Security In Wireless Sensor Networks Based On Lightweight Algorithms : An Effective Survey
DOI:
https://doi.org/10.31185/wjcm.106Keywords:
Data Confidentiality, Lightweight Cryptography, Security in Wireless Networks, Wireless Sensor NetworksAbstract
At the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range of applications and uses. Sensors are used in a wide range of industries, including agriculture, transportation, health, and many more. Many technologies, such as wireless communication protocols, the Internet of Things, cloud computing, mobile computing, and other emerging technologies, are connected to the usage of sensors. In many circumstances, this contact necessitates the transmission of crucial data, necessitating the need to protect that data from potential threats. However, as the WSN components often have constrained computation and power capabilities, protecting the communication in WSNs comes at a significant performance penalty. Due to the massive calculations required by conventional public-key and secret encryption methods, information security in this limited context calls for light encryption techniques. In many applications involving sensor networks, security is a crucial concern. On the basis of traditional cryptography, a number of security procedures are created for wireless sensor networks. Some symmetric-key encryption techniques used in sensor network setups include AES, RC5, SkipJack, and XXTEA. These algorithms do, however, have several flaws of their own, including being susceptible to chosen-plaintext assault, brute force attack, and computational complexity.
References
K. Biswas, V. Muthukkumarasamy, and E. Sithirasenan, “Maximal clique based clustering scheme for WSNs,” in 8th IEEE ISSNIP, pp. 237–241, 2013.
K. Biswas, V. Muthukkumarasamy, E. Sithirasenan, and M. Usman, “An energy efficient clique based clustering and routing mechanism in WSNs,” in 9th IEEE IWCMC, pp. 171–176, 2013.
M. Shazly, E. S. Elmallah, J. Harms, and H. M. F. Aboelfotoh, “On area coverage reliability of WSNs,” 36th IEEE LCN Conference, pp. 580–588, 2011.
C. Magazine, “AES proved vulnerable by Microsoft researchers,” 2011.
“Intel Corporation: Intel architecture software developer’s manual,” 1997.
E. Biham, A. Birykov, and A. Shamir, “Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials,” J. of Cryptology, vol. 18, no. 4, pp. 291–311, 2005.
W. K. Koo, H. Lee, Y. H. Kim, and D. H. Lee, Implementation and Analysis of New Lightweight Cryptographic Algorithm for WSNs. 2008.
E. Yarrkov, “Cryptanalysis of XXTEA,” 2010. http://eprint.iacr.org/2010/254.pdf.
M. Amara and A. Siad, “Elliptic Curve Cryptography and its applications,” IEEE WOSSPA, pp. 247–250, 2011.
H. Alzaid and M. Alfaraj, “End-to-End Data Security in Sensor Networks Using a Mix of Asymmetric and Symmetric.”
“Approaches 2nd IEEE International Conference on New Technologies, Mobility and Security.”
D. Aranha, J. Lopez, L. Oliveira, R. Dahab, and Nanopbc, “Implementing Cryptographic Pairings on an 8-bit Platform Conference.”
on Hyperelliptic curves, discrete Logarithms, Encryption, etc. 2009.
B. Arazi, L. Elhanany, O. Arazi, and H. Qi, “Revisiting public-key cryptography for wireless sensor networks,” IEEE Computer, vol. 38, no. 11, 2005.
103, 105-105
L. Batina, N. Mentens, K. Sakiyama, B. Preneel, and I. Verbauwhede, “Low-cost elliptic curve cryptography for wireless sensor,” 2006.
Lecture Notes in Computer Science, vol. 4357, pp. 17–17.
D. Carman, P. Kruus, and B. Matt, “Constraints and approaches for distributed sensor network security,” 2000.
K. Choi and J. Song, “Investigation of feasible cryptographic algorithms for wireless sensor network th ICACT,” 2002.
N. Fournel, M. Minier, and S. Ubeda, “Survey and Benchmark of Stream Ciphers for Wireless Sensor Networks,” LNCS, pp. 4462–4462, 2007.
P. Ganesan, R. Venugopalan, P. Peddabachagari, A. Dean, F. Mueller, and M. Sichitiu, “Analyzing and modeling encryption,” 2003.
“over 2nd acm wireless sensor networks and applications,” ACM Press.
G. Gaubatz and J. Kaps, “Sunar Public key cryptography in sensor networks-Revisited 1st.”
G. Gaubatz, J. Kaps, and E. Ozturk Sunar State of the art in ultralow power public key cryptography for wireless sensor.
“networks ieee international conference on pervasive computing and communications workshops,”
M. Healy, T. Newe, and E. Lewis Analysis of Hardware Encryption versus Software Encryption on Wireless Sensor Network Motes, 2008.
Smart Sensors and Sensing Technology, 2008.
W. Hu A Public Key Technology Platform For Wireless Sensor Networks 6th.
“European conference on wireless sensor networks,”
“International conference on recent trends in information technology,” pp. 307–312.
C. Karlof, N. Sastry, and W. Tinysec A Link Layer Security Architecture for Wireless Sensor Networks ACM.
“Conference on embedded networked sensor systems,” 2004.
A. Canteaut, “Linear Feedback Shift Register,” Encyclopedia of Cryptography and Security, pp. 355–358.
J. Burke, J. Mcdonald, and T. Austin Architectural support for fast symmetric-key cryptography, pp. 178–189, 2000
Downloads
Published
Issue
Section
License
Copyright (c) 2023 Mohammad Hasan Abd, Huda lafta majeed , Sif .K. Ebis
This work is licensed under a Creative Commons Attribution 4.0 International License.