Skip to main content

A Comparative Analysis of HC-128 and Rabbit Encryption Schemes for Pervasive Computing in WSN Environment

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 5576))

Abstract

Confidentiality, integrity and availability (CIA) are the three basic requirements for an encryption mechanism utilized in any security architecture. Implementation of such a comprehensive security framework for pervasive computing environment, specifically in wireless sensor networks (WSN), is not feasible in the context of scarce resource availability and its efficient utilization. Application of stream ciphers for conventional security applications has proved to be proficient in terms of efficient energy and memory consumption. This paper presents WSN-specific NesC based implementations of two stream ciphers selected from the eSTREAM project, namely HC-128 and Rabbit. HC-128 and Rabbit have both qualified for the final portfolio phase of the eSTREAM project but their suitability for WSNs needs to be justified in a totally different context. If the two stream ciphers manage to adhere to the WSN-specific requirements and perform efficiently under these requirements only then the scheme/s can be classified as suitable. This paper tends to test the suitability of HC-128 and Rabbit for WSN-specific environment and evaluates the schemes in terms of memory usage, time consumption and energy utilization. The aim of this study is to present either one of the two schemes as an efficient solution for pervasive computing.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Meiser, G., Eisenbarth, T., Lemke-Rust, K., Paar, C.: Efficient implementation of estream ciphers on 8-bit avr microcontrollers. In: Industrial Embedded systems, 2008. SIES 2008, pp. 58–66 (2008)

    Google Scholar 

  2. Eisenbarth, T., Kumar, S., Paar, C., Poschmann, A., Uhsadel, L.: A survey of lightweight-cryptography implementations. IEEE Design and Test of Computers 24(6), 522–533 (2007)

    Article  Google Scholar 

  3. Fournel, N., Minier, M., Ubeda, S.: Survey and benchmark of stream ciphers for wireless sensor networks. In: Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems, pp. 202–214 (2007)

    Google Scholar 

  4. Ekdahl, P., Johansson, T.: A new version of the stream cipher snow. In: Nyberg, K., Heys, H.M. (eds.) SAC 2002. LNCS, vol. 2595, pp. 47–61. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  5. Lim, S.Y., Pu, C.C., Lim, H.T., Lee, H.J.: Dragon-MAC: Securing Wireless Sensor Networks with Authenticated Encryption, http://eprint.iacr.org/2007/204.pdf

  6. The eSTREAM Project, http://www.ecrypt.eu.org/stream/

  7. Stream cipher From Wikipedia, the free encyclopedia, http://en.wikipedia.org/wiki/Stream_cipher

  8. Wu, H.: The Stream Cipher HC-128. ECRYPT Stream Cipher Project Report 2005/001 (2005)

    Google Scholar 

  9. Boesgaard, M., Vesterager, M., Christensen, T., Zenner, E.: The Stream Cipher Rabbit. eSTREAM, ECRYPT Stream Cipher Project Report 2005/001 (2005)

    Google Scholar 

  10. Gay, D., Levis, P., Culler, D., Brewer, E.: nesC 1.1 Language Reference Manual (May 2003), http://www.tinyos.net/tinyos-1.x/doc/nesc/ref.pdf

  11. Easwaran, A.: TinyOS: Operating System for Sensor Networks., CIS 640: Embedded Systems Seminar, Spring, University of Pennsylvania (Spring 2004)

    Google Scholar 

  12. Crossbow Technology Inc., Processor/Radio Modules, http://www.xbow.com , http://www.xbow.com

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kausar, F., Naureen, A. (2009). A Comparative Analysis of HC-128 and Rabbit Encryption Schemes for Pervasive Computing in WSN Environment. In: Park, J.H., Chen, HH., Atiquzzaman, M., Lee, C., Kim, Th., Yeo, SS. (eds) Advances in Information Security and Assurance. ISA 2009. Lecture Notes in Computer Science, vol 5576. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-02617-1_69

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-02617-1_69

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-02616-4

  • Online ISBN: 978-3-642-02617-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics