{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:24:38Z","timestamp":1759091078394},"publisher-location":"Berlin, Heidelberg","reference-count":51,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642341342"},{"type":"electronic","value":"9783642341359"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-34135-9_25","type":"book-chapter","created":{"date-parts":[[2012,9,10]],"date-time":"2012-09-10T12:08:15Z","timestamp":1347278895000},"page":"240-251","source":"Crossref","is-referenced-by-count":20,"title":["Lightweight Cryptographic Primitives for Mobile Ad Hoc Networks"],"prefix":"10.1007","author":[{"given":"Adarsh","family":"Kumar","sequence":"first","affiliation":[]},{"given":"Alok","family":"Aggarwal","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"doi-asserted-by":"crossref","unstructured":"Boyd, C., Mathuria, A.: Protocols for Authentication and Key Establishment, 1st edn. Springer (2003)","key":"25_CR1","DOI":"10.1007\/978-3-662-09527-0"},{"doi-asserted-by":"crossref","unstructured":"van Tilborg, H.C.A.: Encyclopedia of Cryptography and Security. Springer (2005)","key":"25_CR2","DOI":"10.1007\/0-387-23483-7"},{"key":"25_CR3","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1002\/nem.561","volume":"15","author":"Y.M. Tseng","year":"2005","unstructured":"Tseng, Y.M.: Efficient authenticated key agreement protocols resistant to a denial of service attack. International Journal of Network Management\u00a015, 193\u2013202 (2005)","journal-title":"International Journal of Network Management"},{"issue":"2","key":"25_CR4","doi-asserted-by":"crossref","first-page":"275","DOI":"10.15388\/Informatica.2005.098","volume":"16","author":"Y.M. Tseng","year":"2005","unstructured":"Tseng, Y.M.: An improved conference key agreement protocol with forward secrecy. Informatica\u00a016(2), 275\u2013284 (2005)","journal-title":"Informatica"},{"key":"25_CR5","doi-asserted-by":"publisher","first-page":"1091","DOI":"10.1016\/j.jss.2006.10.053","volume":"80","author":"Y.M. Tseng","year":"2007","unstructured":"Tseng, Y.M.: A communication efficient and fault tolerant conference key agreement protocol with forward secrecy. Journal of Systems and Software\u00a080, 1091\u20131101 (2007)","journal-title":"Journal of Systems and Software"},{"key":"25_CR6","doi-asserted-by":"publisher","first-page":"1163","DOI":"10.1016\/j.jss.2009.02.006","volume":"82","author":"S. Lee","year":"2009","unstructured":"Lee, S., Kim, J., Hong, S.J.: Security weakness of Tseng\u2019s fault tolerant conference key agreement protocol. Journal of Systems and Software\u00a082, 1163\u20131167 (2009)","journal-title":"Journal of Systems and Software"},{"key":"25_CR7","volume-title":"Ad hoc Networking","author":"C.E. Perkins","year":"2001","unstructured":"Perkins, C.E.: Ad hoc Networking. Addison-Wesley, New York (2001)"},{"unstructured":"Stallings, W.: Cryptography and Network Security: Principles and Practice, 5th edn. Prentice Hall (2010)","key":"25_CR8"},{"unstructured":"Mao, W.: Modern Cryptography: Theory and Practice. Prentice Hall PTR (2004)","key":"25_CR9"},{"doi-asserted-by":"crossref","unstructured":"Krawczyk, H.: SKEME: A Versatile Secure Key Exchange Mechanism for Internet. In: Proc. of the Symposium on Network and Distributed System Security, pp. 114\u2013127 (1996)","key":"25_CR10","DOI":"10.1109\/NDSS.1996.492418"},{"doi-asserted-by":"crossref","unstructured":"Harkins, D., Carrel, D.: The Internet Key Exchange, Internet Request for Comments 2409 (November 