A novel energy-efficient encryption algorithm for secure data in WSNs
- PDF / 2,275,325 Bytes
- 24 Pages / 439.37 x 666.142 pts Page_size
- 59 Downloads / 155 Views
A novel energy‑efficient encryption algorithm for secure data in WSNs Haythem Hayouni1 · Mohamed Hamdi1 Accepted: 15 October 2020 © Springer Science+Business Media, LLC, part of Springer Nature 2020
Abstract Wireless sensor networks (WSNs) are typically deployed environments, often very hostile and without assistance. A certain level of security must be provided. However, the resource constraint is the most important characteristic of this network. Indeed, WSNs are limited in terms of calculation, CPU, battery, etc. Therefore, a solution that aims to conserve these resources is widely desired. In this paper, we focus on the problem of encryption algorithm complexity. Some of the existing encryption algorithms provide high calculation cost, require large memory and are not applicable for WSNs scenarios. Based on Feistel structure, we propose a novel ultra-lightweight encryption algorithm, named ULEA. Besides diffusion and confusion of data, ULEA assumes minor encryption rounds with simplified transformations and functions to complex the cipher. The security analysis and experimental results suggest that the ULEA algorithm is an appropriate, low storage space, energy-efficient encryption process with high security for WSNs. Keywords WSNs · Encryption algorithm · Feistel structure · Symmetric encryption
1 Introduction Wireless sensor network (WSN) [20] is a set of autonomous sensors, equipped with computing capacity, storage, power and wireless transmission, which work together to observe a phenomenon in a physical environment. The sensor nodes have generally low computing, memory and energy, access to the radio medium is the single most expensive. Wireless sensor networks are increasingly used in large systems monitoring applications in a variety of areas: the military, the environment, health, housing, etc. Sensor nodes that operate in hard to reach places, unprotected and battery recharging ability, can be subjected to many attacks. However, WSNs are * Haythem Hayouni [email protected] 1
SupCom, University of Carthage, Carthage, Tunisia
13
Vol.:(0123456789)
H. Hayouni, M. Hamdi
typically deployed in hostile environments, and so a certain security level must be provided. On the other hand, since the sensors have limited computing resources, secure data in WSNs is a challenge and the limitations of sensors must be taken into consideration. The big problem is how to implement security techniques that require significant computing resources in technology with very limited resources. The major security requirements [24] in WSNs are as follows: • Authentication: it ensures that the data is actually transmitted by the supposed
source.
• Confidentiality: it ensures that data is never disclosed to unauthorized nodes.
This means that the information provided by each sensor node is accessible only by the node to which that information is intended. • Integrity: it ensures that the received data is not altered during transit in network. In WSNs, where communication is often multi-hop, a compromise int
Data Loading...