2 security protocol. Although the underlying RC4 cipher is secure, the potential reuse of the same key stream by different frames is a weakness in the WEP. One enhancement to WEP is the Temporal Key Integrity Protocol (TKIP), which acts as a wrapper to the WEP protocol and uses a 128 bit RC4 encryption ...
متن کاملPublic Review for Geohyperbolic Routing and Addressing Schemes
The key requirement to routing in any telecommunication network, and especially in Internet-of-Things (IoT) networks, is scalability. Routing must route packets between any source and destination in the network without incurring unmanageable routing overhead that grows quickly with increasing network size and dynamics. Here we present an addressing scheme and a coupled network topology design s...
متن کاملCryptography for Resource Constrained Devices: A Survey
Specifically designed and developed cryptographic algorithms, which are suitable for implementation in resource constrained devices such as RFID systems, smart cards and wireless sensor networks are called light weight cryptographic algorithms. In this paper a survey is done on the selected light weight cryptographic algorithms. The light weight cryptographic algorithms are of two types, block ...
متن کاملKey distribution schemes for resource constrained devices in wireless sensor networks
Wireless sensor networks based on highly resource-constrained devices require symmetric cryptography in order to make them secure. Integral to this is the exchange of unique symmetric keys between two devices. In this dissertation, we propose three novel decentralized key distribution schemes that guarantee the confidentiality of a key exchange even if an attacker has compromised some of the de...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal on Smart Sensing and Intelligent Systems
سال: 2020
ISSN: 1178-5608
DOI: 10.21307/ijssis-2019-017