Skip to main content

Improved Feistel-Based Ciphers for Wireless Sensor Network Security

  • Chapter
  • First Online:
Security in Wireless Sensor Networks

Part of the book series: Risk Engineering ((RISK))

  • 1412 Accesses

Abstract

WSN are exposed to variety of attacks as other networks. Quality and complexity of attacks are rising day by day. The proposed work aim at showing how complexity of modern attacks is growing accordingly, converging to usher resistant methods also to rise. Limitations in computation and battery power in sensor nodes gives constrain to diversity of security mechanisms.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Mayank Saraogi. Security in wireless sensor networks. Computer and network security. http://www.cs.utk.edu/~saraogi/594paper.pdf (2006)

  2. Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: Attacks and countermeasures. In: Proceedings of the 1st IEEE International Workshop on Sensor Network Protocols and Applications, pp. 113–127 (2003)

    Google Scholar 

  3. Rasool, R.U., Guo, Q.P.: Security in Wireless Networks and Users-Grid. Course Work, Wuhan University of Technology (2004)

    Google Scholar 

  4. Mauw, S., van Vessem, I., Bos, B.: Forward secure communication in wireless sensor networks. In: Third International Conference Security in Pervasive Computing, pp. 32–42 (2006)

    Google Scholar 

  5. Hu, F., Ziobro, J., Tillett, J., Sharma, N.K.: Secure wireless sensor networks: problems and solutions. J. Syst. Cyber. Inf. 1(9) (2004)

    Google Scholar 

  6. Kumar, S., Valdez, R., Gomez, O., Bose, S.: Survivability evaluation of wireless sensor network under DDoS attack. In: Proceedings of the International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies, p. 82 (2006)

    Google Scholar 

  7. Bilstrup, U., Sjoberg, K., Svensson, B., Wiberg, P.A.: Capacity limitations in wireless sensor networks. In: Proceedings of the 9th IEEE International Conference on Emerging Technologies and Factory Automation, vol. 1, pp. 529–536 (2003)

    Google Scholar 

  8. Moldovyan, N.A., Moldovyan, A.A., Goots, N.D.: Variable bit permutations: linear characteristics and pure VPB-based cipher. Comput. Sci. J. Moldova 13(1), 84 (2005)

    MATH  MathSciNet  Google Scholar 

  9. Moldovyan, N.A., Moldovyanu, P.A., Summerville, D.H.: On software implementation of fast DDP-based ciphers. Int. J. Netw. Secur. 4(1), 81–89 (2007)

    Google Scholar 

  10. Moldovyan, N.A., Moldovyan, A.A.: Data-driven ciphers for fast telecommunication systems, p. 202. Auerbach Publications. Taylor & Francis Group, New York, (2007)

    Google Scholar 

  11. Schneier, B.: Applied Cryptography: Protocols, Algorithms, and Source Code, 2nd edn, p. 758. Wiley, New York (1996)

    Google Scholar 

  12. Biham, E., Shamir, A.: Differential cryptanalysis of the full 16-round DES. In: Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology, pp. 487–496 (1992)

    Google Scholar 

  13. Matsui, M.: Linear cryptanalysis method for DES cipher. Workshop on the Theory and Application of Cryptographic Techniques on Advances in Cryptology, pp. 386–397 (1994)

    Google Scholar 

  14. Levis, P.: Sensor network protocol design and implementation. Technical Report CS268, UC, Berkeley (2005)

    Google Scholar 

  15. Hill, J., Szewczyk, R., Woo, A., Hollar, S., Culler, D., Pister, K.: Proceedings of the Ninth International Conference on Architectural Support for Programming Languages and Operating Systems, vol. 35(11), pp. 93–104 (2000)

    Google Scholar 

  16. Feistel, H.: Cryptography and computer privacy. Sci. Am. 228(5), 15–23 (1973)

    Article  Google Scholar 

  17. Net and Electronic Frontier Foundations (EFF). RSA data security: RSA code-breaking contest again won by distributed. http://www.rsa.com/pressbox/html/990119-1.htm (1999)

  18. Bodrov, A.V., Moldovyan, A.A., Moldovyanu, P.A.: DDP-based ciphers: differential analysis of SPECTR-H64. Comput. Sci. J. Moldova 13(3), 268–291 (2005)

    MATH  MathSciNet  Google Scholar 

  19. Moldovyan, N.A.: Fast DDP-based ciphers: design and differential analysis of Cobra-H64. Comput. Sci. J. Moldova 11(3), 292–315 (2003)

    MATH  MathSciNet  Google Scholar 

  20. Lu, J., Lee, C., Kim, J.: Related-key attacks on the full-round Cobra-F64a and Cobra-F64b. In: Proceedings of the Fifth Conference on Security and Cryptography for Networks, vol. 4116, pp. 95–110 (2006)

    Google Scholar 

  21. Goots, N.D., Moldovyan, A.A., Moldovyan, N.A.: Fast encryption algorithm SPECTR-H64. In: Proceedings of the International Workshop on Information Assurance in Computer Networks: Methods, Models, and Architectures for Network Security, pp. 275–286 (2001)

    Google Scholar 

  22. Keliher, L.: Toward provable security against differential and linear cryptanalysis for Camellia and related Ciphers. Int. J. Netw. Secur. 5(2), 167–175 (2007)

    Google Scholar 

  23. Rudolf, D.: Optimized differential cryptanalysis of the data encryption standard. Department of Computer Science, University of Saskatchewan. http://www.cs.usask.ca/~dtr467/400/final/ (2001)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to George S. Oreku .

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Oreku, G.S., Pazynyuk, T. (2016). Improved Feistel-Based Ciphers for Wireless Sensor Network Security. In: Security in Wireless Sensor Networks. Risk Engineering. Springer, Cham. https://doi.org/10.1007/978-3-319-21269-2_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-21269-2_4

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-21268-5

  • Online ISBN: 978-3-319-21269-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics