An Effective Lightweight Cryptographic Algorithm to Secure Resource-Constrained Devices
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2018, Vol 9, Issue 11
Abstract
In recent years, small computing devices like embedded devices, wireless sensors, RFID tags (Radio Frequency Identification), Internet of Things (IoT) devices are increasing rapidly. They are expected to generate massive amount of sensitive data for controlling and monitoring purposes. But their resources and capabilities are limited. Those also work with valuable private data thus making security of those devices of paramount importance. Therefore, a secure encryption algorithm should be there to protect those vulnerable devices. Conventional encryption ciphers like RSA or AES are computationally expensive; require large memory but hinder performances of those devices. Simple encryption techniques, on the other hand are easy to crack, compromising security. In this paper a secure and efficient lightweight cryptographic algorithm for small computing devices has been proposed. It is a symmetric key block cipher, employing custom substitution-permutation (SP) network and a modified Feistel architecture. Two basic concepts from Genetic algorithm are used. A Linux based benchmark tool, FELICS is used for the measurement and MATLAB for the purpose of encryption quality testing. An improvement over the existing algorithm, the proposed algorithm reduces the use of processing cycles but at the same time provides sufficient security.
Authors and Affiliations
Sohel Rana, Saddam Hossain, Hasan Imam Shoun, Dr. Mohammod Abul Kashem
Image Co-Segmentation via Examples Guidance
Given a collection of images which contains objects from the same category, the co-segmentation methods aim at simultaneously segmenting such common objects in each image. Most of existing co-segmentation approaches rely...
Enhancing Elasticity of SaaS Applications using Queuing Theory
Elasticity is one of key features of cloud computing. Elasticity allows Software as a Service (SaaS) applications’ provider to reduce cost of running applications. In large SaaS applications that are developed using serv...
Algorithm for Enhancing the QoS of Video Traffic over Wireless Mesh Networks
One of the major issues in a wireless mesh networks (WMNs) which needs to be solved is the lack of a viable protocol for medium access control (MAC). In fact, the main concern is to expand the application of limited wire...
Factors Influencing the Adoption of Cloud Computing by Saudi University Hospitals
This study aims to evaluate the adoption of Cloud Computing in Saudi university hospitals and to investigate the factors that impact the adoption. This study integrates the Technological, Organizational, Environmental (T...
Reflected Adaptive Differential Evolution with Two External Archives for Large-Scale Global Optimization
JADE is an adaptive scheme of nature inspired algorithm, Differential Evolution (DE). It performed considerably improved on a set of well-studied benchmark test problems. In this paper, we evaluate the performance of new...