• DocumentCode
    3370661
  • Title

    Implementation and Analysis of New Lightweight Cryptographic Algorithm Suitable for Wireless Sensor Networks

  • Author

    Koo, Woo Kwon ; Lee, Hwaseong ; Kim, Yong Ho ; Lee, Dong Hoon

  • Author_Institution
    Korea Univ., Seoul
  • fYear
    2008
  • fDate
    24-26 April 2008
  • Firstpage
    73
  • Lastpage
    76
  • Abstract
    Sensor devices have critical resource constraints such as processing speed, memory size and energy supply. Especially, energy consumption affects the network lifetime so that energy efficiency is an important requirement for wireless sensor networks (WSNs). It means that it is a considerable matter to choose the energy- and memory-efficient cryptographic algorithm suitable for wireless sensor networks. Tiny Sec, de facto security architecture for wireless sensor networks, supports traditional cryptographic algorithms such as RC5 and Skipjack while the traditional cryptographic algorithms might be unsuitable for 8-bit computing devices of which wireless sensor networks consist. Accordingly, it is necessary to evaluate the traditional cryptographic algorithms and 8-bit oriented cryptographic algorithm in performance but there is no work in this area. In this paper, we consider another candidate HIGHT, designed to be proper to ubiquitous 8-bit computing devices (e.g. sensor node or RFID tag), for wireless sensor networks. After implementing new lightweight HIGHT on Mica! and analyzing the performance between HIGHT and the traditional cryptographic algorithms, we can conclude that HIGHT, outstanding in security and efficiency, is recommended for TinySec as like traditional cryptographic algorithms on TinySec. Hence, we recommend new lightweight candidate HIGHT to be added to security module in TinySec.
  • Keywords
    cryptography; energy consumption; software architecture; wireless sensor networks; Tiny Sec; cryptographic algorithm; energy consumption; resource constraints; security architecture; sensor devices; wireless sensor networks; Algorithm design and analysis; Computer architecture; Computer networks; Cryptography; Energy consumption; Energy efficiency; Performance analysis; Pervasive computing; RFID tags; Wireless sensor networks; WSNs; Wireless Sensor Networks; cryptographic algorithm; security;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Information Security and Assurance, 2008. ISA 2008. International Conference on
  • Conference_Location
    Busan
  • Print_ISBN
    978-0-7695-3126-7
  • Type

    conf

  • DOI
    10.1109/ISA.2008.53
  • Filename
    4511537