{"title":"乒乓mac:安全无处不在的传感器网络与认证加密","authors":"Pardeep Kumar, S. Cho, Hoon-Jae Lee","doi":"10.1145/1655925.1655970","DOIUrl":null,"url":null,"abstract":"In this paper, we are proposing a new PingPong-MAC Authenticated Encryption scheme based on PingPong stream cipher. This newly proposed scheme fulfills the security parameters to secure data in ubiquitous sensor network. The new scheme provides data authentication, confidentiality and data integration in USN applications. The new PingPong-MAC scheme can be widely used as secure point-to-point encryption between sensor nodes. Disclosure, disruption and deception threats can be defeated by authenticating data sources as well as encrypting data in transmission. The new PingPong-MAC is an ideal solution for USN and other resource-constrained devices, where the communication nodes have limited power and computational capabilities. The features of new PingPong-MAC scheme conclude that it might be more efficient than existing schemes.","PeriodicalId":122831,"journal":{"name":"Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"PingPong-MAC: secure ubiquitous sensor network with authenticated encryption\",\"authors\":\"Pardeep Kumar, S. Cho, Hoon-Jae Lee\",\"doi\":\"10.1145/1655925.1655970\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, we are proposing a new PingPong-MAC Authenticated Encryption scheme based on PingPong stream cipher. This newly proposed scheme fulfills the security parameters to secure data in ubiquitous sensor network. The new scheme provides data authentication, confidentiality and data integration in USN applications. The new PingPong-MAC scheme can be widely used as secure point-to-point encryption between sensor nodes. Disclosure, disruption and deception threats can be defeated by authenticating data sources as well as encrypting data in transmission. The new PingPong-MAC is an ideal solution for USN and other resource-constrained devices, where the communication nodes have limited power and computational capabilities. The features of new PingPong-MAC scheme conclude that it might be more efficient than existing schemes.\",\"PeriodicalId\":122831,\"journal\":{\"name\":\"Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2009-11-24\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/1655925.1655970\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/1655925.1655970","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
PingPong-MAC: secure ubiquitous sensor network with authenticated encryption
In this paper, we are proposing a new PingPong-MAC Authenticated Encryption scheme based on PingPong stream cipher. This newly proposed scheme fulfills the security parameters to secure data in ubiquitous sensor network. The new scheme provides data authentication, confidentiality and data integration in USN applications. The new PingPong-MAC scheme can be widely used as secure point-to-point encryption between sensor nodes. Disclosure, disruption and deception threats can be defeated by authenticating data sources as well as encrypting data in transmission. The new PingPong-MAC is an ideal solution for USN and other resource-constrained devices, where the communication nodes have limited power and computational capabilities. The features of new PingPong-MAC scheme conclude that it might be more efficient than existing schemes.