Lightweight, Dynamic, and Flexible Cipher Scheme for Wireless and Mobile Networks

The security of Wireless and Mobile Networks (WN, and MN, respectively) is crucial for effective deployment in various areas and applications such as military and business. The existing security solutions are based on static block /stream cipher to ensure Data Confidentiality (DC). These solutions require multi-round function, and consequently a high computing complexity and energy consumption. However, WN or MN has limited resources that prevent their efficient deployment for a long period. To overcome the previous challenge, a new kind of cipher scheme based on a dynamic permutation packets cipher is presented in this paper to ensure the DC requirements with low computation complexity. Theoretical results show that the proposed algorithm has a reduced computational complexity, which can lead to reduce the energy consumption. It is equally important to note that our proposed solution could be adapted for other kinds of networks that employ packet transmission such as vehicular network.

[1]  Vincent Rijmen,et al.  The Design of Rijndael: AES - The Advanced Encryption Standard , 2002 .

[2]  Hassan N. Noura,et al.  E3SN: Efficient security scheme for sensor networks , 2013, 2013 International Conference on Security and Cryptography (SECRYPT).

[3]  Hassan N. Noura,et al.  Key dependent cipher scheme for sensor networks , 2013, 2013 12th Annual Mediterranean Ad Hoc Networking Workshop (MED-HOC-NET).

[4]  Thiemo Voigt,et al.  Security considerations for the WirelessHART protocol , 2009, 2009 IEEE Conference on Emerging Technologies & Factory Automation.

[5]  Ruby B. Lee,et al.  Efficient permutation instructions for fast software cryptography , 2001 .

[6]  Morris J. Dworkin,et al.  Recommendation for Block Cipher Modes of Operation: Methods and Techniques , 2001 .

[7]  Yongtae Shin,et al.  AES Implementation and Performance Evaluation on 8-bit Microcontrollers , 2009, ArXiv.

[8]  Christine Evans-Pughe,et al.  Bzzzz zzz [ZigBee wireless standard] , 2003 .

[9]  J. Rodgers,et al.  Thirteen ways to look at the correlation coefficient , 1988 .

[10]  David E. Culler,et al.  SPINS: Security Protocols for Sensor Networks , 2001, MobiCom '01.

[11]  David A. Wagner,et al.  TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.

[12]  Ronald L. Rivest,et al.  The RC5 Encryption Algorithm , 1994, FSE.

[13]  Yunghsiang Sam Han,et al.  A pairwise key predistribution scheme for wireless sensor networks , 2005, TSEC.

[14]  Yukun Huang,et al.  Research of Efficient Security Scheme in Wireless Network , 2014 .

[15]  Vincent Rijmen,et al.  The Design of Rijndael , 2002, Information Security and Cryptography.