Butterfly Encryption Scheme for Resource-Constrained Wireless Networks

被引:9
|
作者
Sampangi, Raghav V. [1 ]
Sampalli, Srinivas [1 ]
机构
[1] Dalhousie Univ, Fac Comp Sci, Halifax, NS B3H 4R2, Canada
关键词
security; key management; authentication; resource-constrained wireless networks; RFID; Wireless Body Area Networks;
D O I
10.3390/s150923145
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Resource-constrained wireless networks are emerging networks such as Radio Frequency Identification (RFID) and Wireless Body Area Networks (WBAN) that might have restrictions on the available resources and the computations that can be performed. These emerging technologies are increasing in popularity, particularly in defence, anti-counterfeiting, logistics and medical applications, and in consumer applications with growing popularity of the Internet of Things. With communication over wireless channels, it is essential to focus attention on securing data. In this paper, we present an encryption scheme called Butterfly encryption scheme. We first discuss a seed update mechanism for pseudorandom number generators (PRNG), and employ this technique to generate keys and authentication parameters for resource-constrained wireless networks. Our scheme is lightweight, as in it requires less resource when implemented and offers high security through increased unpredictability, owing to continuously changing parameters. Our work focuses on accomplishing high security through simplicity and reuse. We evaluate our encryption scheme using simulation, key similarity assessment, key sequence randomness assessment, protocol analysis and security analysis.
引用
下载
收藏
页码:23145 / 23167
页数:23
相关论文
共 50 条
  • [41] Wireless video sensor networks for sparse, resource-constrained, multi-robot teams
    Richard M. Voyles
    Jaewook Bae
    Amy C. Larson
    Mustafa A. Ayad
    Intelligent Service Robotics, 2009, 2 : 235 - 246
  • [42] A Timestamp-Free Time Synchronization Scheme Based on Reverse Asymmetric Framework for Practical Resource-Constrained Wireless Sensor Networks
    Huan, Xintao
    He, Hanxiang
    Wang, Tianli
    Wu, Qigang
    Hu, Han
    IEEE TRANSACTIONS ON COMMUNICATIONS, 2022, 70 (09) : 6109 - 6121
  • [43] Key Update Assistant for Resource-Constrained Networks
    Yuksel, Ender
    Nielson, Hanne Riis
    Nielson, Flemming
    2012 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2012, : 75 - 80
  • [44] Modified Rijndael Algorithm for Resource-Constrained IoT-Based Wireless Sensor Networks
    Sirajuddin, Mohammad
    Kumar, B. Sateesh
    EAI ENDORSED TRANSACTIONS ON SCALABLE INFORMATION SYSTEMS, 2023, 10 (05) : 1 - 12
  • [45] Mutual RFID Authentication Scheme for Resource-constrained Tags
    Lo, Nai-Wei
    Yeh, Kuo-Hui
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2010, 26 (05) : 1875 - 1889
  • [46] Wireless Federated Learning over Resource-Constrained Networks: Digital versus Analog Transmissions
    Yao J.
    Xu W.
    Yang Z.
    You X.
    Bennis M.
    Poor H.V.
    IEEE Transactions on Wireless Communications, 2024, 23 (10) : 1 - 1
  • [47] Wireless video sensor networks for sparse, resource-constrained, multi-robot teams
    Voyles, Richard M.
    Bae, Jaewook
    Larson, Amy C.
    Ayad, Mustafa A.
    INTELLIGENT SERVICE ROBOTICS, 2009, 2 (04) : 235 - 246
  • [48] Intelligent scheduling and optimisation for resource-constrained networks
    Li, Z.
    Wang, W.
    Jiang, Y.
    IET CONTROL THEORY AND APPLICATIONS, 2010, 4 (12): : 2982 - 2992
  • [49] A Beaconless Asymmetric Energy-Efficient Time Synchronization Scheme for Resource-Constrained Multi-Hop Wireless Sensor Networks
    Huan, Xintao
    Kim, Kyeong Soo
    Lee, Sanghyuk
    Lim, Eng Gee
    Marshall, Alan
    IEEE TRANSACTIONS ON COMMUNICATIONS, 2020, 68 (03) : 1716 - 1730
  • [50] A Novel Distributed Online Anomaly Detection Method in Resource-Constrained Wireless Sensor Networks
    Ding, Zhiguo
    Wang, Haikuan
    Fei, Minrui
    Du, Dajun
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2015,