Comparison of Authenticated-Encryption schemes in Wireless Sensor Networks

Security is an important concern in any modern network. This also applies to Wireless Sensor Networks (WSNs), especially those used in applications that monitor sensitive information (e.g., health care applications). However, the highly constrained nature of sensors impose a difficult challenge: their reduced availability of memory, processing power and energy hinders the deployment of many modern cryptographic algorithms considered secure. For this reason, the choice of the most memory-, processing- and energy-efficient security solutions is of vital importance in WSNs. To date, several authors have developed extensive analyses comparing different encryption algorithms and key management schemes, while very little attention has been given to message authentication mechanisms. In this paper, we address this issues by identifying Authenticated Encryption with Associated Data (AEAD) schemes suitable for WSNs and by evaluating their features and performance on TelosB sensor nodes. As a result of this analysis, we identify the recommended choices depending on the characteristics of the target network.

[1]  S. Venkatesan,et al.  Role Assignment for Data Aggregation in Wireless Sensor Networks , 2007, 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07).

[2]  Christof Paar,et al.  Comparison of innovative signature algorithms for WSNs , 2008, WiSec '08.

[3]  Paulo S. L. M. Barreto,et al.  The MARVIN message authentication code and the LETTERSOUP authenticated encryption scheme , 2009, Secur. Commun. Networks.

[4]  David E. Culler,et al.  The nesC language: A holistic approach to networked embedded systems , 2003, PLDI.

[5]  Stefan Tillich,et al.  Comparing Block Cipher Modes of Operation on MICAz Sensor Nodes , 2009, 2009 17th Euromicro International Conference on Parallel, Distributed and Network-based Processing.

[6]  Fuxiang Gao,et al.  Dynamic window based multihop authentication for WSN , 2010, CCS '10.

[7]  Morris J. Dworkin,et al.  SP 800-38D. Recommendation for Block Cipher Modes of Operation: Galois/Counter Mode (GCM) and GMAC , 2007 .

[8]  Fei Hu,et al.  Security considerations in ad hoc sensor networks , 2005, Ad Hoc Networks.

[9]  Alan F. Smeaton,et al.  Security Considerations and Key Negotiation Techniques for Power Constrained Sensor Networks , 2006, Comput. J..

[10]  Ian F. Akyildiz,et al.  Wireless sensor networks: a survey , 2002, Comput. Networks.

[11]  Sencun Zhu,et al.  Predistribution and local collaboration-based group rekeying for wireless sensor networks , 2009, Ad Hoc Networks.

[12]  Paulo S. L. M. Barreto,et al.  The CURUPIRA-2 Block Cipher for Constrained Platforms: Specification and Benchmarking , 2008, PiLBA.

[13]  Dharma P. Agrawal,et al.  Ad Hoc and Sensor Networks: Theory and Applications , 2006 .

[14]  M. Luk,et al.  MiniSec: A Secure Sensor Network Communication Architecture , 2007, 2007 6th International Symposium on Information Processing in Sensor Networks.

[15]  Mihir Bellare,et al.  The EAX Mode of Operation (A Two-Pass Authenticated-Encryption Scheme Optimized for Simplicity and Efficiency) , 2004 .

[16]  David A. Wagner,et al.  TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.

[17]  Mohamed Ibnkahla,et al.  Wireless sensor networks: Applications and challenges , 2007, 2007 9th International Symposium on Signal Processing and Its Applications.

[18]  Marine Minier,et al.  Survey and Benchmark of Stream Ciphers for Wireless Sensor Networks , 2007, WISTP.

[19]  Morris J. Dworkin,et al.  SP 800-38B. Recommendation for Block Cipher Modes of Operation: the CMAC Mode for Authentication , 2005 .

[20]  Yee Wei Law,et al.  Survey and benchmark of block ciphers for wireless sensor networks , 2006, TOSN.

[21]  Phillip Rogaway,et al.  Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC , 2004, ASIACRYPT.

[22]  Morris J. Dworkin,et al.  Recommendation for Block Cipher Modes of Operation: Methods and Techniques , 2001 .

[23]  Vincent Rijmen,et al.  A New MAC Construction ALRED and a Specific Instance ALPHA-MAC , 2005, FSE.

[24]  Rong Luo,et al.  Cryptography Overhead Evaluation and Analysis for Wireless Sensor Networks , 2009, 2009 WRI International Conference on Communications and Mobile Computing.

[25]  Stefan Lucks Two-Pass Authenticated Encryption Faster Than Generic Composition , 2005, FSE.

[26]  Kyung Jun Choi,et al.  Investigation of feasible cryptographic algorithms for wireless sensor network , 2006, 2006 8th International Conference Advanced Communication Technology.

[27]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[28]  Jalel Ben-Othman,et al.  Towards a classification of energy aware MAC protocols for wireless sensor networks , 2009, Wirel. Commun. Mob. Comput..

[29]  Frank Mueller,et al.  Encryption overhead in embedded systems and sensor network nodes: modeling and analysis , 2003, CASES '03.

[30]  Margaret Martonosi,et al.  Hardware design experiences in ZebraNet , 2004, SenSys '04.

[31]  Larry Carter,et al.  New Hash Functions and Their Use in Authentication and Set Equality , 1981, J. Comput. Syst. Sci..