Abstract
This paper begins by presenting an analysis of the current generic schemes utilising block cipher design techniques for the provision of authenticated encryption with associated data (AEAD) security services in communication protocols. Such protocols are commonly applied in wireless sensor networks. The conclusions of this analysis are used in the design of a resourceful AEAD construct, which we term Simultaneous Combined Mode Algorithm (SCMA). Using software simulation we show that our construct can achieve improvements in processing energy requirement, processing latency and data throughput when benchmarked against the analysed schemes.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Joux, A., Martinet, G., Valette, F.: Blockwise-adaptive attackers. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 17–30. Springer, Heidelberg (2002)
Rogaway, P.: Authenticated-encryption with associated-data. In: 9th ACM Conference on Computer and Communications Security (CCS-9). ACM Press, New York (2002)
Hill, J., Culler, D.: Mica: A wireless platform for deeply embedded networks. IEEE Micro 22(6), 12–24 (2002)
Knudsen, L.R., Wagner, D.: On the structure of Skipjack. Discrete Applied Mathematics 111, 103–116 (2001)
Bellare, M., Namprempre, C.: Authenticated encryption: Relations among notions and analysis of the generic composition paradigm. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 531–545. Springer, Heidelberg (2000)
Bellare, M., Desai, A., Jokipii, E., Rogaway, P.: A concrete security treatment of symmetric encryption. In: Proceedings of the 38th Symposium on Foundations of Computer Science, pp. 394–403. IEEE, Los Alamitos (1997)
National Institute of Standards and Technology (NIST). Special Publication 800-38A: Recommendation for Block Cipher Modes of Operation – methods and techniques (2001)
Perrig, A., Szewczyk, R., Tygar, J.D., Wen, V., Culler, D.E.: SPINS: Security protocols for sensor networks. Wireless Networks 8(5), 521–534 (2002)
Whiting, D., Housley, R., Ferguson, N.: Counter with CBCMAC (CCM). RFC 3610 (2003)
Jonsson, J.: On the security of CTR+CBC-MAC. In: Nyberg, K., Heys, H.M. (eds.) SAC 2002. LNCS, vol. 2595, pp. 76–93. Springer, Heidelberg (2003)
Karlof, C., Sastry, N., Wagner, D.: TinySec: A link security architecture for wireless sensor networks. In: SenSys’04 (2004)
Knudsen, L.R.: Block chaining modes of operation. Technical Report, Department of Informatics, University of Bergen (2000)
Li, S., Li, T., Wang, X., Zhou, J., Chen, K.: Efficient link layer security scheme for wireless sensor networks. In: Proceedings of Journal on Information and Computational Science. Binary Information Press (2007)
Chan, H., Perrig, A.: Security and privacy in sensor networks. IEEE Computer Magazine, 103–105 (2003)
Razvi Doomun, M., Sunjiv Soyjaudah, K.M.: Resource saving AES-CCMP design with hybrid counter mode block chaining – MAC. IJCSNS International Journal of Computer Science and Network Security 8(10), 1–13 (2008)
IEEE Std 802.11i, IEEE Standard for Wireless LAN Medium Access Control (MAC) and Physical Layer Specifications (Amendment 6: Medium Access Control Security Enhancements) (2004)
Bellare, M., Micciancio, D.: A new paradigm for collision-free hashing: Incrementally at reduced cost. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 163–192. Springer, Heidelberg (1997)
Fouque, P.A., Joux, A., Poupard, G.: Blockwise adversarial model for on-line ciphers and symmetric encryption schemes. In: Handschuh, H., Hasan, M.A. (eds.) SAC 2004. LNCS, vol. 3357, pp. 212–226. Springer, Heidelberg (2004)
McGrew, D.A.: Counter mode security: Analysis and Recommendations. Cisco Systems (November 2002)
Biryukov, A., Shamir, A.: Cryptanalytic time/memory/data tradeoffs for stream ciphers. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 1–13. Springer, Heidelberg (2000)
Bauer, G.R., Potisk, P., Tillich, S.: Comparing Block Cipher Modes of Operation on MICAz Sensor Nodes. In: 2009 Parallel, Distributed and Network-based Processing, pp. 371–378 (2009)
Lucks, S.: Two-Pass authenticated encryption faster than generic composition. In: Gilbert, H., Handschuh, H. (eds.) FSE 2005. LNCS, vol. 3557, pp. 284–298. Springer, Heidelberg (2005)
Sung, J., Lee, S., Lim, J.I., Lee, W., Yi, O.: Concrete security analysis of CTR-OFB and CTR-CFB modes of operation. In: Kim, K.-c. (ed.) ICISC 2001. LNCS, vol. 2288, pp. 103–113. Springer, Heidelberg (2002)
Bellare, M., Namprempre, C.: Authenticated encryption: Relations among notions and analysis of the generic composition paradigm. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 531–545. Springer, Heidelberg (2000)
Adekunle, A.A., Woodhead, S.R.: On efficient data integrity and data origin authentication for wireless sensor networks utilising block cipher design techniques. In: Al-Begain, K. (ed.) NGMAST’09, pp. 419–424. IEEE Computer Society, Los Alamitos (September 2009)
Liskov, M., Rivest, R., Wagner, D.: Tweakable block ciphers. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 31–46. Springer, Heidelberg (2002)
Schneier, B.: Applied Cryptography, 2nd edn. John Wiley & Sons, Chichester (1996)
Das, M.L.: Two-factor user authentication in wireless sensor networks. IEEE Trans. Wireless. Comm. 8(3), 1086–1090 (2009)
Flury, R., Wattenhofer, R.: Routing, Anycast, and Multicast for Mesh and Sensor Networks. In: IEEE International Conference on Computer Communications (INFOCOM 2007), Anchorage, Alaska, USA (May 2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Adekunle, A.A., Woodhead, S.R. (2010). An Efficient Authenticated-Encryption with Associated-Data Block Cipher Mode for Wireless Sensor Networks. In: Osipov, E., Kassler, A., Bohnert, T.M., Masip-Bruin, X. (eds) Wired/Wireless Internet Communications. WWIC 2010. Lecture Notes in Computer Science, vol 6074. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-13315-2_31
Download citation
DOI: https://doi.org/10.1007/978-3-642-13315-2_31
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-13314-5
Online ISBN: 978-3-642-13315-2
eBook Packages: Computer ScienceComputer Science (R0)