Title :
Implementation and Analysis of New Lightweight Cryptographic Algorithm Suitable for Wireless Sensor Networks
Author :
Koo, Woo Kwon ; Lee, Hwaseong ; Kim, Yong Ho ; Lee, Dong Hoon
Author_Institution :
Korea Univ., Seoul
Abstract :
Sensor devices have critical resource constraints such as processing speed, memory size and energy supply. Especially, energy consumption affects the network lifetime so that energy efficiency is an important requirement for wireless sensor networks (WSNs). It means that it is a considerable matter to choose the energy- and memory-efficient cryptographic algorithm suitable for wireless sensor networks. Tiny Sec, de facto security architecture for wireless sensor networks, supports traditional cryptographic algorithms such as RC5 and Skipjack while the traditional cryptographic algorithms might be unsuitable for 8-bit computing devices of which wireless sensor networks consist. Accordingly, it is necessary to evaluate the traditional cryptographic algorithms and 8-bit oriented cryptographic algorithm in performance but there is no work in this area. In this paper, we consider another candidate HIGHT, designed to be proper to ubiquitous 8-bit computing devices (e.g. sensor node or RFID tag), for wireless sensor networks. After implementing new lightweight HIGHT on Mica! and analyzing the performance between HIGHT and the traditional cryptographic algorithms, we can conclude that HIGHT, outstanding in security and efficiency, is recommended for TinySec as like traditional cryptographic algorithms on TinySec. Hence, we recommend new lightweight candidate HIGHT to be added to security module in TinySec.
Keywords :
cryptography; energy consumption; software architecture; wireless sensor networks; Tiny Sec; cryptographic algorithm; energy consumption; resource constraints; security architecture; sensor devices; wireless sensor networks; Algorithm design and analysis; Computer architecture; Computer networks; Cryptography; Energy consumption; Energy efficiency; Performance analysis; Pervasive computing; RFID tags; Wireless sensor networks; WSNs; Wireless Sensor Networks; cryptographic algorithm; security;
Conference_Titel :
Information Security and Assurance, 2008. ISA 2008. International Conference on
Conference_Location :
Busan
Print_ISBN :
978-0-7695-3126-7
DOI :
10.1109/ISA.2008.53