A lightweight block cipher based on a multiple recursive generator for wireless sensor networks and RFID

In this paper, we use a multiple recursive generator (MRG) to generate sequences of numbers with very long periods, i.e., pseudo-random sequences. The MRG effectively constructs a block cipher which satisfies important quality requirements such as security, long period, randomness, and efficiency. We compare our approach with another lightweight block cipher based on a linear congruential generator (LCG) and analyze the efficiency in terms of the number of basic operations that are being performed. We also study the effects of using special classes of MRG which hold certain portability and efficiency properties, and analyze their advantages in this context. The proposed cipher is a lightweight cipher, which is very useful for resource limited resources such as sensor nodes in sensor networks, radio frequency identification (RFID) tags, etc. Copyright © 2010 John Wiley & Sons, Ltd. (In this paper, we use a multiple recursive generator (MRG) to generate sequences of numbers with very long periods, i.e., pseudo-random sequences. The MRG effectively constructs a block cipher which satisfies important quality requirements such as security, long period, randomness, and efficiency.)

[1]  Yi Mu,et al.  Convertible identity-based anonymous designated ring signatures , 2006, Int. J. Secur. Networks.

[2]  Chik How Tan,et al.  A new signature scheme without random oracles , 2006, Int. J. Secur. Networks.

[3]  Matthew K. Franklin,et al.  A survey of key evolving cryptosystems , 2006, Int. J. Secur. Networks.

[4]  Hua Wang,et al.  Security and privacy in RFID systems: [special issue of International Journal of Security and Networks] , 2010 .

[5]  G. Marsaglia,et al.  Fast Generation of Discrete Random Variables , 2004 .

[6]  Xinyuan Wang The loop fallacy and deterministic serialisation in tracing intrusion connections through stepping stones , 2006, Int. J. Secur. Networks.

[7]  Fei Hu,et al.  Error-resistant RFID-assisted wireless sensor networks for cardiac telehealthcare , 2009 .

[8]  Neeraj Suri,et al.  An approach to synthesise safe systems , 2006, Int. J. Secur. Networks.

[9]  Harald Niederreiter,et al.  Introduction to finite fields and their applications: List of Symbols , 1986 .

[10]  Joseph B. Evans,et al.  Wireless networking security: open issues in trust, management, interoperation and measurement , 2006, Int. J. Secur. Networks.

[11]  Yang Xiao,et al.  NIS05-4: A Lightweight Secure Solution for RFID , 2006, IEEE Globecom 2006.

[12]  G. Towl Editorial , 2012, Evidence Based Mental Health.

[13]  Donald E. Knuth The Art of Computer Programming 2 / Seminumerical Algorithms , 1971 .

[14]  Yi-Bing Lin,et al.  End-to-end security mechanisms for SMS , 2006, Int. J. Secur. Networks.

[15]  Mohan S. Kankanhalli,et al.  Building trust in peer-to-peer systems: a review , 2006, Int. J. Secur. Networks.

[16]  Hairong Qi,et al.  Load-balanced key establishment methodologies in wireless sensor networks , 2006, Int. J. Secur. Networks.

[17]  Pierre L'Ecuyer,et al.  Bad Lattice Structures for Vectors of Nonsuccessive Values Produced by Some Linear Recurrences , 1997, INFORMS J. Comput..

[18]  Yang Xiao,et al.  Security co-existence of wireless sensor networks and RFID for pervasive computing , 2008, Comput. Commun..

[19]  Shivakant Mishra,et al.  Limiting DoS attacks during multihop data delivery in wireless sensor networks , 2006, Int. J. Secur. Networks.

[20]  Lih-Yuan Deng,et al.  A system of high-dimensional, efficient, long-cycle and portable uniform random number generators , 2003, TOMC.

[21]  Yang Xiao,et al.  Robust medical ad hoc sensor networks (MASN) with wavelet-based ECG data mining , 2008, Ad Hoc Networks.

[22]  Xuemin Shen,et al.  A self-encryption authentication protocol for teleconference services , 2006, Int. J. Secur. Networks.

[23]  Aggelos Kiayias,et al.  Secure scalable group signature with dynamic joins and separable authorities , 2006, Int. J. Secur. Networks.

[24]  George Kesidis,et al.  A taxonomy of internet traceback , 2006, Int. J. Secur. Networks.

[25]  Yang Xiao,et al.  A lightweight secure protocol for wireless sensor networks , 2006, Comput. Commun..

[26]  Chik How Tan,et al.  Low-power authenticated group key agreement for heterogeneous wireless networks , 2006, Int. J. Secur. Networks.

[27]  Thomas Johansson,et al.  Three ways to mount distinguishing attacks on irregularly clocked stream ciphers , 2006, Int. J. Secur. Networks.

[28]  Lih-Yuan Deng,et al.  Efficient and portable multiple recursive generators of large order , 2005, TOMC.

[29]  Vasileios Karyotis,et al.  A novel framework for mobile attack strategy modelling and vulnerability analysis in wireless ad hoc networks , 2006, Int. J. Secur. Networks.

[30]  Mohamed G. Gouda,et al.  Vulnerability analysis of certificate graphs , 2006, Int. J. Secur. Networks.

[31]  Yang Xiao,et al.  Low-cost wireless sensor networks for remote cardiac patients monitoring applications , 2008, Wirel. Commun. Mob. Comput..

[32]  Myung J. Lee,et al.  A lightweight encryption and authentication scheme for wireless sensor networks , 2006, Int. J. Secur. Networks.

[33]  Mahalingam Ramkumar,et al.  Secure collaborations over message boards , 2006, Int. J. Secur. Networks.

[34]  Mihir Bellare,et al.  The Security of the Cipher Block Chaining Message Authentication Code , 2000, J. Comput. Syst. Sci..

[35]  Yang Xiao,et al.  Radio frequency identification: technologies, applications, and research issues , 2007, Wirel. Commun. Mob. Comput..

[36]  Yang Xiao,et al.  Security and privacy in RFID and applications in telemedicine , 2006, IEEE Commun. Mag..

[37]  Li Liu,et al.  A Virtual Password Scheme to Protect Passwords , 2008, 2008 IEEE International Conference on Communications.

[38]  Dennis K. J. Lin,et al.  Random Number Generation for the New Century , 2000 .

[39]  Yu Liu,et al.  Modelling misbehaviour in ad hoc networks: a game theoretic approach for intrusion detection , 2006, Int. J. Secur. Networks.

[40]  Yang Xiao,et al.  A Lightweight Secure Solution for RFID. , 2006 .

[41]  E. Watson Primitive Polynomials (Mod 2) , 1962 .

[42]  Yang Xiao,et al.  Error-resistant RFID-assisted wireless sensor networks for cardiac telehealthcare , 2009, Wirel. Commun. Mob. Comput..

[43]  Bo Sheng,et al.  Elliptic curve cryptography-based access control in sensor networks , 2006, Int. J. Secur. Networks.

[44]  Jamal N. Al-Karaki,et al.  Analysis of routing security-energy trade-offs in wireless sensor networks , 2006, Int. J. Secur. Networks.

[45]  W. H. Payne,et al.  Coding the Lehmer pseudo-random number generator , 1969, CACM.

[46]  Reuven R. Levary,et al.  An adaptive expert system approach for intrusion detection , 2006, Int. J. Secur. Networks.

[47]  Elisa Bertino,et al.  Workflow authorisation in mediator-free environments , 2006, Int. J. Secur. Networks.

[48]  Lih-Yuan Deng,et al.  Design and Implementation of Efficient and Portable Multiple Recursive Generators with Few Zero Coefficients , 2008 .