Skip to main content
Log in

Adaptive Security for Low Data Rate Networks

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

This paper presents a concept where applications are aware of security services in the low data rate (LDR) networks. Further, the paper compares the suitability of different security protocols and crypto-algorithms taking into account the security requirements and architectural issues for different LDR scenarios and finally present a new security concept ‘An Adaptive Security’ with the appropriate security protocols and crypto-algorithms for LDR networks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. N.R. Prasad and A.R. Prasad (eds.) Wireless LANs Systems: Providing Wireless IP for Next Generation, Artech House Publishers, 2001.

  2. R. Prasad and L. Munoz, “WLANs and WPANs Towards 4G Wireless”, Artech House Publishers, 2003.

  3. R. Prasad and M. Ruggieri, “Technology Trends in Wireless Communications”, Artech House Publishers, 2003.

  4. N.R. Prasad and H.P. Schwefel, “A State-of-the-Art of WLAN and WPAN”, ECWT 2003, Munich, Germany, 9–10 October 2003.

  5. N.R. Prasad, G. Gaeta and M. Ruggieri, “Adaptive Security for Low Data Rate Networks”, WPMC 2003, Yokuska, Japan, 19–22 October 2003.

  6. F. Akyildiz, W. Su, Y. Sankarasubramaniam and E. Cayirci, “A Survey on Sensor Networks”, IEEE Communications Magazine,Vol. 40, No. 8, pp. 102–114, August 2002.

    Google Scholar 

  7. U.D. Black, “Internet Security Protocols: Protecting IP Traffic”, Prentice Hall PTR, 2000.

  8. W. Stallings, “Cryptography and Networking Security: Principles and Practice”, Prentice Hall, Inc., 1999.

  9. P. Barreto and V. Rijmen, “AES Reference ANSI C Code”, Version 2.0, August 1999.

  10. R. Baldwin and R. Rivest, “RC5 Description and Implementation”, October 1996.

  11. A. Perrig, R. Szewczyk, J.D. Tygar, V. Wen and D.E. Culler, “SPINS: Security Protocols for Sensors Networks”, Wireless Networks 8, Kluwer Academic Publishers, pp. 521–534, 2002.

    Google Scholar 

  12. G. Frey and H.G. Ruck, “The Tate Pairing and the Discrete Logarithm Applied to Elliptic Curve Cryptosystems”, IEEE Transaction on Information Theory,Vol. 45, No. 5, pp. 1717–1719, 1999.

    Google Scholar 

  13. N.P. Smart, “An Identity Based Authenticated Key Agreement Protocol Based on the Weil Pairing”, Electronics Letters, Vol. 38, pp. 630–632, 2002.

    Google Scholar 

  14. L. Chen and C. Kudla, “Identity Based Authenticated Key Agreement Protocols from Pairings”, HP Laboratories, Bristol, 12 February 2003.

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

About this article

Cite this article

Prasad, N.R., Ruggieri, M. Adaptive Security for Low Data Rate Networks. Wireless Personal Communications 29, 323–350 (2004). https://doi.org/10.1023/B:WIRE.0000047069.16013.2e

Download citation

  • Issue Date:

  • DOI: https://doi.org/10.1023/B:WIRE.0000047069.16013.2e

Navigation