Skip to main content

Lightweight, Dynamic, and Flexible Cipher Scheme for Wireless and Mobile Networks

  • Conference paper
  • First Online:
Book cover Ad Hoc Networks (ADHOCNETS 2015)

Abstract

The security of Wireless and Mobile Networks (WN, and MN, respectively) is crucial for effective deployment in various areas and applications such as military and business. The existing security solutions are based on static block /stream cipher to ensure Data Confidentiality (DC). These solutions require multi-round function, and consequently a high computing complexity and energy consumption. However, WN or MN has limited resources that prevent their efficient deployment for a long period. To overcome the previous challenge, a new kind of cipher scheme based on a dynamic permutation packets cipher is presented in this paper to ensure the DC requirements with low computation complexity. Theoretical results show that the proposed algorithm has a reduced computational complexity, which can lead to reduce the energy consumption. It is equally important to note that our proposed solution could be adapted for other kinds of networks that employ packet transmission such as vehicular network.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Huang, Y.: Research of efficient security scheme in wireless network. In: Liu, X., Ye, Y. (eds.) Proceedings of the 9th International Symposium on Linear Drives for Industry Applications, volume 4. LNEE, vol. 273, pp. 717–724. Springer, Heidelberg (2014)

    Chapter  Google Scholar 

  2. Karygiannis, T., Owens, L.: Wireless network security. In: NIST Special Publication, vol. 800, p. 48 (2002)

    Google Scholar 

  3. Daemen, J., Rijmen, V.: The Design of Rijndael: AES - The Advanced Encryption Standard. Springer, Heidelberg (2002)

    Book  MATH  Google Scholar 

  4. Dworkin, M., Dworkin, M., Gallagher, P.D., Director Nist Special Publication -f : Recommendation for block cipher modes of operation: Methods and techniques (2001)

    Google Scholar 

  5. Lee, H., Lee, K., Shin, Y.: Aes implementation and performance evaluation on 8-bit microcontrollers. CoRR, abs/0911.0482 (2009)

    Google Scholar 

  6. Evans-Pughe, C.: Bzzzz zzz [ZigBee wireless standard]. IEE Review 49(3), 28–31 (2003)

    Article  Google Scholar 

  7. Raza, S., Slabbert, A., Voigt, T., Landernäs, K.: Security considerations for the wireless hart protocol. In: Proceedings of the 14th IEEE International Conference on Emerging Technologies & Factory Automation, ETFA 2009, pp. 242–249. IEEE Press, Piscataway (2009)

    Google Scholar 

  8. Perrig, A., Szewczyk, R., Tygar, J.D., Wen, V., Culler, D.E.: Spins: security protocols for sensor networks. Wirel. Netw. 8(5), 521–534 (2002)

    Article  MATH  Google Scholar 

  9. Karlof, C., Sastry, N., Wagner, D.: Tinysec: a link layer security architecture for wireless sensor networks. In: Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems, SenSys 2004, pp. 162–175. ACM, New York (2004)

    Google Scholar 

  10. Karlof, C., Sastry, N., Wagner, D.: Tinysec: a link layer security architecture for wireless sensor networks. In: ACM, pp. 162–175 (2004)

    Google Scholar 

  11. Skipjack, N.: KEA algorithm specifications (1998)

    Google Scholar 

  12. Rivest, R.L.: The rc5 encryption algorithm. In: Preneel, B. (ed.) FSE 1994. LNCS, vol. 1008, pp. 86–96. Springer, Heidelberg (1995)

    Chapter  Google Scholar 

  13. Li, T., Wu, H., Wang, X., Bao, F.: SenSec design. Institue for InfoComm Research, Tech. Rep. TR-I2R-v1, vol. 1 (2005)

    Google Scholar 

  14. Du, W., Deng, J., Han, Y.S., Varshney, P.K., Katz, J., Khalili, A.: A pairwise key predistribution scheme for wireless sensor networks. ACM Transactions on Information and System Security (TISSEC) 8(2), 228–258 (2005)

    Article  Google Scholar 

  15. Noura, H., Martin, S., Agha, K.A.: E3sn - efficient security scheme for sensor networks. In: SECRYPT, pp. 615–621 (2013)

    Google Scholar 

  16. Noura, H., Martin, S., AI Agha, K., Grote, W.: Key dependent cipher scheme for sensor networks. In: 2013 12th Annual Mediterranean Hoc Networking Workshop (MED-HOC-NET), pp. 148–154, June 2013

    Google Scholar 

  17. Lee, R.B., Shi, Z., Yang, X.: Cryptography efficient permutation instructions for fast software. IEEE Micro 21(6), 56–69 (2001)

    Article  Google Scholar 

  18. Campagna, M.J.: Security bounds for the nist codebook-based deterministic random bit generator (2006), matthew.campagna@pb.com 13453 received November 1, 2006. http://eprint.iacr.org/2006/379

  19. Thirteen Ways to Look at the Correlation Coefficient. The American Statistician 42(1), 59–66 (1988)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Noura, H., Couroussé, D. (2015). Lightweight, Dynamic, and Flexible Cipher Scheme for Wireless and Mobile Networks. In: Mitton, N., Kantarci, M., Gallais, A., Papavassiliou, S. (eds) Ad Hoc Networks. ADHOCNETS 2015. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 155. Springer, Cham. https://doi.org/10.1007/978-3-319-25067-0_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-25067-0_18

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-25066-3

  • Online ISBN: 978-3-319-25067-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics