Total views : 484
Lightweight Security Algorithm For Wireless Node Connected with IoT
Objective: The enhancement of wireless technology and sensory device has brought to the introduction towards IoT (Internet of Things). Here security is taken as one of the major issues, as they operate in unlicensed bandwidth. Since most of the device is resource constrained the lightweight security is driven to these devices. Implementation of security is also tedious and selective as the conventional security algorithm degrades the network performance due to the high computational complexity and inherent delays that are incurred for execution of these algorithms. Method: In this work, a novel approach is made with new hybrid lightweight security algorithm named PRESENT-GRP which is derived in Intel Galileo Gen 2 board. This methodology helps to secure data during transmission and control process. Findings: This hybrid algorithm is an enhancement of the GRP permutation algorithm because it lags an S-box. This proposed algorithm is for low power devices which consumes relatively less memory. Thus, in Internet of Things (IoT) applications this algorithm may help to provide end to end privacy to share data securely. Improvement: In future works, this algorithm can be improved with still more security level by having a trade off between performance and memory usage. It can also be enhanced by implementing it in real time military related and health related applications for end to end security for smaller size datum.
Hybrid Algorithm, IoT, Lightweight, Security, Wireless Network.
- Bogdanov A, Knudsen LR, Leander G. PRESENT: An ultra-lightweight block cipher in Cryptographic Hardware and Embedded Systems (Lecture Notes in Computer Science). Berlin, Germany: Springer-Verlag; 2007. p. 450–66.
- Zaba MR, Jamil N, Rusli ME, Jamaludin MA, MohdYasir AA. I-PRESENT: An involutive lightweight block cipher. Journal of Information Security. 2014 Jul; 5(3):114–22.
- Kiruthika B, Ezhilarasie R, Umamakeswari A. Implementation of modified RC4 algorithm for Wireless Sensor Networks on CC 2431. Indian Journal of Science and Technology. 2015 May; 8(S9):198–206.
- Ashok J, Thirumoorthy P. Design considerations for implementing an optimal battery management system of a wireless sensor node. Indian Journal of Science and Technology. 2014 Sep; 7(9):1255–9.
- Shi Z, Lee RB. Bit permutation instructions for accelerating software cryptography. Proc IEEE Int Conf Appl Specific Syst. Archit Process. (ASAP); 2000 Jul. p. 138–48.
- Leander PG, Schramm K, Paar C. New light-weight crypto algorithms for RFID. Proc IEEE Int Symp Circuits Syst. (ISCAS); 2007 May. p. 1843–6.
- Eisenbarth T, Kumar S. A survey of lightweight-cryptography implementations. IEEE Des Test Comput. 2007 Nov–Dec; 24(6):522–33.
- Data Encryption Standard (DES). 1995. Available from: www.http.csrc.nist.gov/publications/fips/fips46-3/fips46-3.pdf
- Yang X, Lee RB. Fast subword permutation instructions using omega and flip network stages. Proc Int Conf Comput Design; 2000 Sep. p. 15–22.
- Hernandez-Castro JC, Peris-Lopez P. On the key schedule strength of PRESENT. SPRINGER; 2011 Sep. p. 253–63.
- Mihajloska H, Gligoroski D. A new approach into constructing S-boxes for Lightweight Block ciphers. 8th Conference on Informatics and Information Technology with International Participation (CIIT); 2011. p. 1–5.
- Poschmann A. Lightweight cryptography: Cryptographic engineering for a pervasive world. Doktor-Ingenieur Faculty of Electrical Engineering and Information Technology. Germany: Ruhr-University Bochum; 2009 Feb.
- Borghoff J. PRINCE - A low-latency block cipher for pervasive computing applications. Advances in Cryptology. Berlin, Germany: Springer-Verlag; 2012 Dec. p. 208–25.
- Kaliski BS, Yin YL. On the security of the RC5 encryption algorithm. RSA Technical Report; 1998 Sep.
- Kaliski BS, Yin YL. On differential and linear cryptanalysis of RC5 encryption algorithm. Advances in Cryptology (Lecture Notes in Computer Science); 1995 Aug. p. 171–84.
- Lee R, Mahon M, Morris D. Pathlength reduction features in the PA-RISC architecture. 37th IEEE Comput Soc Int Conf. Dig Papers; 1992 Feb. p. 129–35.
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.