Abstract
Security is a critical issue in many sensor network applications. A number of security mechanisms are developed for wireless sensor networks based on classical cryptography. AES, RC5, SkipJack and XXTEA are some symmetric-key encryption algorithms that are deployed in sensor network environments. However, these algorithms have their own weakness, such as vulnerable to chosen-plaintext attack, brute force attack and computational complexity. We propose an energy efficient lightweight encryption scheme based on pseudorandom bit sequence generated by elliptic curve operations. We present experimental results of our proposed algorithm employed on real sensor nodes operating in TinyOS. We also discuss the security strength of our algorithm by presenting the security analysis of various tests and cryptanalytic attacks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Biswas, K., Muthukkumarasamy, V., Sithirasenan, E.: Maximal clique based clustering scheme for WSNs. In: 8th IEEE ISSNIP, Melbourne, pp. 237–241 (2013)
Biswas, K., Muthukkumarasamy, V., Sithirasenan, E., Usman, M.: An energy efficient clique based clustering and routing mechanism in WSNs. In: 9th IEEE IWCMC, Italy, pp. 171–176 (2013)
Shazly, M., Elmallah, E.S., Harms, J., AboElFotoh, H.M.F.: On area coverage reliability of WSNs. In: 36th IEEE LCN Conference, pp. 580–588 (2011)
Computerworld Magazine: AES proved vulnerable by Microsoft researchers (2011)
Intel Corporation: Intel architecture software developer’s manual (1997)
Biham, E., Birykov, A., Shamir, A.: Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials. J. of Cryptology 18(4), 291–311 (2005)
Koo, W.K., Lee, H., Kim, Y.H., Lee, D.H.: Implementation and Analysis of New Lightweight Cryptographic Algorithm for WSNs. In: ICISA, pp. 73–76 (2008)
Yarrkov, E.: Cryptanalysis of XXTEA (2010), http://eprint.iacr.org/2010/254.pdf
Amara, M., Siad, A.: Elliptic Curve Cryptography and its applications. In: IEEE WOSSPA, pp. 247–250 (2011)
Canteaut, A.: Linear Feedback Shift Register. In: Encyclopedia of Cryptography and Security, pp. 355–358. Springer
Burke, J., McDonald, J., Austin, T.: Architectural support for fast symmetric-key cryptography. In: 9th ICASPLOS, pp. 178–189 (2000)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Biswas, K., Muthukkumarasamy, V., Sithirasenan, E., Singh, K. (2014). A Simple Lightweight Encryption Scheme for Wireless Sensor Networks. In: Chatterjee, M., Cao, Jn., Kothapalli, K., Rajsbaum, S. (eds) Distributed Computing and Networking. ICDCN 2014. Lecture Notes in Computer Science, vol 8314. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-45249-9_33
Download citation
DOI: https://doi.org/10.1007/978-3-642-45249-9_33
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-45248-2
Online ISBN: 978-3-642-45249-9
eBook Packages: Computer ScienceComputer Science (R0)