DocumentCode
3370661
Title
Implementation and Analysis of New Lightweight Cryptographic Algorithm Suitable for Wireless Sensor Networks
Author
Koo, Woo Kwon ; Lee, Hwaseong ; Kim, Yong Ho ; Lee, Dong Hoon
Author_Institution
Korea Univ., Seoul
fYear
2008
fDate
24-26 April 2008
Firstpage
73
Lastpage
76
Abstract
Sensor devices have critical resource constraints such as processing speed, memory size and energy supply. Especially, energy consumption affects the network lifetime so that energy efficiency is an important requirement for wireless sensor networks (WSNs). It means that it is a considerable matter to choose the energy- and memory-efficient cryptographic algorithm suitable for wireless sensor networks. Tiny Sec, de facto security architecture for wireless sensor networks, supports traditional cryptographic algorithms such as RC5 and Skipjack while the traditional cryptographic algorithms might be unsuitable for 8-bit computing devices of which wireless sensor networks consist. Accordingly, it is necessary to evaluate the traditional cryptographic algorithms and 8-bit oriented cryptographic algorithm in performance but there is no work in this area. In this paper, we consider another candidate HIGHT, designed to be proper to ubiquitous 8-bit computing devices (e.g. sensor node or RFID tag), for wireless sensor networks. After implementing new lightweight HIGHT on Mica! and analyzing the performance between HIGHT and the traditional cryptographic algorithms, we can conclude that HIGHT, outstanding in security and efficiency, is recommended for TinySec as like traditional cryptographic algorithms on TinySec. Hence, we recommend new lightweight candidate HIGHT to be added to security module in TinySec.
Keywords
cryptography; energy consumption; software architecture; wireless sensor networks; Tiny Sec; cryptographic algorithm; energy consumption; resource constraints; security architecture; sensor devices; wireless sensor networks; Algorithm design and analysis; Computer architecture; Computer networks; Cryptography; Energy consumption; Energy efficiency; Performance analysis; Pervasive computing; RFID tags; Wireless sensor networks; WSNs; Wireless Sensor Networks; cryptographic algorithm; security;
fLanguage
English
Publisher
ieee
Conference_Titel
Information Security and Assurance, 2008. ISA 2008. International Conference on
Conference_Location
Busan
Print_ISBN
978-0-7695-3126-7
Type
conf
DOI
10.1109/ISA.2008.53
Filename
4511537
Link To Document