1998)","key":"25_CR11","DOI":"10.17487\/rfc2409"},{"doi-asserted-by":"crossref","unstructured":"Kaufman, C., Hoffman, P., Nir, Y., Eronen, P.: Internet Key Exchange Protocol version 2 (IKEv2), Internet Request for Comments 5996 (September 2010)","key":"25_CR12","DOI":"10.17487\/rfc5996"},{"doi-asserted-by":"crossref","unstructured":"Arkko, J., Haverinen, H.: Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA), Internet Request for Comments 4187 (2006)","key":"25_CR13","DOI":"10.17487\/rfc4187"},{"key":"25_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1007\/978-3-540-45146-4_7","volume-title":"Advances in Cryptology - CRYPTO 2003","author":"J. Katz","year":"2003","unstructured":"Katz, J., Yung, M.: Scalable Protocols for Authenticated Group Key Exchange. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol.\u00a02729, pp. 110\u2013125. Springer, Heidelberg (2003)"},{"issue":"5","key":"25_CR15","doi-asserted-by":"publisher","first-page":"714","DOI":"10.1109\/TIT.1982.1056542","volume":"28","author":"I. Ingemarsson","year":"1982","unstructured":"Ingemarsson, I., Tang, D.T., Wong, C.K.: A Conference key distribution system. IEEE Transactions on Information Theory\u00a028(5), 714\u2013720 (1982)","journal-title":"IEEE Transactions on Information Theory"},{"doi-asserted-by":"crossref","unstructured":"Steiner, M., Tsudik, G., Waidner, M.: Diffie-Hellman Key Distribution Extended to Group Communication. In: ACM Conference on Computer and Communication Security, pp. 31\u201337 (1996)","key":"25_CR16","DOI":"10.1145\/238168.238182"},{"doi-asserted-by":"crossref","unstructured":"Ateniese, G., Michael, Tsudik, G.: Authenticated Group Key Agreement and Friends. In: International Conference on Computer and Communication Security, pp. 17\u201326 (1998)","key":"25_CR17","DOI":"10.1145\/288090.288097"},{"doi-asserted-by":"crossref","unstructured":"Steiner, M., Tsudik, G., Waidner, M.: CLIQUES: A new approach to group key agreement. In: Proc. of the 18th International Conference on Distributed Computing Systems, pp. 380\u2013387 (1998)","key":"25_CR18","DOI":"10.1109\/ICDCS.1998.679745"},{"issue":"8","key":"25_CR19","doi-asserted-by":"publisher","first-page":"769","DOI":"10.1109\/71.877936","volume":"11","author":"M. Steiner","year":"2000","unstructured":"Steiner, M., Tsudik, G., Waidner, M.: Key agreement in dynamic peer groups. IEEE Transactions on Parallel and Distributed Systems\u00a011(8), 769\u2013780 (2000)","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"25_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1007\/BFb0053443","volume-title":"Advances in Cryptology - EUROCRYPT \u201994","author":"M. Burmester","year":"1995","unstructured":"Burmester, M., Desmedt, Y.: A Secure and Efficient Conference Key Distribution System. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol.\u00a0950, pp. 275\u2013286. Springer, Heidelberg (1995)"},{"doi-asserted-by":"crossref","unstructured":"Harney, H., Muckenhirn, C.: Group Key Management Protocol Architecture. Internet Request for Comments 2094 (July 1997)","key":"25_CR21","DOI":"10.17487\/rfc2094"},{"doi-asserted-by":"crossref","unstructured":"Harney, H., Muckenhirn, C.: Group Key Management Protocol Specification. Internet Request for Comments 2093 (July 1997)","key":"25_CR22","DOI":"10.17487\/rfc2093"},{"doi-asserted-by":"crossref","unstructured":"Harney, H., Meth, U., Colegrove, A.: Group Secure Association Key Management Protocol. Internet Request for Comments 4535 (June 2006)","key":"25_CR23","DOI":"10.17487\/rfc4535"},{"doi-asserted-by":"crossref","unstructured":"Weis, B., Rowles, S., Hardjono, T.: The Group Domain of Interpretation. Internet Request for Comments 6407 (October 2011)","key":"25_CR24","DOI":"10.17487\/rfc6407"},{"doi-asserted-by":"crossref","unstructured":"Baugher, M., Weis, B., Hardjono, J., Harney, H.: The Group Domain of Interpretation. Internet Request for Comments 3547 (July 2003)","key":"25_CR25","DOI":"10.17487\/rfc3547"},{"key":"25_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"272","DOI":"10.1007\/978-3-642-04138-9_20","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2009","author":"C. Canni\u00e8re De","year":"2009","unstructured":"De Canni\u00e8re, C., Dunkelman, O., Kne\u017eevi\u0107, M.: KATAN and KTANTAN \u2014 A Family of Small and Efficient Hardware-Oriented Block Ciphers. In: Clavier, C., Gaj, K. (eds.) CHES 2009. LNCS, vol.\u00a05747, pp. 272\u2013288. Springer, Heidelberg (2009)"},{"key":"25_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1007\/11604938_19","volume-title":"Information Security Applications","author":"C.H. Lim","year":"2006","unstructured":"Lim, C.H., Korkishko, T.: mCrypton \u2013 A Lightweight Block Cipher for Security of Low-Cost RFID Tags and Sensors. In: Song, J.-S., Kwon, T., Yung, M. (eds.) WISA 2005. LNCS, vol.\u00a03786, pp. 243\u2013258. Springer, Heidelberg (2006)"},{"key":"25_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1007\/978-3-540-74619-5_13","volume-title":"Fast Software Encryption","author":"G. Leander","year":"2007","unstructured":"Leander, G., Paar, C., Poschmann, A., Schramm, K.: New Lightweight DES Variants. In: Biryukov, A. (ed.) FSE 2007. LNCS, vol.\u00a04593, pp. 196\u2013210. Springer, Heidelberg (2007)"},{"key":"25_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"342","DOI":"10.1007\/978-3-642-23951-9_23","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2011","author":"K. Shibutani","year":"2011","unstructured":"Shibutani, K., Isobe, T., Hiwatari, H., Mitsuda, A., Akishita, T., Shirai, T.: Piccolo: An Ultra-Lightweight Blockcipher. In: Preneel, B., Takagi, T. (eds.) CHES 2011. LNCS, vol.\u00a06917, pp. 342\u2013357. Springer, Heidelberg (2011)"},{"key":"25_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-15031-9_1","volume-title":"Cryptographic Hardware and Embedded Systems, CHES 2010","author":"J.-P. Aumasson","year":"2010","unstructured":"Aumasson, J.-P., Henzen, L., Meier, W., Naya-Plasencia, M.: Quark: A Lightweight Hash. In: Mangard, S., Standaert, F.-X. (eds.) CHES 2010. LNCS, vol.\u00a06225, pp. 1\u201315. Springer, Heidelberg (2010)"},{"key":"25_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1007\/11894063_4","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2006","author":"D. Hong","year":"2006","unstructured":"Hong, D., Sung, J., Hong, S., Lim, J., Lee, S., Koo, B.-S., Lee, C., Chang, D., Lee, J., Jeong, K., Kim, H., Kim, J., Chee, S.: HIGHT: A New Block Cipher Suitable for Low-Resource Device. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol.\u00a04249, pp. 46\u201359. Springer, Heidelberg (2006)"},{"key":"25_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1007\/978-3-540-74619-5_12","volume-title":"Fast Software Encryption","author":"T. Shirai","year":"2007","unstructured":"Shirai, T., Shibutani, K., Akishita, T., Moriai, S., Iwata, T.: The 128-Bit Blockcipher CLEFIA (Extended Abstract). In: Biryukov, A. (ed.) FSE 2007. LNCS, vol.