Developing and Evaluation of New Hybrid Encryption Algorithms
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2014, Vol 13, Issue 1
Abstract
Wireless Sensor networks consist of hundreds or thousands of low cost, low power and self-organizing nodes which are highly distributed. As wireless sensor networks continue to grow, so does the need for effective security mechanisms because sensor networks may interact with sensitive data. Encryption algorithms play good roles in information security systems (ISS). Those algorithms consume a significant amount of computing resources such as battery power. Wireless Sensor networks are powered by a battery which is a very limited resource. At present, various types of cryptographic algorithms provide high security to information on networks, but there are also has some drawbacks. The present asymmetric encryption methods and symmetric encryption methods can offer the security levels but with many limitations. For instance key maintenance is a great problem faced in symmetric encryption methods and less security level is the problem of asymmetric encryption methods even though key maintenance is easy. To improve the strength of these algorithms, we propose a new hybrid cryptographic algorithm in this paper. The algorithm is designed using combination of two symmetric cryptographic techniques and two Asymmetric cryptographic techniques. This protocol provides three cryptographic primitives, integrity, confidentiality and authentication. It is a hybrid encryption method where elliptical curve cryptography (ECC) and advanced encryption (AES) are combined to provide node encryption. RSA algorithm and Blowfish are combined to provide authentication and (MD5) for integrity. The results show that the proposed hybrid cryptographic algorithm gives better performance in terms of computation time and the size of cipher text.This paper tries to present a fair comparison between the new protocols with four existing different hybrid protocols according to power consumption. A comparison has been conducted for those protocols at different settings for each protocol such as different sizes of data blocks, and finally encryption/decryption speed. Experimental results are given to demonstrate the effectiveness of each algorithm.
Authors and Affiliations
DiaaSalama AbdElminaam, Hatem M. Abdul Kader, Mohie M. Hadhoud, Salah M El-Sayed
Effects of Internal Heat Generation and Variable Viscosity on Onset of Rayleigh-Benard Convection
In the present study, onset of stationary Rayleigh-Benard convective instability in a fluid layer, with internal heating and thermally dependent viscosity has been investigated by means of linear stability analysis. The...
Computational Analysis of Different Image Super-Resolution Reconstruction Algorithms
Super-resolution image reconstruction produces a high-resolution image from a set of shifted, blurred, and decimated versions thereof. Super-resolution image restoration has become an active research issue in the field o...
Voltage Flicker Parameters Estimation UsingShuffled Frog Leaping Algorithm (SFLA) andImperialistic Competitive Algorithm (ICA)
Measurement of magnitude and frequency ofthe voltage flicker is very important for monitoring and controlling voltage flicker efficiently to improve the network power quality. This paper presents two new methods for meas...
Tourist attitudes toward the use of e-Commerce for tourism in Thailand
The aim of this paper is to study travelers’ attitudes toward the use of e-Commerce for tourism in Thailand. The study used mixed methodology quantitative research by collecting data from 510 domestic tourists; 400 int...
Energy Efficient Ensemble K-means and SVM for Wireless Sensor Network
A wireless sensor network (WSN) consists of a large number of small sensors with limited energy. For many WSN applications, prolonged network lifetime is important requirements. There are different techniques have alread...