Lightweight Encryption Algorithms for Resource-Constrained Wireless Sensor Networks

Authors

  • M. Kishore Kumar INDIA Author

Keywords:

Lightweight Encryption, Computational Overhead, Data Integrity, Cryptographic Algorithms

Abstract

Wireless Sensor Networks (WSNs) are increasingly utilized in various applications such as environmental monitoring, healthcare, and industrial automation. However, the resource-constrained nature of sensor nodes presents significant challenges in implementing robust security measures. This paper focuses on lightweight encryption algorithms tailored for WSNs, which are crucial for ensuring data confidentiality and integrity without compromising the performance of the network. We provide a comprehensive overview of existing lightweight encryption algorithms, evaluate their suitability for WSNs, and discuss their trade-offs in terms of computational overhead, energy consumption, and security robustness. Our analysis highlights the importance of optimizing encryption techniques to balance security needs with the limited computational and energy resources available in WSN nodes.

References

Perrig, A., Szewczyk, R., Wen, V., Culler, D. E., & Tygar, J. D. (2002). SPINS: Security protocols for sensor networks. Wireless Networks, 8(5), 521-534. https://doi.org/10.1023/A:1016598314198

Liu, A., & Ning, P. (2003). TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks. Proceedings of the 7th International Conference on Information Processing in Sensor Networks (IPSN 2008), 245-256. https://doi.org/10.1109/IPSN.2008.36

Wander, A. S., Gura, N., Eberle, H., Gupta, V., & Shantz, S. C. (2005). Energy analysis of public-key cryptography for wireless sensor networks. Third IEEE International Conference on Pervasive Computing and Communications, 324-328. https://doi.org/10.1109/PERCOM.2005.23

Bogdanov, A., Knudsen, L. R., Leander, G., Paar, C., Poschmann, A., Robshaw, M. J. B., ... & Zenner, E. (2007). PRESENT: An ultra-lightweight block cipher. CHES 2007, LNCS 4727, 450-466. https://doi.org/10.1007/978-3-540-74735-2_31

Gaubatz, G., Kaps, J. P., & Sunar, B. (2004). Public key cryptography in sensor networks - Revisited. Proceedings of the First European Workshop on Security in Ad-Hoc and Sensor Networks (ESAS 2004), 2-18. https://doi.org/10.1007/978-3-540-30197-0_2

Karlof, C., & Wagner, D. (2003). Secure routing in wireless sensor networks: Attacks and countermeasures. Ad Hoc Networks, 1(2-3), 293-315. https://doi.org/10.1016/S1570-8705(03)00008-8

Bhambhu, J., & Shukla, M. K. (2016). Comprehensive Survey on Secure and Energy-Efficient Clustering Techniques in Wireless Sensor Networks. Journal of Recent Trends in Computer Science and Engineering (JRTCSE), 4(1), 12-20.

Gura, N., Patel, A., Wander, A., Eberle, H., & Shantz, S. C. (2004). Comparing elliptic curve cryptography and RSA on 8-bit CPUs. Proceedings of the Sixth International Workshop on Cryptographic Hardware and Embedded Systems (CHES 2004), 119-132. https://doi.org/10.1007/978-3-540-28632-1_9

Malan, D. J., Welsh, M., & Smith, M. D. (2004).

Published

2017-02-20

How to Cite

Lightweight Encryption Algorithms for Resource-Constrained Wireless Sensor Networks. (2017). JOURNAL OF RECENT TRENDS IN COMPUTER SCIENCE AND ENGINEERING ( JRTCSE), 5(1), 1-13. https://jrtcse.com/index.php/home/article/view/JRTCSE.2017.1.1