Improved Feistel-Based Ciphers for Wireless Sensor Network Security

Chapter
Part of the Risk Engineering book series (RISK)

Abstract

WSN are exposed to variety of attacks as other networks. Quality and complexity of attacks are rising day by day. The proposed work aim at showing how complexity of modern attacks is growing accordingly, converging to usher resistant methods also to rise. Limitations in computation and battery power in sensor nodes gives constrain to diversity of security mechanisms.

References

  1. 1.
    Mayank Saraogi. Security in wireless sensor networks. Computer and network security. http://www.cs.utk.edu/~saraogi/594paper.pdf (2006)
  2. 2.
    Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: Attacks and countermeasures. In: Proceedings of the 1st IEEE International Workshop on Sensor Network Protocols and Applications, pp. 113–127 (2003)Google Scholar
  3. 3.
    Rasool, R.U., Guo, Q.P.: Security in Wireless Networks and Users-Grid. Course Work, Wuhan University of Technology (2004)Google Scholar
  4. 4.
    Mauw, S., van Vessem, I., Bos, B.: Forward secure communication in wireless sensor networks. In: Third International Conference Security in Pervasive Computing, pp. 32–42 (2006)Google Scholar
  5. 5.
    Hu, F., Ziobro, J., Tillett, J., Sharma, N.K.: Secure wireless sensor networks: problems and solutions. J. Syst. Cyber. Inf. 1(9) (2004)Google Scholar
  6. 6.
    Kumar, S., Valdez, R., Gomez, O., Bose, S.: Survivability evaluation of wireless sensor network under DDoS attack. In: Proceedings of the International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies, p. 82 (2006)Google Scholar
  7. 7.
    Bilstrup, U., Sjoberg, K., Svensson, B., Wiberg, P.A.: Capacity limitations in wireless sensor networks. In: Proceedings of the 9th IEEE International Conference on Emerging Technologies and Factory Automation, vol. 1, pp. 529–536 (2003)Google Scholar
  8. 8.
    Moldovyan, N.A., Moldovyan, A.A., Goots, N.D.: Variable bit permutations: linear characteristics and pure VPB-based cipher. Comput. Sci. J. Moldova 13(1), 84 (2005)MATHMathSciNetGoogle Scholar
  9. 9.
    Moldovyan, N.A., Moldovyanu, P.A., Summerville, D.H.: On software implementation of fast DDP-based ciphers. Int. J. Netw. Secur. 4(1), 81–89 (2007)Google Scholar
  10. 10.
    Moldovyan, N.A., Moldovyan, A.A.: Data-driven ciphers for fast telecommunication systems, p. 202. Auerbach Publications. Taylor & Francis Group, New York, (2007)Google Scholar
  11. 11.
    Schneier, B.: Applied Cryptography: Protocols, Algorithms, and Source Code, 2nd edn, p. 758. Wiley, New York (1996)Google Scholar
  12. 12.
    Biham, E., Shamir, A.: Differential cryptanalysis of the full 16-round DES. In: Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology, pp. 487–496 (1992)Google Scholar
  13. 13.
    Matsui, M.: Linear cryptanalysis method for DES cipher. Workshop on the Theory and Application of Cryptographic Techniques on Advances in Cryptology, pp. 386–397 (1994)Google Scholar
  14. 14.
    Levis, P.: Sensor network protocol design and implementation. Technical Report CS268, UC, Berkeley (2005)Google Scholar
  15. 15.
    Hill, J., Szewczyk, R., Woo, A., Hollar, S., Culler, D., Pister, K.: Proceedings of the Ninth International Conference on Architectural Support for Programming Languages and Operating Systems, vol. 35(11), pp. 93–104 (2000)Google Scholar
  16. 16.
    Feistel, H.: Cryptography and computer privacy. Sci. Am. 228(5), 15–23 (1973)CrossRefGoogle Scholar
  17. 17.
    Net and Electronic Frontier Foundations (EFF). RSA data security: RSA code-breaking contest again won by distributed. http://www.rsa.com/pressbox/html/990119-1.htm (1999)
  18. 18.
    Bodrov, A.V., Moldovyan, A.A., Moldovyanu, P.A.: DDP-based ciphers: differential analysis of SPECTR-H64. Comput. Sci. J. Moldova 13(3), 268–291 (2005)MATHMathSciNetGoogle Scholar
  19. 19.
    Moldovyan, N.A.: Fast DDP-based ciphers: design and differential analysis of Cobra-H64. Comput. Sci. J. Moldova 11(3), 292–315 (2003)MATHMathSciNetGoogle Scholar
  20. 20.
    Lu, J., Lee, C., Kim, J.: Related-key attacks on the full-round Cobra-F64a and Cobra-F64b. In: Proceedings of the Fifth Conference on Security and Cryptography for Networks, vol. 4116, pp. 95–110 (2006)Google Scholar
  21. 21.
    Goots, N.D., Moldovyan, A.A., Moldovyan, N.A.: Fast encryption algorithm SPECTR-H64. In: Proceedings of the International Workshop on Information Assurance in Computer Networks: Methods, Models, and Architectures for Network Security, pp. 275–286 (2001)Google Scholar
  22. 22.
    Keliher, L.: Toward provable security against differential and linear cryptanalysis for Camellia and related Ciphers. Int. J. Netw. Secur. 5(2), 167–175 (2007)Google Scholar
  23. 23.
    Rudolf, D.: Optimized differential cryptanalysis of the data encryption standard. Department of Computer Science, University of Saskatchewan. http://www.cs.usask.ca/~dtr467/400/final/ (2001)

Copyright information

© Springer International Publishing Switzerland 2016

Authors and Affiliations

  1. 1.Tanzania Industrial Research Development OrganisationTIRDO/North West UniversityDar Es SalaamTanzania
  2. 2.Far East Energy Management Company (FEEMC)VladivostokRussia

Personalised recommendations