Performance Evaluation of Block Ciphers for Wireless Sensor Networks

被引:16
作者
Biswas, Kamanashis [1 ]
Muthukkumarasamy, Vallipuram [1 ]
Wu, Xin-Wen [1 ]
Singh, Kalvinder [2 ]
机构
[1] Griffith Univ, Sch ICT, Gold Coast, Australia
[2] IBM Corp, Australia Dev Lab, Southport, Qld, Australia
来源
ADVANCED COMPUTING AND COMMUNICATION TECHNOLOGIES | 2016年 / 452卷
关键词
Block ciphers; Memory-and-energy-efficiency; Operational cost; Performance evaluation; Wireless sensor networks; CRYPTANALYSIS;
D O I
10.1007/978-981-10-1023-1_44
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Security is one of the major concerns in many Wireless Sensor Network (WSN) applications. A number of cryptographic algorithms have been developed to provide security services in WSNs. However, selecting an energy-efficient and lightweight cipher is a challenging task due to resource constrained nature of sensor nodes. Systematic evaluation of cryptographic algorithms is, therefore, necessary to provide a good understanding of the trade-off between security performance and operational cost. In this paper, we have examined five block ciphers: Skipjack, Corrected Block Tiny Encryption Algorithm (XXTEA), RC5, Advanced Encryption Standard (AES), and Chaotic-Map and Genetic-Operations based Encryption Algorithm (CGEA). The performance of these ciphers is evaluated on Arduino Pro and Mica2 sensor motes. Then the memory usage, operation time, and computational cost are compared. Finally, some recommendations are provided on evaluated block ciphers and implementation platforms.
引用
收藏
页码:443 / 452
页数:10
相关论文
共 21 条
[1]  
[Anonymous], MICA2 WIR MEAS SYST
[2]  
Antonopoulos C. P., 2012, 2012 IEEE 8th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob 2012), P799, DOI 10.1109/WiMOB.2012.6379167
[3]  
Arduino Inc, ARD PRO
[4]  
Biham E, 2005, J CRYPTOL, V18, P291, DOI [10.1007/s00145-005-0129-3, 10.1007/S00145-005-0129-3]
[5]  
Biryukov A, 1998, LECT NOTES COMPUT SC, V1403, P85, DOI 10.1007/BFb0054119
[6]  
Biswas Karnika, 2014, 2014 9th International Conference on Industrial and Information Systems (ICIIS), P1, DOI 10.1109/ICIINFS.2014.7036582
[7]  
Biswas K., 2013, 8 IEEE ISSNIP MELB, P237
[8]   An Encryption Scheme Using Chaotic Map and Genetic Operations for Wireless Sensor Networks [J].
Biswas, Kamanashis ;
Muthukkumarasamy, Vallipuram ;
Singh, Kalvinder .
IEEE SENSORS JOURNAL, 2015, 15 (05) :2801-2809
[9]  
Biswas K, 2014, LECT NOTES COMPUT SC, V8314, P499, DOI 10.1007/978-3-642-45249-9_33
[10]  
Bogdanov A, 2011, LECT NOTES COMPUT SC, V7073, P344, DOI 10.1007/978-3-642-25385-0_19