Improved Feistel-based ciphers for wireless sensor network security

被引:5
|
作者
Pazynyuk, Tamara [1 ]
Li, Jian-zhong [1 ]
Oreku, George S. [1 ]
机构
[1] Harbin Inst Technol, Dept Comp Sci & Engn, Harbin 150006, Peoples R China
来源
关键词
security; cipher; wireless sensor network (WSN); Feistel scheme;
D O I
10.1631/jzus.A0720108
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Wireless sensor networks (WSNs) are exposed to a variety of attacks. The quality and complexity of attacks are rising day by day. The proposed work aims at showing how the complexity of modern attacks is growing accordingly, leading to a similar rise in methods of resistance. Limitations in computational and battery power in sensor nodes are constraints on the diversity of security mechanisms. We must apply only suitable mechanisms to WSN where our approach was motivated by the application of an improved Feistel scheme. The modified accelerated-cipher design uses data-dependent permutations, and can be used for fast hardware, firmware, software and WSN encryption systems. The approach presented showed that ciphers using this approach are less likely to suffer intrusion of differential cryptanalysis than currently used popular WSN ciphers like DES, Camellia and so on.
引用
收藏
页码:1111 / 1117
页数:7
相关论文
共 50 条
  • [21] Message-Recovery Attacks on Feistel-Based Format Preserving Encryption
    Bellare, Mihir
    Viet Tung Hoang
    Tessaro, Stefano
    CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 444 - 455
  • [22] Security technology of a wireless sensor network based on chaotic encryption
    Hu, Yuxiang
    ENERGY SCIENCE AND APPLIED TECHNOLOGY (ESAT 2016), 2016, : 623 - 627
  • [23] The Smart Home Security System Based on Wireless Sensor Network
    Hu, Yu
    Zhou, Tao
    ADVANCED RESEARCH ON INDUSTRY, INFORMATION SYSTEMS AND MATERIAL ENGINEERING, PTS 1-7, 2011, 204-210 : 1490 - 1493
  • [24] Security architecture based on immunity principle for wireless sensor network
    Li, Yu-Ying
    Dong, Xiao-Mei
    Li, Xiao-Hua
    Dongbei Daxue Xuebao/Journal of Northeastern University, 2010, 31 (SUPPL. 2): : 197 - 200
  • [25] Intelligent Security System based on Wireless Sensor Network Technology
    Liu Shanshan
    Wang Peng
    Wang Changyong
    Chang Qiang
    2012 FOURTH INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY (MINES 2012), 2012, : 157 - 159
  • [26] Security architectures in wireless sensor network
    Bhasin V.
    Kumar S.
    Saxena P.C.
    Katti C.P.
    International Journal of Information Technology, 2020, 12 (1) : 261 - 272
  • [27] Security and application of wireless sensor network
    Zhang Huanan
    Xing Suping
    Wang Jiannan
    PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE OF INFORMATION AND COMMUNICATION TECHNOLOGY, 2021, 183 : 486 - 492
  • [28] Evolution of Wireless Sensor Network Security
    Yang Xiaomei
    Ma Ke
    2016 WORLD AUTOMATION CONGRESS (WAC), 2016,
  • [29] An Security Algorithm for Wireless Sensor Network
    Jin Huting
    2011 INTERNATIONAL CONFERENCE ON MACHINE INTELLIGENCE (ICMI 2011), PT 1, 2011, 3 : 96 - 101
  • [30] Security Issues in Wireless Sensor Network
    Saqib, Malik Najmus
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2020, 20 (07): : 39 - 44