\u00a04593, pp. 181\u2013195. Springer, Heidelberg (2007)"},{"key":"25_CR33","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1016\/j.cose.2005.09.010","volume":"25","author":"H.A. Wen","year":"2006","unstructured":"Wen, H.A., Lin, C.L., Hwang, T.: Provably secure authenticated key exchange protocols for low power computing clients. Computers and Security\u00a025, 106\u2013113 (2006)","journal-title":"Computers and Security"},{"unstructured":"Vesteras, B.: Analysis of Key Agreement Protocols. Master\u2019s Thesis Report, Department of Computer Science and Media Technology, Gjovik University College (2006)","key":"25_CR34"},{"doi-asserted-by":"crossref","unstructured":"Teo, J.C.M., Tan, C.H.: Energy-Efficient and Scalable Group Key Agreement for Large Ad Hoc Networks. In: PE-WASUN\u2019s 2005, October 10-13, pp. 114\u2013121 (2005)","key":"25_CR35","DOI":"10.1145\/1089803.1089975"},{"key":"25_CR36","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1007\/978-3-540-28632-5_26","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2004","author":"M. Feldhofer","year":"2004","unstructured":"Feldhofer, M., Dominikus, S., Wolkerstorfer, J.: Strong Authentication for RFID Systems Using the AES Algorithm. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol.\u00a03156, pp. 357\u2013370. Springer, Heidelberg (2004)"},{"key":"25_CR37","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1007\/3-540-44983-3_4","volume-title":"Selected Areas in Cryptography","author":"K. Aoki","year":"2001","unstructured":"Aoki, K., Ichikawa, T., Kanda, M., Matsui, M., Moriai, S., Nakajima, J., Tokita, T.: Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms - Design and Analysis. In: Stinson, D.R., Tavares, S. (eds.) SAC 2000. LNCS, vol.\u00a02012, pp. 39\u201356. Springer, Heidelberg (2001)"},{"unstructured":"Good, T., Chelton, W., Benaissa, M.: Hardware Results for Selected Stream Cipher Candidates. Presented at SASC (2007), http:\/\/www.ecrypt.eu.org\/stream\/","key":"25_CR38"},{"doi-asserted-by":"crossref","unstructured":"Cheng, H., Heys, H.M., Wang, C.: PUFFIN: A Novel Compact Block Cipher Targeted to Embedded Digital Systems. In: Euromicro Conference on Digital System Design (DSD 2008), Parma, Italy, pp. 383\u2013390 (2008)","key":"25_CR39","DOI":"10.1109\/DSD.2008.34"},{"key":"25_CR40","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"326","DOI":"10.1007\/978-3-642-23951-9_22","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2011","author":"J. Guo","year":"2011","unstructured":"Guo, J., Peyrin, T., Poschmann, A., Robshaw, M.: The LED Block Cipher. In: Preneel, B., Takagi, T. (eds.) CHES 2011. LNCS, vol.\u00a06917, pp. 326\u2013341. Springer, Heidelberg (2011)"},{"key":"25_CR41","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1007\/978-3-642-15031-9_2","volume-title":"Cryptographic Hardware and Embedded Systems, CHES 2010","author":"L. Knudsen","year":"2010","unstructured":"Knudsen, L., Leander, G., Poschmann, A., Robshaw, M.J.B.: PRINTcipher: A Block Cipher for IC-Printing. In: Mangard, S., Standaert, F.-X. (eds.) CHES 2010. LNCS, vol.\u00a06225, pp. 16\u201332. Springer, Heidelberg (2010)"},{"key":"25_CR42","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"206","DOI":"10.1007\/978-3-642-22792-9_12","volume-title":"Advances in Cryptology \u2013 CRYPTO 2011","author":"G. Leander","year":"2011","unstructured":"Leander, G., Abdelraheem, M.A., AlKhzaimi, H., Zenner, E.: A Cryptanalysis of PRINTcipher: The Invariant Subspace Attack. In: Rogaway, P. (ed.) CRYPTO 2011. LNCS, vol.\u00a06841, pp. 206\u2013221. Springer, Heidelberg (2011)"},{"key":"25_CR43","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1007\/11535218_18","volume-title":"Advances in Cryptology \u2013 CRYPTO 2005","author":"A. Juels","year":"2005","unstructured":"Juels, A., Weis, S.A.: Authenticating Pervasive Devices with Human Protocols. