R. Beaulieu, S. Treatman-clark, D. Shors, B. Weeks, J. Smith et al., The SIMON and SPECK lightweight block ciphers, Proceedings of the Fifty-Second ACM/EDAC/IEEE Design Automation Conference, 2015.

H. Kalita and A. Kar, Wireless sensor network security analysis, International Journal of Next-Generation Networks, vol.1, issue.1, pp.1-10, 2009.

P. Koopman and T. Chakravarty, Cyclic redundancy code (CRC) polynomial selection for embedded networks, Proceedings of the International Conference on Dependable Systems and Networks, pp.145-154, 2004.

T. Nie, L. Zhou, and Z. Lu, Power evaluation methods for data encryption algorithms, IET Software, vol.8, issue.1, pp.12-18, 2014.

G. Padmavathi and D. Shanmugapriya, A survey of attacks, security mechanisms and challenges in wireless sensor networks, International Journal of Computer Science and Information Security, vol.4, 2009.

Y. Shiu, S. Chang, H. Wu, S. Huang, and H. Chen, Physical layer security in wireless networks: A tutorial, IEEE Wireless Communications, vol.18, issue.2, pp.66-74, 2011.

F. Zhang, R. Dojen, and T. Coffey, Comparative performance and energy consumption analysis of different AES implementations on a wireless sensor network node, International Journal of Sensor Networks, vol.10, issue.4, pp.192-201, 2011.