Abstract
This paper presents a concept where applications are aware of security services in the low data rate (LDR) networks. Further, the paper compares the suitability of different security protocols and crypto-algorithms taking into account the security requirements and architectural issues for different LDR scenarios and finally present a new security concept ‘An Adaptive Security’ with the appropriate security protocols and crypto-algorithms for LDR networks.
Similar content being viewed by others
References
N.R. Prasad and A.R. Prasad (eds.) Wireless LANs Systems: Providing Wireless IP for Next Generation, Artech House Publishers, 2001.
R. Prasad and L. Munoz, “WLANs and WPANs Towards 4G Wireless”, Artech House Publishers, 2003.
R. Prasad and M. Ruggieri, “Technology Trends in Wireless Communications”, Artech House Publishers, 2003.
N.R. Prasad and H.P. Schwefel, “A State-of-the-Art of WLAN and WPAN”, ECWT 2003, Munich, Germany, 9–10 October 2003.
N.R. Prasad, G. Gaeta and M. Ruggieri, “Adaptive Security for Low Data Rate Networks”, WPMC 2003, Yokuska, Japan, 19–22 October 2003.
F. Akyildiz, W. Su, Y. Sankarasubramaniam and E. Cayirci, “A Survey on Sensor Networks”, IEEE Communications Magazine,Vol. 40, No. 8, pp. 102–114, August 2002.
U.D. Black, “Internet Security Protocols: Protecting IP Traffic”, Prentice Hall PTR, 2000.
W. Stallings, “Cryptography and Networking Security: Principles and Practice”, Prentice Hall, Inc., 1999.
P. Barreto and V. Rijmen, “AES Reference ANSI C Code”, Version 2.0, August 1999.
R. Baldwin and R. Rivest, “RC5 Description and Implementation”, October 1996.
A. Perrig, R. Szewczyk, J.D. Tygar, V. Wen and D.E. Culler, “SPINS: Security Protocols for Sensors Networks”, Wireless Networks 8, Kluwer Academic Publishers, pp. 521–534, 2002.
G. Frey and H.G. Ruck, “The Tate Pairing and the Discrete Logarithm Applied to Elliptic Curve Cryptosystems”, IEEE Transaction on Information Theory,Vol. 45, No. 5, pp. 1717–1719, 1999.
N.P. Smart, “An Identity Based Authenticated Key Agreement Protocol Based on the Weil Pairing”, Electronics Letters, Vol. 38, pp. 630–632, 2002.
L. Chen and C. Kudla, “Identity Based Authenticated Key Agreement Protocols from Pairings”, HP Laboratories, Bristol, 12 February 2003.
Author information
Authors and Affiliations
Rights and permissions
About this article
Cite this article
Prasad, N.R., Ruggieri, M. Adaptive Security for Low Data Rate Networks. Wireless Personal Communications 29, 323–350 (2004). https://doi.org/10.1023/B:WIRE.0000047069.16013.2e
Issue Date:
DOI: https://doi.org/10.1023/B:WIRE.0000047069.16013.2e