Lightweight, Dynamic, and Flexible Cipher Scheme for Wireless and Mobile Networks
The security of Wireless and Mobile Networks (WN, and MN, respectively) is crucial for effective deployment in various areas and applications such as military and business. The existing security solutions are based on static block /stream cipher to ensure Data Confidentiality (DC). These solutions require multi-round function, and consequently a high computing complexity and energy consumption. However, WN or MN has limited resources that prevent their efficient deployment for a long period. To overcome the previous challenge, a new kind of cipher scheme based on a dynamic permutation packets cipher is presented in this paper to ensure the DC requirements with low computation complexity. Theoretical results show that the proposed algorithm has a reduced computational complexity, which can lead to reduce the energy consumption. It is equally important to note that our proposed solution could be adapted for other kinds of networks that employ packet transmission such as vehicular network.
KeywordsData Confidentiality dynamic and lightweight cipher flexible permutation layer security analysis
Unable to display preview. Download preview PDF.
- 2.Karygiannis, T., Owens, L.: Wireless network security. In: NIST Special Publication, vol. 800, p. 48 (2002)Google Scholar
- 4.Dworkin, M., Dworkin, M., Gallagher, P.D., Director Nist Special Publication -f : Recommendation for block cipher modes of operation: Methods and techniques (2001)Google Scholar
- 5.Lee, H., Lee, K., Shin, Y.: Aes implementation and performance evaluation on 8-bit microcontrollers. CoRR, abs/0911.0482 (2009)Google Scholar
- 7.Raza, S., Slabbert, A., Voigt, T., Landernäs, K.: Security considerations for the wireless hart protocol. In: Proceedings of the 14th IEEE International Conference on Emerging Technologies & Factory Automation, ETFA 2009, pp. 242–249. IEEE Press, Piscataway (2009)Google Scholar
- 9.Karlof, C., Sastry, N., Wagner, D.: Tinysec: a link layer security architecture for wireless sensor networks. In: Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems, SenSys 2004, pp. 162–175. ACM, New York (2004)Google Scholar
- 10.Karlof, C., Sastry, N., Wagner, D.: Tinysec: a link layer security architecture for wireless sensor networks. In: ACM, pp. 162–175 (2004)Google Scholar
- 11.Skipjack, N.: KEA algorithm specifications (1998)Google Scholar
- 13.Li, T., Wu, H., Wang, X., Bao, F.: SenSec design. Institue for InfoComm Research, Tech. Rep. TR-I2R-v1, vol. 1 (2005)Google Scholar
- 15.Noura, H., Martin, S., Agha, K.A.: E3sn - efficient security scheme for sensor networks. In: SECRYPT, pp. 615–621 (2013)Google Scholar
- 16.Noura, H., Martin, S., AI Agha, K., Grote, W.: Key dependent cipher scheme for sensor networks. In: 2013 12th Annual Mediterranean Hoc Networking Workshop (MED-HOC-NET), pp. 148–154, June 2013Google Scholar
- 18.Campagna, M.J.: Security bounds for the nist codebook-based deterministic random bit generator (2006), firstname.lastname@example.org 13453 received November 1, 2006. http://eprint.iacr.org/2006/379
- 19.Thirteen Ways to Look at the Correlation Coefficient. The American Statistician 42(1), 59–66 (1988)Google Scholar