Butterfly Encryption Scheme for Resource-Constrained Wireless Networks

被引:9
|
作者
Sampangi, Raghav V. [1 ]
Sampalli, Srinivas [1 ]
机构
[1] Dalhousie Univ, Fac Comp Sci, Halifax, NS B3H 4R2, Canada
关键词
security; key management; authentication; resource-constrained wireless networks; RFID; Wireless Body Area Networks;
D O I
10.3390/s150923145
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Resource-constrained wireless networks are emerging networks such as Radio Frequency Identification (RFID) and Wireless Body Area Networks (WBAN) that might have restrictions on the available resources and the computations that can be performed. These emerging technologies are increasing in popularity, particularly in defence, anti-counterfeiting, logistics and medical applications, and in consumer applications with growing popularity of the Internet of Things. With communication over wireless channels, it is essential to focus attention on securing data. In this paper, we present an encryption scheme called Butterfly encryption scheme. We first discuss a seed update mechanism for pseudorandom number generators (PRNG), and employ this technique to generate keys and authentication parameters for resource-constrained wireless networks. Our scheme is lightweight, as in it requires less resource when implemented and offers high security through increased unpredictability, owing to continuously changing parameters. Our work focuses on accomplishing high security through simplicity and reuse. We evaluate our encryption scheme using simulation, key similarity assessment, key sequence randomness assessment, protocol analysis and security analysis.
引用
下载
收藏
页码:23145 / 23167
页数:23
相关论文
共 50 条
  • [1] Cooperative communications in resource-constrained wireless networks
    Hong, Yao-Win
    Huang, Wan-Jen
    Chiu, Fu-Hsuan
    Kuo, C.-C. Jay
    IEEE SIGNAL PROCESSING MAGAZINE, 2007, 24 (03) : 47 - 57
  • [2] Efficient Cooperative Transmission Scheme for Resource-Constrained Networks
    Kim, Jee-Hoon
    You, Young-Hwan
    Song, Hyoung-Kyu
    MOBIWAC'08: PROCEEDINGS OF THE SIXTH ACM INTERNATIONAL SYMPOSIUM ON MOBILITY MANAGEMENT AND WIRELESS ACCESS, 2008, : 47 - 52
  • [3] Slotted ALOHA for Wireless Powered Resource-Constrained Networks
    Silva, Cleyson de, V
    Carvalho, Marcelo M.
    IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC 2021), 2021,
  • [4] Feasibility of PKC in Resource-Constrained Wireless Sensor Networks
    Pathan, Al-Sakib Khan
    Hong, Choong Seon
    2008 11TH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY: ICCIT 2008, VOLS 1 AND 2, 2008, : 905 - 912
  • [5] SECURING RESOURCE-CONSTRAINED WIRELESS AD HOC NETWORKS
    Fang, Yuguang
    Zhu, Xiaoyan
    Zhang, Yanchao
    IEEE WIRELESS COMMUNICATIONS, 2009, 16 (02) : 24 - 29
  • [6] Securing resource-constrained wireless ad hoc networks
    Fang, Yuguang
    Zhang, Yanchao
    2007 IEEE SARNOFF SYMPOSIUM, 2007, : 477 - +
  • [7] An efficient and compromise-resilient image encryption scheme for resource-constrained environments
    Khan, Abdul Nasir
    Mehmood, Abid
    Bhutta, Muhammad Nasir Mumtaz
    Khan, Iftikhar Ahmed
    Khan, Atta ur Rehman
    PLOS ONE, 2024, 19 (04):
  • [8] Federated Learning in Unreliable and Resource-Constrained Cellular Wireless Networks
    Salehi, Mohammad
    Hossain, Ekram
    IEEE TRANSACTIONS ON COMMUNICATIONS, 2021, 69 (08) : 5136 - 5151
  • [9] Protocol-Agnostic Compression for Resource-Constrained Wireless Networks
    Massey, Travis L.
    Mehta, Ankur
    Watteyne, Thomas
    Pister, Kristofer S. J.
    2010 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE GLOBECOM 2010, 2010,
  • [10] Complex Event Detection in Extremely Resource-Constrained Wireless Sensor Networks
    Zoumboulakis, Michael
    Roussos, George
    MOBILE NETWORKS & APPLICATIONS, 2011, 16 (02): : 194 - 213