Butterfly Encryption Scheme for Resource-Constrained Wireless Networks †

Resource-constrained wireless networks are emerging networks such as Radio Frequency Identification (RFID) and Wireless Body Area Networks (WBAN) that might have restrictions on the available resources and the computations that can be performed. These emerging technologies are increasing in popularity, particularly in defence, anti-counterfeiting, logistics and medical applications, and in consumer applications with growing popularity of the Internet of Things. With communication over wireless channels, it is essential to focus attention on securing data. In this paper, we present an encryption scheme called Butterfly encryption scheme. We first discuss a seed update mechanism for pseudorandom number generators (PRNG), and employ this technique to generate keys and authentication parameters for resource-constrained wireless networks. Our scheme is lightweight, as in it requires less resource when implemented and offers high security through increased unpredictability, owing to continuously changing parameters. Our work focuses on accomplishing high security through simplicity and reuse. We evaluate our encryption scheme using simulation, key similarity assessment, key sequence randomness assessment, protocol analysis and security analysis.

[1]  Luigi Lo Iacono Understanding Cryptography , 2018, CCNA® Security Study Guide.

[2]  Tang Ming . Wei Lian. Si Tuo Lin Si,et al.  Cryptography and Network Security - Principles and Practice , 2015 .

[3]  Srinivas Sampalli,et al.  RFID encryption scheme featuring pseudorandom numbers and Butterfly seed generation , 2014, 2014 22nd International Conference on Software, Telecommunications and Computer Networks (SoftCOM).

[4]  Kyung Sup Kwak,et al.  Certificateless Remote Anonymous Authentication Schemes for WirelessBody Area Networks , 2014, IEEE Transactions on Parallel and Distributed Systems.

[5]  Mario Cagalj,et al.  LIRA: A new key deployment scheme for Wireless Body Area Networks , 2013, 2013 21st International Conference on Software, Telecommunications and Computer Networks - (SoftCOM 2013).

[6]  Lili Wei,et al.  A SHA-3 based RFID mutual authentication protocol and its implementation , 2013, 2013 IEEE International Conference on Signal Processing, Communication and Computing (ICSPCC 2013).

[7]  Guangyu Zhu,et al.  Symmetric key based RFID authentication protocol with a secure key-updating scheme , 2013, 2013 26th IEEE Canadian Conference on Electrical and Computer Engineering (CCECE).

[8]  Marimuthu Palaniswami,et al.  Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..

[9]  Srinivas Sampalli,et al.  A security suite for wireless body area networks , 2012, ArXiv.

[10]  Joaquin Garcia-Alfaro,et al.  Multiple-polynomial LFSR based pseudorandom number generator for EPC Gen2 RFID tags , 2011, IECON 2011 - 37th Annual Conference of the IEEE Industrial Electronics Society.

[11]  Honorio Martín,et al.  AKARI-X: A pseudorandom number generator for secure lightweight systems , 2011, 2011 IEEE 17th International On-Line Testing Symposium.

[12]  Jung-Hui Chiu,et al.  A Novel Stream Cipher with Hash Function for the RFID Device , 2011, 2011 Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.

[13]  Enrique San Millán,et al.  Cryptographically secure pseudo-random bit generator for RFID tags , 2010, 2010 International Conference for Internet Technology and Secured Transactions.

[14]  Guang Gong,et al.  A Lightweight Stream Cipher WG-7 for RFID Encryption and Authentication , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.

[15]  Yonghwan Kim,et al.  PUF-based Encryption Processor for the RFID Systems , 2010, 2010 10th IEEE International Conference on Computer and Information Technology.

[16]  Kyung Sup Kwak,et al.  Hybrid security mechanisms for wireless body area networks , 2010, 2010 Second International Conference on Ubiquitous and Future Networks (ICUFN).

[17]  Simon Heron,et al.  Encryption: Advanced Encryption Standard (AES) , 2009 .

[18]  Sudarshan K. Srinivasan,et al.  Efficient hardware implementation of a new pseudo-random bit sequence generator , 2009, 2009 IEEE International Symposium on Circuits and Systems.

[19]  Cormac J. Sreenan,et al.  A context aware wireless body area network (BAN) , 2009, 2009 3rd International Conference on Pervasive Computing Technologies for Healthcare.

[20]  Guido Bertoni,et al.  The Road from Panama to Keccak via RadioGatún , 2009, Symmetric Cryptography.

[21]  G. Hollestelle Systematic Analysis of Attacks on Security Protocols , 2005 .

[22]  Ueli Maurer,et al.  A universal statistical test for random bit generators , 1990, Journal of Cryptology.

[23]  R. Bishop On Separating Predictability and Determinism , 2003 .

[24]  D. Poulin A Rough Guide to Quantum Chaos , 2003 .

[25]  Wade Trappe,et al.  Introduction to Cryptography with Coding Theory , 2002 .

[26]  尚弘 島影 National Institute of Standards and Technologyにおける超伝導研究及び生活 , 2001 .

[27]  Elaine B. Barker,et al.  A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .

[28]  Dirk Fox,et al.  Advanced Encryption Standard (AES) , 1999, Datenschutz und Datensicherheit.

[29]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[30]  Gavin Lowe,et al.  A hierarchy of authentication specifications , 1997, Proceedings 10th Computer Security Foundations Workshop.

[31]  Manuel Blum,et al.  A Simple Unpredictable Pseudo-Random Number Generator , 1986, SIAM J. Comput..

[32]  E. Lorenz,et al.  Predictability: Does the Flap of a Butterfly’s Wings in Brazil Set off a Tornado in Texas? , 2013 .

[33]  H. S. Wolff,et al.  iRun: Horizontal and Vertical Shape of a Region-Based Graph Compression , 2022, Sensors.

[34]  E. Lorenz Deterministic nonperiodic flow , 1963 .

[35]  T. Sørensen,et al.  A method of establishing group of equal amplitude in plant sociobiology based on similarity of species content and its application to analyses of the vegetation on Danish commons , 1948 .