An Effective Lightweight Cryptographic Algorithm to Secure Resource-Constrained Devices
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2018, Vol 9, Issue 11
Abstract
In recent years, small computing devices like embedded devices, wireless sensors, RFID tags (Radio Frequency Identification), Internet of Things (IoT) devices are increasing rapidly. They are expected to generate massive amount of sensitive data for controlling and monitoring purposes. But their resources and capabilities are limited. Those also work with valuable private data thus making security of those devices of paramount importance. Therefore, a secure encryption algorithm should be there to protect those vulnerable devices. Conventional encryption ciphers like RSA or AES are computationally expensive; require large memory but hinder performances of those devices. Simple encryption techniques, on the other hand are easy to crack, compromising security. In this paper a secure and efficient lightweight cryptographic algorithm for small computing devices has been proposed. It is a symmetric key block cipher, employing custom substitution-permutation (SP) network and a modified Feistel architecture. Two basic concepts from Genetic algorithm are used. A Linux based benchmark tool, FELICS is used for the measurement and MATLAB for the purpose of encryption quality testing. An improvement over the existing algorithm, the proposed algorithm reduces the use of processing cycles but at the same time provides sufficient security.
Authors and Affiliations
Sohel Rana, Saddam Hossain, Hasan Imam Shoun, Dr. Mohammod Abul Kashem
High-Speed FPGA-based of the Particle Swarm Optimization using HLS Tool
The Particle Swarm Optimization (PSO) is a heuristic search method inspired by different biological populations on their swarming or collaborative behavior. This novel work has implemented PSO for the Travelling Salesman...
Detection and Removal of Gray, Black and Cooperative Black Hole Attacks in AODV Technique
Mobile ad hoc network (MANET) is an autonomous self-configuring infrastructure-less wireless network. MANET is vulnerable to a lot of routing security threats due to unreliability of its nodes that are highly involved in...
Secured Multi-Hop Clustering Protocol for Location-based Routing in VANETs
In today’s world, with the rise in the count of vehicles and lack of proper navigation, the congestion has become a major problem. In this scenario, VANETs play a very important part in improving the traffic condition an...
Smart Home Energy Management System Design: A Realistic Autonomous V2H / H2V Hybrid Energy Storage System
The hybrid fuel cell electric vehicle powered by household power during peak use is another opportunity to reduce emissions and save money. For this reason, Vehicle-to-Home (V2H) and Home-to-Vehicle (H2V) systems were pr...
Wyner-Ziv Video Coding using Hadamard Transform and Deep Learning
Predictive schemes are current standards of video coding. Unfortunately they do not apply well for lightweight devices such as mobile phones. The high encoding complexity is the bottleneck of the Quality of Experience (Q...