E3SN - Efficient Security Scheme for Sensor Networks

Hassan Noura, Steven Martin, Khaldoun Al Agha

2013

Abstract

Sensor networks are widely used in various areas and applications, and the need for effective security systems is increasingly essential. But most security systems are based on complex algorithms that require a high complexity and energy consumption, thus have undesirable consequences. To reduce them, a new security system called E3SN is defined. It is based on an invertible and flexible key dependent matrix to mix the contents of the packets. Our proposal can achieve simultaneously the information’s confidentiality, packet’s integrity and source’s authentication, with a minimum of computational complexity, communication overhead and memory consumption. This matrix is secret and only the transmitter and receiver can produce it in counter mode. We evaluate our system by comparing E3SN to AES algorithm, considered reliable and robust in several standards of sensor networks such as ZigBee, WirelessHART and ISA100.11a. The results show that the proposed technique is much more efficient than AES, with the same quality of cryptography.

References

  1. (2002). Secure hash standard. National Institute of Standards and Technology, Washington. URL: http:// csrc.nist.gov/publications/fips/. Note: Federal Information Processing Standard 180-2.
  2. Bates, C. and VA., N. W. L. D. (1966). The Chi-square Test of Goodness of Fit for a Bivariate Normal Distribution. Defense Technical Information Center.
  3. Daemen, J., Daemen, J., Daemen, J., Rijmen, V., and Rijmen, V. (1998). Aes proposal: Rijndael.
  4. Doraswamy, N. and Harkins, D. (1999). IPSec: The New Security Standard for the Internet, Intranets, and Virtual Private Networks. Prentice Hall PTR, Upper Saddle River, NJ, USA.
  5. Gupta, K. C. and Ray, I. G. (2013). On constructions of mds matrices from companion matrices for lightweight cryptography. Cryptology ePrint Archive, Report 2013/056.
  6. Karlof, C., Sastry, N., and Wagner, D. (2004). Tinysec: a link layer security architecture for wireless sensor networks. In Proceedings of the 2nd international conference on Embedded networked sensor systems, SenSys 7804, pages 162-175, New York, NY, USA. ACM.
  7. Krawczyk, H., Bellare, M., and Canetti, R. (1997). Hmac: Keyed-hashing for message authentication.
  8. Luk, M., Mezzour, G., Perrig, A., and Gligor, V. (2007). MiniSec: a secure sensor network communication architecture. In IPSN 7807: Proceedings of the 6th international conference on Information processing in sensor networks, pages 479-488, New York, NY, USA. ACM Press.
  9. Perrig, A., Szewczyk, R., Tygar, J. D., Wen, V., and Culler, D. E. (2002). Spins: security protocols for sensor networks. Wirel. Netw., 8(5):521-534.
  10. Robshaw, M. J. B. and Billet, O., editors (2008). New Stream Cipher Designs - The eSTREAM Finalists, volume 4986 of Lecture Notes in Computer Science. Springer.
  11. Rodgers, J. L. and Nicewander, A. W. (1988). Thirteen Ways to Look at the Correlation Coefficient. The American Statistician, 42(1):59-66.
  12. Rogaway, P., Bellare, M., Black, J., and Krovetz, T. (2001). Ocb: A block-cipher mode of operation for efficient authenticated encryption. pages 196-205. ACM Press.
Download


Paper Citation


in Harvard Style

Noura H., Martin S. and Al Agha K. (2013). E3SN - Efficient Security Scheme for Sensor Networks . In Proceedings of the 10th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2013) ISBN 978-989-8565-73-0, pages 615-621. DOI: 10.5220/0004613006150621


in Bibtex Style

@conference{secrypt13,
author={Hassan Noura and Steven Martin and Khaldoun Al Agha},
title={E3SN - Efficient Security Scheme for Sensor Networks},
booktitle={Proceedings of the 10th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2013)},
year={2013},
pages={615-621},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0004613006150621},
isbn={978-989-8565-73-0},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 10th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2013)
TI - E3SN - Efficient Security Scheme for Sensor Networks
SN - 978-989-8565-73-0
AU - Noura H.
AU - Martin S.
AU - Al Agha K.
PY - 2013
SP - 615
EP - 621
DO - 10.5220/0004613006150621