HLDCA-WSN: Homomorphic Lightweight Data Confidentiality Algorithm for Wireless Sensor Network

Wireless Sensor Networks (WSN) has become more and more important in many applications especially those required a high level of security such as: commercial, military and telemedicine applications. However, security in WSN suffers from several kinds of attacks (ranging between passive and active attacks). Eavesdropping attack remains the most powerful attack, since it has the capability to compromise the confidentiality of the whole packet content. In this context, several solutions and techniques have been presented in the literature, to ensure a secure transmission of packets in a large scale WSN. Unfortunately, many of these solutions failed to meet the main characteristics of WSN (limited energy consumption, low power, large bandwidth), and are considered as not efficient candidates to deal with tiny devices. For this reason, a novel homomorphic lightweight security scheme HLDCA-WSN based on dynamic permutation layer that is performed on a set of packets (denoted by generation) is proposed and discussed in this paper. HLDCA-WSN scheme overcomes passive attacks and ensures a significant reduction of computational complexity, energy cost, and communication overhead. Moreover, the dynamic property of the proposed scheme adds more robustness against traditional and physical attacks. The efficiency of the HLDCA ciphering scheme is demonstrated by an extensive security analysis and simulation results.

[1]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[2]  염흥렬,et al.  [서평]「Applied Cryptography」 , 1997 .

[3]  Matthew J. Campagna Security Bounds for the NIST Codebook-based Deterministic Random Bit Generator , 2006, IACR Cryptol. ePrint Arch..

[4]  Morris J. Dworkin,et al.  Recommendation for Block Cipher Modes of Operation: Methods and Techniques , 2001 .

[5]  Yukun Huang,et al.  Research of Efficient Security Scheme in Wireless Network , 2014 .

[6]  Ingrid Verbauwhede,et al.  Low-Cost Elliptic Curve Cryptography for Wireless Sensor Networks , 2006, ESAS.

[7]  Ronald L. Rivest,et al.  The RC5 Encryption Algorithm , 1994, FSE.

[8]  John Viega,et al.  The Security and Performance of the Galois/Counter Mode (GCM) of Operation , 2004, INDOCRYPT.

[9]  Marine Minier,et al.  Survey and Benchmark of Stream Ciphers for Wireless Sensor Networks , 2007, WISTP.

[10]  J. Rodgers,et al.  Thirteen ways to look at the correlation coefficient , 1988 .

[11]  Deborah Estrin,et al.  Packet combining in sensor networks , 2005, SenSys '05.

[12]  Christophe Clavier,et al.  Optimal Statistical Power Analysis , 2003, IACR Cryptol. ePrint Arch..

[13]  Yongtae Shin,et al.  AES Implementation and Performance Evaluation on 8-bit Microcontrollers , 2009, ArXiv.

[14]  Qun Li,et al.  Efficient Implementation of Public Key Cryptosystems on Mote Sensors (Short Paper) , 2006, ICICS.

[15]  Yunhao Liu,et al.  DPLC: Dynamic Packet Length Control in Wireless Sensor Networks , 2010, 2010 Proceedings IEEE INFOCOM.

[16]  David A. Wagner,et al.  TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.

[17]  Ding-Zhu Du,et al.  Wireless Network Security , 2009, EURASIP J. Wirel. Commun. Netw..

[18]  Hari Balakrishnan,et al.  Cross-layer wireless bit rate adaptation , 2009, SIGCOMM '09.

[19]  Joan Daemen,et al.  AES Proposal : Rijndael , 1998 .

[20]  Yunghsiang Sam Han,et al.  A pairwise key predistribution scheme for wireless sensor networks , 2005, TSEC.

[21]  Yu Hen Hu,et al.  Cycle-Efficient LFSR Implementation on Word-Based Microarchitecture , 2013, IEEE Transactions on Computers.

[22]  Hassan N. Noura,et al.  E3SN: Efficient security scheme for sensor networks , 2013, 2013 International Conference on Security and Cryptography (SECRYPT).

[23]  Hassan N. Noura,et al.  Key dependent cipher scheme for sensor networks , 2013, 2013 12th Annual Mediterranean Ad Hoc Networking Workshop (MED-HOC-NET).

[24]  M. Luk,et al.  MiniSec: A Secure Sensor Network Communication Architecture , 2007, 2007 6th International Symposium on Information Processing in Sensor Networks.

[25]  Ilya Mironov,et al.  (Not So) Random Shuffles of RC4 , 2002, IACR Cryptol. ePrint Arch..

[26]  Christine Evans-Pughe,et al.  Bzzzz zzz [ZigBee wireless standard] , 2003 .

[27]  Mihir Bellare,et al.  OCB: a block-cipher mode of operation for efficient authenticated encryption , 2001, CCS '01.

[28]  Peng Ning,et al.  2008 International Conference on Information Processing in Sensor Networks TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks ∗ , 2022 .