The SIMON and SPECK lightweight block ciphers, Proceedings of the Fifty-Second ACM/EDAC/IEEE Design Automation Conference, 2015. ,
Wireless sensor network security analysis, International Journal of Next-Generation Networks, vol.1, issue.1, pp.1-10, 2009. ,
Cyclic redundancy code (CRC) polynomial selection for embedded networks, Proceedings of the International Conference on Dependable Systems and Networks, pp.145-154, 2004. ,
Power evaluation methods for data encryption algorithms, IET Software, vol.8, issue.1, pp.12-18, 2014. ,
A survey of attacks, security mechanisms and challenges in wireless sensor networks, International Journal of Computer Science and Information Security, vol.4, 2009. ,
Physical layer security in wireless networks: A tutorial, IEEE Wireless Communications, vol.18, issue.2, pp.66-74, 2011. ,
Comparative performance and energy consumption analysis of different AES implementations on a wireless sensor network node, International Journal of Sensor Networks, vol.10, issue.4, pp.192-201, 2011. ,