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol.\u00a03621, pp. 293\u2013308. Springer, Heidelberg (2005)"},{"key":"25_CR44","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/11872153_14","volume-title":"Personal Wireless Communications","author":"P. Peris-Lopez","year":"2006","unstructured":"Peris-Lopez, P., Hernandez-Castro, J.C., Estevez-Tapiador, J.M., Ribagorda, A.: RFID Systems: A Survey on Security Threats and Proposed Solutions. In: Cuenca, P., Orozco-Barbosa, L. (eds.) PWC 2006. LNCS, vol.\u00a04217, pp. 159\u2013170. Springer, Heidelberg (2006)"},{"unstructured":"Moore, G.E.: Cramming More Components onto Integrated Circuits. Electronics (1965), http:\/\/www.intel.com","key":"25_CR45"},{"key":"25_CR46","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1007\/11733447_16","volume-title":"Smart Card Research and Advanced Applications","author":"F.-X. Standaert","year":"2006","unstructured":"Standaert, F.-X., Piret, G., Gershenfeld, N., Quisquater, J.-J.: SEA: A Scalable Encryption Algorithm for Small Embedded Applications. In: Domingo-Ferrer, J., Posegga, J., Schreckling, D. (eds.) CARDIS 2006. LNCS, vol.\u00a03928, pp. 222\u2013236. Springer, Heidelberg (2006)"},{"unstructured":"NS3 Simulator, http:\/\/www.nsnam.org","key":"25_CR47"},{"issue":"4","key":"25_CR48","doi-asserted-by":"publisher","first-page":"675","DOI":"10.1109\/TSG.2011.2160661","volume":"2","author":"M.M. Fouda","year":"2011","unstructured":"Fouda, M.M., Fadlullah, Z.M., Kato, N., Lu, R., Shen, X.: A Lightweight Message Authentication Scheme for Smart Grid Communications. IEEE Transaction on Smart Grid\u00a02(4), 675\u2013685 (2011)","journal-title":"IEEE Transaction on Smart Grid"},{"key":"25_CR49","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"222","DOI":"10.1007\/978-3-642-22792-9_13","volume-title":"Advances in Cryptology \u2013 CRYPTO 2011","author":"J. Guo","year":"2011","unstructured":"Guo, J., Peyrin, T., Poschmann, A.: The PHOTON Family of Lightweight Hash Functions. In: Rogaway, P. (ed.) CRYPTO 2011. LNCS, vol.\u00a06841, pp. 222\u2013239. Springer, Heidelberg (2011)"},{"key":"25_CR50","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"312","DOI":"10.1007\/978-3-642-23951-9_21","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2011","author":"A. Bogdanov","year":"2011","unstructured":"Bogdanov, A., Kne\u017eevi\u0107, M., Leander, G., Toz, D., Var\u0131c\u0131, K., Verbauwhede, I.: spongent: A Lightweight Hash Function. In: Preneel, B., Takagi, T. (eds.) CHES 2011. LNCS, vol.\u00a06917, pp. 312\u2013325. Springer, Heidelberg (2011)"},{"unstructured":"Grosso, V., Christina, B., Gerard, B., Standaert, F.X.: A Note on the Empirical Evaluation of Security Margins against Algebraic Attacks (with Application to Low Cost Ciphers LED and Piccolo). In: The Proceedings of the 33rd WIC Symposium on Information Theory in the Benelux, Boekelo, pp. 52\u201359 (May 2012)","key":"25_CR51"}],"container-title":["Communications in Computer and Information Science","Recent Trends in Computer Networks and Distributed Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-34135-9_25.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T12:45:48Z","timestamp":1620132348000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-34135-9_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642341342","9783642341359"],"references-count":51,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-34135-9_25","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2012]]}}}