Sana Ullah, Henry Higgins, Bart Braem, Benoit Latre, Chris Blondia, Ingrid Moerman, Shahnaz Saleem, Ziaur Rahman, Kyung Kwak, “A Comprehensive Survey of Wireless Body Area Networks”, Journal of Medical Systems, pp. 1–30, (2010).
IEEE 802.15.6 Body Area Network standard, available: http://www.ieee802.org/15/pub/TG6.html
F. Shu, D. Neirynck, and O. Rousseaux, “IMEC UWB MAC Proposal for IEEE 802.15.6”, Available:https://mentor.ieee.org/802.15/dcn/09/15-09-0332-00-0006-imec-uwb-mac-proposal-documentation.doc, (2009).
L. Buttyan and J. P. Hubaux, “Security and Cooperation in Wireless Networks: Thwarting Malicious and Selfish Behavior in the Age of Ubiquitous Computing”, Cambridge University Press, (2007).
A. Perrig, R. Szewczyk, V. Wen, D. Culler, and D. Tygar, “SPINS: Security Protocols for Sensor Networks, in Wireless Networks”, Mobicom, pp. 189–199, (2001).
A. Hodjat and I. Verbauwhede, “The energy cost of secrets in ad-hoc networks”, Proc. IEEE CAS Workshop on Wireless Communication and Networking, (2002).
Ng, H. S., Sim, M. L., and Tan, C. M., Security issues of wireless sensor networks in healthcare applications. BT Technology Journal 24(2):138–144, 2006.
Article
Google Scholar
D. Singelée, B. Latré, B. Braem, M. Peeters, M. De Soete, P. De Cleyn, B. Preneel, I. Moerman, C. Blondia, “A Secure Cross-Layer Protocol for Multi-hop Wireless Body Area Networks”, ADHOC-NOW, pp. 94–107, (2008).
S. Cherukuri, K. Venkatasubramanian, and S. K. S. Gupta, “BioSec: A Biometric Based Approach for Securing Communication in Wireless Networks of Biosensors Implanted in the Human Body”, in Proc. of Wireless Security and Privacy Workshop, pp. 432 – 439, (2003).
National Institute of Standards and Technology (NIST), “FIPS-197: Advanced Encryption Standard”, November 2001. Available online at http://www.itl.nist.gov/fipspubs/, (2001).
National Institute of Standards and Technology (NIST), “NIST Special Publication 800–38 C, Recommendation for Block Cipher Modes of Operation: the CCM Mode for Authentication and Confidentiality”, (2004).
MSP430F15x, MSP430F16x, MSP430F161x Mixed Signal Microcontroller, available: http://focus.ti.com/lit/ds/symlink/msp430f1611.pdf, (Revised May 2009).
Nordic Semiconductor, nRF24L01, single chip 2.4 GHz Tranceiver, (2007).
J. Jonsson, “On the Security of CTR + CBC-MAC”, selected Areas in Cryptography, (2002).
Georgios Selimis, Mario Konijnenburg, Maryam Ashouei, Jos Huisken, Harmke de Groot, Vincent van der Leest, Geert-Jan Schrijen, Marten van Hulst and Pim Tuyls, “Evaluation of 90 nm 6 T-SRAM as Physical Unclonable Function for Secure Key Generation in Wireless Sensor Nodes”, in proceedings of IEEE ISCAS Brazil, (2011).
R. Min and A. Chandrakasan, “Top Five Myths about the Energy Consumption of Wireless Communication”, in ACM Sigmobile Mobile Communication and Communications Review, pp. 65–67, (2002).
Target Compiler Technologies: http://www.retarget.com.
Feldhofer, M., Wolkerstorfer, J., and Rijmen, V., “AES Implementation on a Grain of Sand”, IEE Proceedings on Information Security. Volume 152:13–20, 2005.
Google Scholar
J.-P. Kaps, and B. Sunar, “Energy Comparison of AES and SHA-1for Ubiquitous Computing”, in Proceedings of Emerging directions in embedded and ubiquitous computing (EUC 2006 Workshops), pp. 372–381, (2006).
N. Suarez, G. M. Callico, R. Sarmiento, O. Santana, and A. A. Abbo, “Processor Customization for Software Implementation of the AES algorithm for Wireless Sensor Networks”, pp. 326–335, Patmos, (2009).
Cadence design tools, http://www.cadence.com
Synopsys Primetime, http://www.synopsys.com
A. Becher, Z. Benenson, and M. Dornseif, “Tampering with motes: Real-world physical attacks on wireless sensor networks”, in Proceedings of SPC, pp.114-118, (2006).