Lightweight Encryption Algorithms for Resource-Constrained Wireless Sensor Networks
Keywords:
Lightweight Encryption, Computational Overhead, Data Integrity, Cryptographic AlgorithmsAbstract
Wireless Sensor Networks (WSNs) are increasingly utilized in various applications such as environmental monitoring, healthcare, and industrial automation. However, the resource-constrained nature of sensor nodes presents significant challenges in implementing robust security measures. This paper focuses on lightweight encryption algorithms tailored for WSNs, which are crucial for ensuring data confidentiality and integrity without compromising the performance of the network. We provide a comprehensive overview of existing lightweight encryption algorithms, evaluate their suitability for WSNs, and discuss their trade-offs in terms of computational overhead, energy consumption, and security robustness. Our analysis highlights the importance of optimizing encryption techniques to balance security needs with the limited computational and energy resources available in WSN nodes.
References
Perrig, A., Szewczyk, R., Wen, V., Culler, D. E., & Tygar, J. D. (2002). SPINS: Security protocols for sensor networks. Wireless Networks, 8(5), 521-534. https://doi.org/10.1023/A:1016598314198
Liu, A., & Ning, P. (2003). TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks. Proceedings of the 7th International Conference on Information Processing in Sensor Networks (IPSN 2008), 245-256. https://doi.org/10.1109/IPSN.2008.36
Wander, A. S., Gura, N., Eberle, H., Gupta, V., & Shantz, S. C. (2005). Energy analysis of public-key cryptography for wireless sensor networks. Third IEEE International Conference on Pervasive Computing and Communications, 324-328. https://doi.org/10.1109/PERCOM.2005.23
Bogdanov, A., Knudsen, L. R., Leander, G., Paar, C., Poschmann, A., Robshaw, M. J. B., ... & Zenner, E. (2007). PRESENT: An ultra-lightweight block cipher. CHES 2007, LNCS 4727, 450-466. https://doi.org/10.1007/978-3-540-74735-2_31
Gaubatz, G., Kaps, J. P., & Sunar, B. (2004). Public key cryptography in sensor networks - Revisited. Proceedings of the First European Workshop on Security in Ad-Hoc and Sensor Networks (ESAS 2004), 2-18. https://doi.org/10.1007/978-3-540-30197-0_2
Karlof, C., & Wagner, D. (2003). Secure routing in wireless sensor networks: Attacks and countermeasures. Ad Hoc Networks, 1(2-3), 293-315. https://doi.org/10.1016/S1570-8705(03)00008-8
Bhambhu, J., & Shukla, M. K. (2016). Comprehensive Survey on Secure and Energy-Efficient Clustering Techniques in Wireless Sensor Networks. Journal of Recent Trends in Computer Science and Engineering (JRTCSE), 4(1), 12-20.
Gura, N., Patel, A., Wander, A., Eberle, H., & Shantz, S. C. (2004). Comparing elliptic curve cryptography and RSA on 8-bit CPUs. Proceedings of the Sixth International Workshop on Cryptographic Hardware and Embedded Systems (CHES 2004), 119-132. https://doi.org/10.1007/978-3-540-28632-1_9
Malan, D. J., Welsh, M., & Smith, M. D. (2004).
Published
Issue
Section
License
Copyright (c) 2016 M. Kishore Kumar (Author)
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.