Abstract
WSN are exposed to variety of attacks as other networks. Quality and complexity of attacks are rising day by day. The proposed work aim at showing how complexity of modern attacks is growing accordingly, converging to usher resistant methods also to rise. Limitations in computation and battery power in sensor nodes gives constrain to diversity of security mechanisms.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Mayank Saraogi. Security in wireless sensor networks. Computer and network security. http://www.cs.utk.edu/~saraogi/594paper.pdf (2006)
Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: Attacks and countermeasures. In: Proceedings of the 1st IEEE International Workshop on Sensor Network Protocols and Applications, pp. 113–127 (2003)
Rasool, R.U., Guo, Q.P.: Security in Wireless Networks and Users-Grid. Course Work, Wuhan University of Technology (2004)
Mauw, S., van Vessem, I., Bos, B.: Forward secure communication in wireless sensor networks. In: Third International Conference Security in Pervasive Computing, pp. 32–42 (2006)
Hu, F., Ziobro, J., Tillett, J., Sharma, N.K.: Secure wireless sensor networks: problems and solutions. J. Syst. Cyber. Inf. 1(9) (2004)
Kumar, S., Valdez, R., Gomez, O., Bose, S.: Survivability evaluation of wireless sensor network under DDoS attack. In: Proceedings of the International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies, p. 82 (2006)
Bilstrup, U., Sjoberg, K., Svensson, B., Wiberg, P.A.: Capacity limitations in wireless sensor networks. In: Proceedings of the 9th IEEE International Conference on Emerging Technologies and Factory Automation, vol. 1, pp. 529–536 (2003)
Moldovyan, N.A., Moldovyan, A.A., Goots, N.D.: Variable bit permutations: linear characteristics and pure VPB-based cipher. Comput. Sci. J. Moldova 13(1), 84 (2005)
Moldovyan, N.A., Moldovyanu, P.A., Summerville, D.H.: On software implementation of fast DDP-based ciphers. Int. J. Netw. Secur. 4(1), 81–89 (2007)
Moldovyan, N.A., Moldovyan, A.A.: Data-driven ciphers for fast telecommunication systems, p. 202. Auerbach Publications. Taylor & Francis Group, New York, (2007)
Schneier, B.: Applied Cryptography: Protocols, Algorithms, and Source Code, 2nd edn, p. 758. Wiley, New York (1996)
Biham, E., Shamir, A.: Differential cryptanalysis of the full 16-round DES. In: Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology, pp. 487–496 (1992)
Matsui, M.: Linear cryptanalysis method for DES cipher. Workshop on the Theory and Application of Cryptographic Techniques on Advances in Cryptology, pp. 386–397 (1994)
Levis, P.: Sensor network protocol design and implementation. Technical Report CS268, UC, Berkeley (2005)
Hill, J., Szewczyk, R., Woo, A., Hollar, S., Culler, D., Pister, K.: Proceedings of the Ninth International Conference on Architectural Support for Programming Languages and Operating Systems, vol. 35(11), pp. 93–104 (2000)
Feistel, H.: Cryptography and computer privacy. Sci. Am. 228(5), 15–23 (1973)
Net and Electronic Frontier Foundations (EFF). RSA data security: RSA code-breaking contest again won by distributed. http://www.rsa.com/pressbox/html/990119-1.htm (1999)
Bodrov, A.V., Moldovyan, A.A., Moldovyanu, P.A.: DDP-based ciphers: differential analysis of SPECTR-H64. Comput. Sci. J. Moldova 13(3), 268–291 (2005)
Moldovyan, N.A.: Fast DDP-based ciphers: design and differential analysis of Cobra-H64. Comput. Sci. J. Moldova 11(3), 292–315 (2003)
Lu, J., Lee, C., Kim, J.: Related-key attacks on the full-round Cobra-F64a and Cobra-F64b. In: Proceedings of the Fifth Conference on Security and Cryptography for Networks, vol. 4116, pp. 95–110 (2006)
Goots, N.D., Moldovyan, A.A., Moldovyan, N.A.: Fast encryption algorithm SPECTR-H64. In: Proceedings of the International Workshop on Information Assurance in Computer Networks: Methods, Models, and Architectures for Network Security, pp. 275–286 (2001)
Keliher, L.: Toward provable security against differential and linear cryptanalysis for Camellia and related Ciphers. Int. J. Netw. Secur. 5(2), 167–175 (2007)
Rudolf, D.: Optimized differential cryptanalysis of the data encryption standard. Department of Computer Science, University of Saskatchewan. http://www.cs.usask.ca/~dtr467/400/final/ (2001)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Oreku, G.S., Pazynyuk, T. (2016). Improved Feistel-Based Ciphers for Wireless Sensor Network Security. In: Security in Wireless Sensor Networks. Risk Engineering. Springer, Cham. https://doi.org/10.1007/978-3-319-21269-2_4
Download citation
DOI: https://doi.org/10.1007/978-3-319-21269-2_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-21268-5
Online ISBN: 978-3-319-21269-2
eBook Packages: EngineeringEngineering (R0)