An Efficient Authenticated-Encryption with Associated-Data Block Cipher Mode for Wireless Sensor Networks

  • A. A. Adekunle
  • S. R. Woodhead
Part of the Lecture Notes in Computer Science book series (LNCS, volume 6074)

Abstract

This paper begins by presenting an analysis of the current generic schemes utilising block cipher design techniques for the provision of authenticated encryption with associated data (AEAD) security services in communication protocols. Such protocols are commonly applied in wireless sensor networks. The conclusions of this analysis are used in the design of a resourceful AEAD construct, which we term Simultaneous Combined Mode Algorithm (SCMA). Using software simulation we show that our construct can achieve improvements in processing energy requirement, processing latency and data throughput when benchmarked against the analysed schemes.

Keywords

Authenticated encryption associated data message authentication modes of operation wireless sensor networks 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Joux, A., Martinet, G., Valette, F.: Blockwise-adaptive attackers. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 17–30. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  2. 2.
    Rogaway, P.: Authenticated-encryption with associated-data. In: 9th ACM Conference on Computer and Communications Security (CCS-9). ACM Press, New York (2002)Google Scholar
  3. 3.
    Hill, J., Culler, D.: Mica: A wireless platform for deeply embedded networks. IEEE Micro 22(6), 12–24 (2002)CrossRefGoogle Scholar
  4. 4.
    Knudsen, L.R., Wagner, D.: On the structure of Skipjack. Discrete Applied Mathematics 111, 103–116 (2001)MATHCrossRefMathSciNetGoogle Scholar
  5. 5.
    Bellare, M., Namprempre, C.: Authenticated encryption: Relations among notions and analysis of the generic composition paradigm. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 531–545. Springer, Heidelberg (2000)CrossRefGoogle Scholar
  6. 6.
    Bellare, M., Desai, A., Jokipii, E., Rogaway, P.: A concrete security treatment of symmetric encryption. In: Proceedings of the 38th Symposium on Foundations of Computer Science, pp. 394–403. IEEE, Los Alamitos (1997)CrossRefGoogle Scholar
  7. 7.
    National Institute of Standards and Technology (NIST). Special Publication 800-38A: Recommendation for Block Cipher Modes of Operation – methods and techniques (2001)Google Scholar
  8. 8.
    Perrig, A., Szewczyk, R., Tygar, J.D., Wen, V., Culler, D.E.: SPINS: Security protocols for sensor networks. Wireless Networks 8(5), 521–534 (2002)MATHCrossRefGoogle Scholar
  9. 9.
    Whiting, D., Housley, R., Ferguson, N.: Counter with CBCMAC (CCM). RFC 3610 (2003)Google Scholar
  10. 10.
    Jonsson, J.: On the security of CTR+CBC-MAC. In: Nyberg, K., Heys, H.M. (eds.) SAC 2002. LNCS, vol. 2595, pp. 76–93. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  11. 11.
    Karlof, C., Sastry, N., Wagner, D.: TinySec: A link security architecture for wireless sensor networks. In: SenSys’04 (2004)Google Scholar
  12. 12.
    Knudsen, L.R.: Block chaining modes of operation. Technical Report, Department of Informatics, University of Bergen (2000)Google Scholar
  13. 13.
    Li, S., Li, T., Wang, X., Zhou, J., Chen, K.: Efficient link layer security scheme for wireless sensor networks. In: Proceedings of Journal on Information and Computational Science. Binary Information Press (2007)Google Scholar
  14. 14.
    Chan, H., Perrig, A.: Security and privacy in sensor networks. IEEE Computer Magazine, 103–105 (2003)Google Scholar
  15. 15.
    Razvi Doomun, M., Sunjiv Soyjaudah, K.M.: Resource saving AES-CCMP design with hybrid counter mode block chaining – MAC. IJCSNS International Journal of Computer Science and Network Security 8(10), 1–13 (2008)Google Scholar
  16. 16.
    IEEE Std 802.11i, IEEE Standard for Wireless LAN Medium Access Control (MAC) and Physical Layer Specifications (Amendment 6: Medium Access Control Security Enhancements) (2004)Google Scholar
  17. 17.
    Bellare, M., Micciancio, D.: A new paradigm for collision-free hashing: Incrementally at reduced cost. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 163–192. Springer, Heidelberg (1997)Google Scholar
  18. 18.
    Fouque, P.A., Joux, A., Poupard, G.: Blockwise adversarial model for on-line ciphers and symmetric encryption schemes. In: Handschuh, H., Hasan, M.A. (eds.) SAC 2004. LNCS, vol. 3357, pp. 212–226. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  19. 19.
    McGrew, D.A.: Counter mode security: Analysis and Recommendations. Cisco Systems (November 2002)Google Scholar
  20. 20.
    Biryukov, A., Shamir, A.: Cryptanalytic time/memory/data tradeoffs for stream ciphers. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 1–13. Springer, Heidelberg (2000)CrossRefGoogle Scholar
  21. 21.
    Bauer, G.R., Potisk, P., Tillich, S.: Comparing Block Cipher Modes of Operation on MICAz Sensor Nodes. In: 2009 Parallel, Distributed and Network-based Processing, pp. 371–378 (2009)Google Scholar
  22. 22.
    Lucks, S.: Two-Pass authenticated encryption faster than generic composition. In: Gilbert, H., Handschuh, H. (eds.) FSE 2005. LNCS, vol. 3557, pp. 284–298. Springer, Heidelberg (2005)Google Scholar
  23. 23.
    Sung, J., Lee, S., Lim, J.I., Lee, W., Yi, O.: Concrete security analysis of CTR-OFB and CTR-CFB modes of operation. In: Kim, K.-c. (ed.) ICISC 2001. LNCS, vol. 2288, pp. 103–113. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  24. 24.
    Bellare, M., Namprempre, C.: Authenticated encryption: Relations among notions and analysis of the generic composition paradigm. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 531–545. Springer, Heidelberg (2000)CrossRefGoogle Scholar
  25. 25.
    Adekunle, A.A., Woodhead, S.R.: On efficient data integrity and data origin authentication for wireless sensor networks utilising block cipher design techniques. In: Al-Begain, K. (ed.) NGMAST’09, pp. 419–424. IEEE Computer Society, Los Alamitos (September 2009)Google Scholar
  26. 26.
    Liskov, M., Rivest, R., Wagner, D.: Tweakable block ciphers. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 31–46. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  27. 27.
    Schneier, B.: Applied Cryptography, 2nd edn. John Wiley & Sons, Chichester (1996)Google Scholar
  28. 28.
    Das, M.L.: Two-factor user authentication in wireless sensor networks. IEEE Trans. Wireless. Comm. 8(3), 1086–1090 (2009)CrossRefGoogle Scholar
  29. 29.
    Flury, R., Wattenhofer, R.: Routing, Anycast, and Multicast for Mesh and Sensor Networks. In: IEEE International Conference on Computer Communications (INFOCOM 2007), Anchorage, Alaska, USA (May 2007)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2010

Authors and Affiliations

  • A. A. Adekunle
    • 1
  • S. R. Woodhead
    • 1
  1. 1.Department of Computer and Communication EngineeringUniversity of GreenwichKent

Personalised recommendations