Implementation and Analysis of Authentication in Wireless Sensor Network using ZigBee
Li Chunqing, Zhang Jiancheng, “Research of ZigBee’s data security and protection”, International Forum on Computer Science-Technology and Applications 2009, IEEE, 2009, pp 298 - 302.
P.D. Khambre, S.S.Sambhare, P.S. Chavan, “Secure Data in Wireless Sensor Network via AES” " International Journal of Computer Science and Information Technologies, Vol. 3 (2) , 2012
Kristin Lauter, “The Advantages of Elliptical Curve Cryptography for Wireless Security”, IEEE Wireless Communications 2004
G.V.S. Raju and Rehan Akbani,"Elliptic Curve Cryptosystem and its Applications ", IEEE 2003.
Meng Qianqian and Bao Kejin, “Security analysis for wireless networks based on ZigBee”, IEEE,vol 1, 2009, pp 158 - 160.
Bin Yang, “Study on security of wireless sensor network based on ZigBee standard." International Conference on Computational Intelligence and Security, IEEE, 2009, pp 426 - 430.
Madhumita PandaSecurity in Wireless Sensor Networks using Cryptographic Techniques”, American Journal of Engineering Research (AJER) 2014
Saif Al-alak, Zuriati Ahmed, Azizol Abdullah and Shamala Subramiam, “AES and ECC Mixed for ZigBee Wireless Sensor Security”, International Scholarly and Scientific Research & Innovation 5(9) 2011
William Stallings, “Cryptography and Network Security- Principles and Practice” NY: Prentice Hall, 2011
Sunil Gupta, Harsh Kumar Verma and AL Sangal, “Authentication Protocol for Wireless Sensor Networks” International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering 2010.
G. Jai Arul Jose and C. Sajeev,” The security of elliptic curve cryptography over RSA cryptography” Elixir Comp. Sci. & Engg. 2011
S. Subasree and N. K. Sakthivel, “Design of a New Security Protocol using Hybrid Cryptographic Algorithms” IJRRAS 2010
S. Aruna, D. Anitha, Promit Roy and Riddhi Datta, “ Survey of Hybrid Cryptography Algorithms in WSN using ZigBee”, IJCTA 2016
N. Kumar, “A Secure communication wireless sensor networks through hybrid (AES+ECC) algorithm”, von LAP LAMBERT Academic Publishing, vol. 386, 2012.
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.