References
- S. S. Javadi and A. M. Razzaque, "Security and Privacy in Wireless Body Area Networks for Health Care Applications." Wireless Networks and Security, vol. 163, pp. 165-187, September, 2013.
- R. V. Sampangi, S. Dey, R. S. Urs and S. Sampalli, "IAMKeys: Independent and Adaptive Management of Keys for Security in Wireless Body Area Networks." in Proc. of 2nd Int. Conf. Computer Science and Information Technology, vol. 86, pp. 482-494, January, 2012.
- J. Kang and S. Adibi, "A Review of Security Protocols in mHealth Wireless Body Area Networks (WBAN)." in Proc. of 1st Int. Conf. Future Network Systems and Security, vol. 523, pp. 61-83, May, 2015.
- N. D. Han, L. Han, D. M. Tuan, "A Scheme for Data Confidentiality in Cloud-assisted Wireless Body Area Networks." Information Sciences, vol. 284, pp. 157-166, November, 2014. https://doi.org/10.1016/j.ins.2014.03.126
- C. Wang, J. Wu, S. Jiang, "An Asymmetric Signcryption Scheme for Cloud-Assisted Wireless Body Area Network." in Proc. of International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage, vol. 10067, pp.288-296, November, 2016.
- K. Zhang, X. Liang, M. Baura, R. Lu and X. Shen, "PHDA: A Priority Based Health Data Aggregation with Privacy Preservation for Cloud Assisted WBANs." Information Sciences, vol. 284, pp. 130-141, November, 2014. https://doi.org/10.1016/j.ins.2014.06.011
- X. Liang, X. Li, Q. Shen, R. Lu, X. Lin and X. Shen, "Exploiting Prediction to Enable Secure and Reliable Routing in Wireless Body Area Networks." IEEE INFOCOM, vol. 131, pp. 388-396, March, 2012.
- E. Biham and A. Shamir, "Differential Fault Analysis of Secret Key Cryptosystems," in Proc. of Annual International Cryptology Conference, vol. 1294, pp. 513-525, August, 1997.
- K. S. Raja and U. Kiruthika, "An Energy Efficient Method for Secure and Reliable Data Transmission in Wireless Body Area Networks Using RelAODV." Wireless Personal Communications, vol. 83, pp. 2975-2997, August, 2015. https://doi.org/10.1007/s11277-015-2577-x
- D. Hong, J. Sung, S. Hong, J. Lim, S. Lee, B. S. Koo, C. Lee, D. Chang, J. Lee, K. Jeong, H. Kim, J. Kim, and S. Chee, "HIGHT: A New Block Cipher Suitable for Low-resource Device," in Proc. of International Workshop on Cryptographic Hardware and Embedded Systems, vol. 4249, pp. 46-59, October, 2006.
- C. H. Lim and T. Korkishko, "mCrypton-A Lightweight block cipher for security of low-cost RFID tags and sensors," in Proc. of 6th Int. International Workshop on Information Security Applications, vol. 3786, pp. 243-258, August, 2005.
- S. K. Ojha, N. Kumar, K. Jain and Sangeeta, "TWIS-A Lightweight Block Cipher," in Proc. of 5th International Conference on Information Systems Security, vol. 5905, pp. 280-291, December, 2009.
- A. bogdanov, L. R. Knudsen, G. Lender, C. Paar, A. Poschmann, M. J. B. Robshaw, Y. Seurin and C. Vikkelsoe, "PRESENT: An Ultra-lightweight Block Cipher," in Proc. of 9th Int. International Workshop on Cryptographic Hardware and Embedded Systems, vol. 4727, pp. 450-466, September, 2007.
- J. Guo, T. Peyrin, and A. Poschmann, "The PHOTON Family of Lightweight Hash Functions," in Proc. of 31st Annual Int. Annual Cryptology Conference-CRYPTO, vol. 6841, pp. 222-239, August, 2011.
- D. Boneh, R. A. DeMillo and R. J. Lipton, "On the Importance of Checking Cryptographic Protocols for Faults." in Proc. of Annual International Conference on the Theory and Applications of Cryptographic Techniques, vol. 1233, pp. 37-51, 1997.
