FPGA-Based Partial Crypto-Reconfiguration of Nodes for WSN

Conference paper
Part of the Lecture Notes in Networks and Systems book series (LNNS, volume 9)

Abstract

FPGA has a large number of applications in various fields. Wireless sensor network is a vast field, and implementation of FPGA for WSN can minimize a number of complexities. Secure communication between the networks must be taken care of as a lot of networking takes place. Dynamic partial reconfiguration of the specific part minimizes area utilization and power consumption. In this paper, cryptographic algorithm Blowfish has been used. Partial reconfiguration is performed considering the variable key lengths. Low power node (L) has less key size, moderate power node (M) has moderate key size, and high power node (H) has large key size. It is also seen how Blowfish is better as compared to AES cipher. Experimental evaluation is given by considering two nodes on FPGA (ALTERA DE2) kit. Programming is done in VHDL.

Keywords

Reconfiguration Cryptography Blowfish FPGA 

References

  1. 1.
    Cardona LA, Lorente B, Ferrer C (2014) Partial crypto reconfiguration of nodes based on FPGA for WSN, ISBN: 978-1-4799-3530-7, Pagination: 468-471, ICCST 2014 IEEE, pp 0–4Google Scholar
  2. 2.
    Zilberman N, Watts P, Rotsos C, Moore A (2015) Reconfigurable network systems and software-defined networking. Proc IEEE 103(7):102–1124Google Scholar
  3. 3.
    Cody B, Madigan J, MacDonald S, Hsu K (2007) High speed SOC design for blowfish cryptographic algorithm. In: 2007 IEEE international conference on very large scale integration. pp 284–287. ISSN: 2324-8432Google Scholar
  4. 4.
    Karim A, Tamimi A (2008) Performance analysis of data encryption algorithms. pp 1–13Google Scholar
  5. 5.
    Palumbo F, Sau C, Raffo L (2015) Coarse-grained reconfiguration: dataflow-based power management. IET Comput Digit Tech 9(1):36–48CrossRefGoogle Scholar
  6. 6.
    Tessier R, Pocek K, DeHon A (2015) Reconfigurable computing architectures. Proc IEEE 103(3):332–354. ISSN: 0018-9219Google Scholar
  7. 7.
    Thakur J, Kumar N (2011) DES, AES and blowfish: symmetric key cryptography algorithms simulation based performance analysis. IJETAE 1(2). ISSN: 2250-2459Google Scholar
  8. 8.
    Vivado Design Suite User Guide (2015) Partial reconfiguration, UG909 (v2015.2) 24 June 2015Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2018

Authors and Affiliations

  1. 1.Sandip Institute of Technology and Research CenterNashikIndia

Personalised recommendations