Butterfly Encryption Scheme for Resource-Constrained Wireless Networks

被引:9
|
作者
Sampangi, Raghav V. [1 ]
Sampalli, Srinivas [1 ]
机构
[1] Dalhousie Univ, Fac Comp Sci, Halifax, NS B3H 4R2, Canada
关键词
security; key management; authentication; resource-constrained wireless networks; RFID; Wireless Body Area Networks;
D O I
10.3390/s150923145
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Resource-constrained wireless networks are emerging networks such as Radio Frequency Identification (RFID) and Wireless Body Area Networks (WBAN) that might have restrictions on the available resources and the computations that can be performed. These emerging technologies are increasing in popularity, particularly in defence, anti-counterfeiting, logistics and medical applications, and in consumer applications with growing popularity of the Internet of Things. With communication over wireless channels, it is essential to focus attention on securing data. In this paper, we present an encryption scheme called Butterfly encryption scheme. We first discuss a seed update mechanism for pseudorandom number generators (PRNG), and employ this technique to generate keys and authentication parameters for resource-constrained wireless networks. Our scheme is lightweight, as in it requires less resource when implemented and offers high security through increased unpredictability, owing to continuously changing parameters. Our work focuses on accomplishing high security through simplicity and reuse. We evaluate our encryption scheme using simulation, key similarity assessment, key sequence randomness assessment, protocol analysis and security analysis.
引用
下载
收藏
页码:23145 / 23167
页数:23
相关论文
共 50 条
  • [21] An adaptive and efficient buffer management scheme for resource-constrained delay tolerant networks
    Moetesum, Momina
    Hadi, Fazle
    Imran, Muhammad
    Minhas, Abid Ali
    Vasilakos, Athanasios V.
    WIRELESS NETWORKS, 2016, 22 (07) : 2189 - 2201
  • [22] An adaptive and efficient buffer management scheme for resource-constrained delay tolerant networks
    Momina Moetesum
    Fazle Hadi
    Muhammad Imran
    Abid Ali Minhas
    Athanasios V. Vasilakos
    Wireless Networks, 2016, 22 : 2189 - 2201
  • [23] Efficient Parallel Split Learning Over Resource-Constrained Wireless Edge Networks
    Lin, Zheng
    Zhu, Guangyu
    Deng, Yiqin
    Chen, Xianhao
    Gao, Yue
    Huang, Kaibin
    Fang, Yuguang
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2024, 23 (10) : 9224 - 9239
  • [24] Reinforcement Learning for Protocol Synthesis in Resource-Constrained Wireless Sensor and IoT Networks
    Dutta, Hrishikesh
    Bhuyan, Amit Kumar
    Biswas, Subir
    UBIQUITOUS NETWORKING, UNET 2022, 2023, 13853 : 183 - 199
  • [25] Energy efficient distributed image compression in resource-constrained multihop wireless networks
    Wu, HM
    Abouzeid, AA
    COMPUTER COMMUNICATIONS, 2005, 28 (14) : 1658 - 1668
  • [26] Distributed rate control and power control in resource-constrained wireless sensor networks
    Song, Yang
    Fang, Yuguang
    2007 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1-8, 2007, : 3850 - 3855
  • [27] HiveSec: security in resource-constrained wireless networks inspired by beehives and bee swarms
    Sampangi, Raghav V.
    Sampalli, Srinivas
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2017, 16 (04) : 417 - 433
  • [28] Reinforcement learning based flow and energy management in resource-constrained wireless networks
    Dutta, Hrishikesh
    Bhuyan, Amit Kumar
    Biswas, Subir
    COMPUTER COMMUNICATIONS, 2023, 202 : 73 - 86
  • [29] Adaptive Complex Filtering for Narrowband Jamming Mitigation in Resource-Constrained Wireless Networks
    Valkova-Jarvis, Zlatka Valkova
    Mihaylova, Dimitriya Angelova
    Mihovska, Albena Dimitrova
    Iliev, Georgi Lubenov
    INTERNATIONAL JOURNAL OF INTERDISCIPLINARY TELECOMMUNICATIONS AND NETWORKING, 2020, 12 (02) : 46 - 58
  • [30] HiveSec: security in resource-constrained wireless networks inspired by beehives and bee swarms
    Raghav V. Sampangi
    Srinivas Sampalli
    International Journal of Information Security, 2017, 16 : 417 - 433