- D. Boneh, R. A. DeMillo and R. J. Lipton, "On the Importance of Eliminating Errors in Cryptgraphic Computations," Journal of Cryptography, vol. 14, pp. 101-119, 2001.
- E. Biham and A. Shamir, "Differential Fault Analysis of Secret Key Cryptosystems," in Proc. of 17th Annual Int. Annual International Cryptology Conference, vol. 1294, pp. 513-525, August, 1997.
- I. Biehl, B. Meyer and V. Muller, "Differential Fault Attacks on Elliptic Curve Cryptosystems." in Proc. of 20th Annual Int. Annual International Cryptology Conference, vol.1880, pp. 131-146, August, 2000.
- J. J. Hoch and A. Shamir, "Fault Analysis of Stream Ciphers." in Proc. of 6th Int. International Workshop of Cryptographic Hardware and Embedded Systems, vol. 3156, pp. 240-253, August, 2004.
- S. Banik, S. Maitra and S. Sarkar, "A Differential Fault Attack on the Grain Family of Stream Ciphers." in Proc. of 14th Int. International Workshop of Cryptographic Hardware and Embedded Systems, vol. 7428, pp. 122-139, September, 2012.
- Y. Yang, J. Lu, K. K. R. Choo and J. Liu, "On Lightweight Security Enforcement in Cyber-physical Systems," in Proc. of 4th Int. Conf. International Workshop on Lightweight Cryptography for Security and Privacy, vol. 9542, pp. 97-112, September, 2015.
- Y. Yang, H. Cai, Z. Wei, H. Lu and K. K. R. Choo, "Towards Lightweight Anonymous Entity Authentication for IoT Applications." in Proc. of 21st Int. Conf. Australasian Conference on Information Security and Privacy, vol. 9722, pp. 265-280, July, 2016.
- W. Wu and L. Zhang, "LBlock: A Lightweight Block Cipher," in Proc. of 21st Int. Conf. International Conference on Applied Cryptography and Network Security, vol. 6715, pp. 327-344, June, 2011.
- W. Zhang, Z. Bao, D. Lin, V. Rijmen, B. Yang and I. Verbauwhede, "RECTANGLE: A Bit-slice Lightweight Block Cipher Suitable for Multiple Platforms," Science China Information Sciences, vol. 58, pp. 1-15, 2014.
- L. Li, B. Liu and H. Wang, "QTL: A New Ultra-lightweight Block Cipher," Microprocessors and Microsystems, vol. 45, pp. 45-55, 2016. https://doi.org/10.1016/j.micpro.2016.03.011
- X. Dai, Y. Huang, L. Chen, T. Lu and F. Su, "VH: A Lightweight Block Cipher Based on Dual Pseudo-random Transformation," in Proc. of International Conference on Cloud Computing and Security, vol. 9483, pp. 3-13, January, 2015.
- P. Dusart, G. Letourneux and O. Vivolo, "Differential fault analysis on AES," in Proc. of Int. Conf. International Conference on Applied Cryptography and Network Security, pp. 293-306, October, 2003.
- G. Piret and J. J. Quisquater, "A Differential Fault Attack Technique Against SPN Structures, with Application to the AES and KHAZAD," in Proc. of 5th Int. International Workshop on Cryptographic Hardware and Embedded Systems, pp. 77-88, September 2003.
- L. Hemme and L. Hoffmann, "Differential Fault Analysis on the SHA1 Compression Function," in Proc. of International Workshop on Fault Diagnosis and Tolerance in Cryptography, pp. 54-62, September, 2011.
- W. Fischer and C. A. Reuter, "Differential Fault Analysis on Grostl," in Proc. of International Workshop Fault Diagnosis and Tolerance in Cryptography, vol. 29, pp. 44-54, September, 2012.
- M. Bellare, R. Canetti and H. Krawczyk, "Keying Hash Functions for Message Authentication," in Proc. of Annual International Cryptology Conference, vol. 1109, pp. 1-15, August, 1996.