Developing and Evaluation of New Hybrid Encryption Algorithms
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2014, Vol 13, Issue 1
Abstract
Wireless Sensor networks consist of hundreds or thousands of low cost, low power and self-organizing nodes which are highly distributed. As wireless sensor networks continue to grow, so does the need for effective security mechanisms because sensor networks may interact with sensitive data. Encryption algorithms play good roles in information security systems (ISS). Those algorithms consume a significant amount of computing resources such as battery power. Wireless Sensor networks are powered by a battery which is a very limited resource. At present, various types of cryptographic algorithms provide high security to information on networks, but there are also has some drawbacks. The present asymmetric encryption methods and symmetric encryption methods can offer the security levels but with many limitations. For instance key maintenance is a great problem faced in symmetric encryption methods and less security level is the problem of asymmetric encryption methods even though key maintenance is easy. To improve the strength of these algorithms, we propose a new hybrid cryptographic algorithm in this paper. The algorithm is designed using combination of two symmetric cryptographic techniques and two Asymmetric cryptographic techniques. This protocol provides three cryptographic primitives, integrity, confidentiality and authentication. It is a hybrid encryption method where elliptical curve cryptography (ECC) and advanced encryption (AES) are combined to provide node encryption. RSA algorithm and Blowfish are combined to provide authentication and (MD5) for integrity. The results show that the proposed hybrid cryptographic algorithm gives better performance in terms of computation time and the size of cipher text.This paper tries to present a fair comparison between the new protocols with four existing different hybrid protocols according to power consumption. A comparison has been conducted for those protocols at different settings for each protocol such as different sizes of data blocks, and finally encryption/decryption speed. Experimental results are given to demonstrate the effectiveness of each algorithm.
Authors and Affiliations
DiaaSalama AbdElminaam, Hatem M. Abdul Kader, Mohie M. Hadhoud, Salah M El-Sayed
The holes problem in wireless sensor netwoks by using the available energy fairly
We consider the holes problem in wireless sensor netwoks by using the available energy fairly. The holes problem occurs when the available energy of some sensors are exhausted while others have significant energy. In thi...
Comparative Study of Three Imputation Methods to Treat Missing Values
One relevant problem in data preprocessing is the presence of missing data that leads the poor quality of patterns, extracted after mining. Imputation is one of the widely used procedures that replace the missing values...
Improving Friends Matching in Social Networks Using Graph Coloring
Recently, most of people have their own profiles in different social networks. Usually, their profiles have some brief description about their personnel picture, family members, home town, career, date of birth etc. whic...
Performance Evaluation System for Decision Tree Algorithms
In the machine learning process, classification can be described by supervise learning algorithm. Classification techniques have properties that enable the representation of structures that reflect knowledge of the domai...
Voltage Flicker Parameters Estimation UsingShuffled Frog Leaping Algorithm (SFLA) andImperialistic Competitive Algorithm (ICA)
Measurement of magnitude and frequency ofthe voltage flicker is very important for monitoring and controlling voltage flicker efficiently to improve the network power quality. This paper presents two new methods for meas...