53 research outputs found

    Efficient and Secure Chaotic S-Box for Wireless Sensor Network

    Get PDF
    International audienceInformation security using chaotic dynamics is a novel topic in the wireless sensor network (WSN) research field. After surveying analog and digital chaotic security systems, we give a state of the art of chaotic S-Box design. The substitution tables are nonlinear maps that strengthen and enhance block crypto-systems. This paper deals with the design of new dynamic chaotic S-Boxes suitable for implementation on wireless sensor nodes. Our proposed schemes are classified into two categories: S-Box based on discrete chaotic map with floating point arithmetic (cascading piecewise linear chaotic map and a three-dimensional map) and S-Box based on discrete chaotic map with fixed-point arithmetic (using discretized Lorenz map and logistic–tent map). The security analysis and implementation process on WSN are discussed. The proposed methods satisfy Good S-Box design criteria and exceed the performance of Advanced Encryption Standard static S-Box in some cases. The energy consumption of different proposals and existing chaotic S-Box designs are investigated via a platform simulator and a real WSN testbed equipped with TI MSP430f1611 micro-controller. The simulations and the experimental results show that our proposed S-Box design with fixed-point arithmetic Lorenz map has the lowest energy-consuming profile compared with the other studied and proposed S-Box design

    DAR Model: A Novel Symmetric Key Enabled Security architecture for reliable data transfer in Wireless Sensor Networks

    Get PDF
    Security is an indispensable aspect in every transaction happening in the network transmissions. Wireless Sensor Networks are pretty vulnerable to the security attacks. Hence a highly efficient architectural model is very much essential in designing the sensor networks. Cryptographic algorithms play a vital role in providing encryption and decryption to the data being transmitted consequently with which security is offered in an elegant manner. In this paper, a reliable design comprising three pioneering algorithms enabled with symmetric key is architected for secure communication in wireless sensor networks from a node to the base station. The design involves two phases. In the former phase two algorithms which are effective in all perspectives are used for data transmission from node to cluster head and in the latter phase another proficient algorithm is used for communication between cluster head to base station. The three algorithms used are Data Encryption Standard (DES), Advanced Encryption Standard (AES) and RC4. Both block and stream cipher algorithms are used to fine tune the performance; and in addition, the data has been compressed with unprecedented techniques to reduce the burden on encryption. This led to an amazing performance in terms of security parameters

    Study of environmentally sustainable security in wireless sensor networks

    Get PDF
    The popular technology Wireless sensor networks (WSNs) are used in many fields of the application such as the medical, the military, the industry, the agricultural, etc.. In this paper, explains the security issues in the WSNs. Firstly explain the challenges of Wireless Sensor Networks, the security requirements such as Confidentiality, Integrity, Authenticity, Data Freshness, and Availability and the attacks in the WSNs, the security issues are accomplished via these classes: [the encryption algorithms (symmetric, asymmetric, hybrid) , the security protocols such as (Tinysec, SPINS, LEDS, Minisec, LEAP, MASA, Lightweight LCG, MiniSec, VEBEK of WSN), the secure data aggregation, and the key management,etc.]. Also, this paper concentrates on the study researches that fulfill the high level of the security in the WSNs

    Recent Advancements on Symmetric Cryptography Techniques -A Comprehensive Case Study

    Get PDF
    Now a day2019;s Cryptography is one of the broad areas for researchers; because of the conventional block cipher has lost its potency due to the sophistication of modern systems that can break it by brute force. Due to its importance, several cryptography techniques and algorithms are adopted by many authors to secure the data, but still there is a scope to improve the previous approaches. For this necessity, we provide the comprehensive survey which will help the researchers to provide better techniques

