Two-phase hybrid cryptography algorithm for wireless sensor networks

Abstract For achieving security in wireless sensor networks (WSNs), cryptography plays an important role. In this paper, a new security algorithm using combination of both symmetric and asymmetric cryptographic techniques is proposed to provide high security with minimized key maintenance. It guarantees three cryptographic primitives, integrity, confidentiality and authentication. Elliptical Curve Cryptography (ECC) and Advanced Encryption Standard (AES) are combined to provide encryption. XOR-DUAL RSA algorithm is considered for authentication and Message Digest-5 (MD5) for integrity. The results show that the proposed hybrid algorithm gives better performance in terms of computation time, the size of cipher text, and the energy consumption in WSN. It is also robust against different types of attacks in the case of image encryption.

[1]  Thaier Hayajneh,et al.  An energy-efficient and security aware route selection protocol for wireless sensor networks , 2014, Secur. Commun. Networks.

[2]  Osama S. Faragallah,et al.  An Efficient Chaos-Based Feedback Stream Cipher (ECBFSC) for Image Encryption and Decryption , 2007, Informatica.

[3]  Omar Seddiki,et al.  Integration of chaotic sequences uniformly distributed in a new image encryption algorithm , 2012 .

[4]  E. Kannan,et al.  A Hybrid Key Management Approach for Secure Communication in Wireless Sensor Networks , 2015 .

[5]  Hung-Min Sun,et al.  Dual RSA and Its Security Analysis , 2007, IEEE Transactions on Information Theory.

[6]  Yacine Challal,et al.  SMART: Secure Multi-pAths Routing for wireless sensor neTworks , 2014, ADHOC-NOW.

[7]  Jon Erickson,et al.  Hacking: The Art of Exploitation , 2008 .

[8]  Fayez W. Zaki,et al.  Multi-level stable and energy-efficient clustering protocol in heterogeneous wireless sensor networks , 2014, IET Wirel. Sens. Syst..

[9]  Md. Alam Hossain Cryptanalyzing of Message Digest Algorithms MD4 and MD5 , 2012 .

[10]  Arjen K. Lenstra,et al.  Unbelievable Security. Matching AES Security Using Public Key Systems , 2001, ASIACRYPT.

[11]  Alfred Menezes,et al.  The Elliptic Curve Digital Signature Algorithm (ECDSA) , 2001, International Journal of Information Security.

[12]  S. Subasree,et al.  DESIGN OF A NEW SECURITY PROTOCOL USING HYBRID CRYPTOGRAPHY ALGORITHMS , 2010 .

[13]  William E. Burr,et al.  Selecting the Advanced Encryption Standard , 2003, IEEE Secur. Priv..

[14]  Maricel O. Balitanas Wi Fi Protected Access-Pre-Shared Key Hybrid Algorithm , 2009 .

[15]  Wuling Ren,et al.  A Hybrid Encryption Algorithm Based on DES and RSA in Bluetooth Communication , 2010, 2010 Second International Conference on Modeling, Simulation and Visualization Methods.

[16]  Lirui Zhang,et al.  A novel D-S based secure localization algorithm for wireless sensor networks , 2014, Secur. Commun. Networks.

[17]  Dan Boneh,et al.  Cryptanalysis of RSA with private key d less than N0.292 , 2000, IEEE Trans. Inf. Theory.

[18]  Gurpreet Singh,et al.  A Study of Encryption Algorithms (RSA, DES, 3DES and AES) for Information Security , 2013, International Journal of Computer Applications.

[19]  L. Scripcariu,et al.  Improved RSA Encryption Algorithm for Increased Security of Wireless Networks , 2007, 2007 International Symposium on Signals, Circuits and Systems.

[20]  Ahmed Bashir Abugharsa,et al.  A Novel Image Encryption Using an Integration Technique of Blocks Rotation Based on the Magic Cube and the AES Algorithm , 2012, ArXiv.

[21]  Johann Großschädl,et al.  Accelerating AES Using Instruction Set Extensions for Elliptic Curve Cryptography , 2005, ICCSA.

[22]  D. Boneh Cryptanalysis of RSA with Private Key d Less Than N 0 , 1999 .

[23]  Ravi Kishore Kodali,et al.  Energy Efficient ECC Encryption Using ECDH , 2014 .

[24]  Jean Frédéric Myoupo,et al.  Secure and Energy-efficient Geocast Protocol for Wireless Sensor Networks based on a Hierarchical Clustered Structure , 2013, Int. J. Netw. Secur..

[25]  Shi-hai Zhu,et al.  Research of hybrid cipher algorithm application to hydraulic information transmission , 2011, 2011 International Conference on Electronics, Communications and Control (ICECC).

[26]  Hacène Fouchal,et al.  Towards efficient deployment of wireless sensor networks , 2016, Secur. Commun. Networks.