Light-Weight Addressing and Routing Schemes for Resource-Constrained WPAN Devices

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Light-Weight Addressing and Routing Schemes for Resource-Constrained WPAN Devices

Traditional heavyweight routing algorithms are not suitable for resource constrained IEEE 802.15.4 [15] complaint devices. Although, ZigBee [21] provided an addressing scheme and a table-free Tree routing algorithm for such devices, it has several limitations [6, 7, 8, 9]. In this paper, we have proposed a flexible, variable-length addressing scheme together with a new lightweight, table-free r...

متن کامل

A Light Weight Enhancement to RC4 Based Security for Resource Constrained Wireless Devices

The Wired Equivalent Privacy (WEP) uses the 64 bit RC4 secret key stream cipher as its layer 2 security protocol. Although the underlying RC4 cipher is secure, the potential reuse of the same key stream by different frames is a weakness in the WEP. One enhancement to WEP is the Temporal Key Integrity Protocol (TKIP), which acts as a wrapper to the WEP protocol and uses a 128 bit RC4 encryption ...

متن کامل

Public Review for Geohyperbolic Routing and Addressing Schemes

The key requirement to routing in any telecommunication network, and especially in Internet-of-Things (IoT) networks, is scalability. Routing must route packets between any source and destination in the network without incurring unmanageable routing overhead that grows quickly with increasing network size and dynamics. Here we present an addressing scheme and a coupled network topology design s...

متن کامل

Cryptography for Resource Constrained Devices: A Survey

Specifically designed and developed cryptographic algorithms, which are suitable for implementation in resource constrained devices such as RFID systems, smart cards and wireless sensor networks are called light weight cryptographic algorithms. In this paper a survey is done on the selected light weight cryptographic algorithms. The light weight cryptographic algorithms are of two types, block ...

متن کامل

Key distribution schemes for resource constrained devices in wireless sensor networks

Wireless sensor networks based on highly resource-constrained devices require symmetric cryptography in order to make them secure. Integral to this is the exchange of unique symmetric keys between two devices. In this dissertation, we propose three novel decentralized key distribution schemes that guarantee the confidentiality of a key exchange even if an attacker has compromised some of the de...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal on Smart Sensing and Intelligent Systems

سال: 2020

ISSN: 1178-5608

DOI: 10.21307/ijssis-2019-017