    Enhanced secure data transfer for WSN using chaotic-based encryption

    Get PDF
    Postupci na bežičnim senzorskim mrežama - Wireless Sensor Networks (WSN) i njihovim područjima uporabe sve su češći pa problem sigurnosti mreže postaje sve važniji. Budući da su snaga procesora, memorija i izvori energije ograničeni na čvorove bežičnih senzorskih mreža, tradicionalno strukturirani kodovi više nisu učinkoviti. Uzevši to u obzir, očita je potreba za manjim procesnim opterećenjem i potrošnjom energije te učinkovitim kodom. U ovom se radu razvija kaotični kodni sustav za zadovoljenje sigurnosnih potreba na WSN. Uspoređuju se ovdje razvijeni kaotični sustav i uobičajeno korišteni Skipjack kod uz pomoć algoritma OPNET Modeller softvera i konstatira se da su postignuti bolji rezultati.Processes on Wireless Sensor Networks (WSN) and their areas of use have become more widespread, and the issue of net-work security has appeared as one of the primary necessities. As power of the processor, memory and energy sources are limited on wireless sensor network nodes, traditional encryption structures are not found effective. With these criteria taken into consideration, the need for less process load and energy consumption as well as a powerful encryption is obvious. In this study, a chaotic encryption system to meet the security need on WSN using chaotic systems was carried out. The chaotic system developed here and the commonly used Skipjack encryption were compared with the help of algorithm OPNET Modeller software and better results were achieved

    Reconfigurable hardware architecture of public key crypto processor for VANET and wireless sensor nodes

    Get PDF
    This work proposes encryption of text and image data, embedding as elliptic curve point. Finite field arithmetic is utilised efficiently in this reconfigurable crypto system. Pre-computations for text data and image input conversion is done using MATLAB. This architecture is tailored for cryptographic applications and VANET using Xilinx Spartan-xc3s100e-4-fg320 FPGA with Verilog coding. Total encryption and decryption time results around 10.09021 microseconds for 100×100 images, 22.091 microseconds for 256×256 images and 0.029 microseconds for a message. The message size is varied with different stream size and dynamic mapping of input data and a cipher image with high randomness indicates good security i.e., less vulnerable to attacks. An entropy statistical analysis is performed on plain and encrypted images to assess the strength of the proposed method. An encryption throughput rate is 450 Mbps

    Securing Wireless Communications of the Internet of Things from the Physical Layer, An Overview

    Get PDF
    The security of the Internet of Things (IoT) is receiving considerable interest as the low power constraints and complexity features of many IoT devices are limiting the use of conventional cryptographic techniques. This article provides an overview of recent research efforts on alternative approaches for securing IoT wireless communications at the physical layer, specifically the key topics of key generation and physical layer encryption. These schemes can be implemented and are lightweight, and thus offer practical solutions for providing effective IoT wireless security. Future research to make IoT-based physical layer security more robust and pervasive is also covered

    Developing a new encryption algorithm for images transmitted through WSN systems

    Get PDF
    Wireless sensor networks (WSNs) have up until now faced many challenges because of their open, wide-ranging, and resource-limited nature, including security, efficiency, and energy consumption. In the military system, it is essential to provide high-level security to the significant data over wireless network which is proved to be unreliable public communications. To solve the above problem, high level of security with minimum complexity should be applied to be adequate to limited capabilities of transmission system. This paper presents a new algorithm named (SRS) for encrypting transmitted military images to keep them from getting hacked or broken by WSN. The SRS algorithm is designed to be lightweight, fast, and secure, taking into consideration the limited capabilities of the transmission system. It is implemented as a public key cryptosystem specifically designed for image encryption. The algorithm consists of two parts: encryption and decryption. The proposed system suggested some equations and calculations that are applied to the plain and coded images after being transmitted over the WSN. The results of testing the simulation model demonstrate the effectiveness of the system by evaluation using various metrics such as Signal-to-Noise Ratio (SNR), Mean Squared Error (MSE), and Peak Signal-to-Noise Ratio (PSNR). Overall, the paper presents a new encryption algorithm, SRS, specifically designed for securing military images transmitted over wireless sensor networks. The algorithm aims to provide a balance between security, efficiency, and energy consumption, considering the resource-limited nature of WSNs. The simulation results indicate the improvement of the proposed system by 13 %, 10 %, and 55 % in packet delivery ratio (PDR), throughput, and dropping ratio, respectively, and it shows that the suggested SRS method increased execution time by 67 % compared to RSA based algorith
    corecore