DocumentCode :
594622
Title :
Linear cryptanalysis of a survivable data transmission mechanism for sensor networks
Author :
Ruiping Ma ; Liudong Xing ; Michel, H.E. ; Vokkarane, Vinod M.
Author_Institution :
Coll. of Eng., Univ. of Massachusetts, Dartmouth, MA, USA
fYear :
2012
fDate :
13-15 Nov. 2012
Firstpage :
562
Lastpage :
567
Abstract :
Wireless sensor networks (WSN) are being used in a wide range of application areas, such as national security, attack and disaster preparation and response, military surveillance, and medical care. All these applications require a certain level of reliability and security during data transmission. Data loss or corruption in WSN may be due to hardware failures, wireless channel noises, or malicious attacks. To overcome all these inevitable factors, we have recently presented a selective hybrid cipher (SHC) based algorithm that integrates selective encryption and forward error correction codes for achieving simultaneously secure and reliable data transmission in resource-constrained WSN. In this work, we implement an instance of the SHC-based data transmission mechanism using AES and Reed-Solomon codes, and analyze its security property using the linear cryptanalysis (LC) technique. The LC analysis results of the SHC-based algorithm are compared with those of the traditional DES and AES algorithms. Comparison results show that the SHC design has inherent LC attack resistance and is stronger than DES. The results also show that the proposed SHC-based mechanism can provide security-level that is comparable to AES with the improvement in computational complexity and reduction in energy consumption.
Keywords :
Reed-Solomon codes; computational complexity; cryptography; energy consumption; error correction codes; forward error correction; telecommunication security; wireless sensor networks; AES algorithms; DES algorithms; LC attack resistance; Reed-Solomon codes; SHC design; WSN; computational complexity; encryption; energy consumption; forward error correction codes; hardware failures; linear cryptanalysis; malicious attacks; selective hybrid cipher based algorithm; survivable data transmission mechanism; wireless channel noises; wireless sensor networks; Ciphers; Encryption; Equations; Reliability; Wireless sensor networks; linear cryptanalysis (LC); reliability; security; selective hybrid cipher (SHC); wireless sensor network (WSN);
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Homeland Security (HST), 2012 IEEE Conference on Technologies for
Conference_Location :
Waltham, MA
Print_ISBN :
978-1-4673-2708-4
Type :
conf
DOI :
10.1109/THS.2012.6459910
Filename :
6459910
Link To Document :
بازگشت