Main Article Content
Recent advances in technology have led to rapid growth of Internet of Things (IoT) systems which incorporate numerous miniaturized low powered devices with large numbers of sensors and actuators collecting and exchanging data autonomously over the internet generating enormous amounts of data that needs to be secured. Traditional encryption algorithms are not suitable due to great complexity and numerous rounds for encryption and decryption operations. There is however a rising need for elaborate lightweight encryption algorithms with less complexity for optimum security in resource constrained communication networks. In this paper, a lightweight encryption algorithm called Intra-Optimized Lightweight Enciphering (ILE) Algorithm is proposed. The proposed scheme is complemented by watchdogs who are deployed in the clusters to achieve optimum security for the overall generated clusters at less cost and is simulated on Message Queue Telemetry Transport (MQTT) protocol using Mosquito broker in Cooja simulator and the performance was evaluated. Results from simulations show that the proposed algorithm offers significant security, improved performance and power drain without compromising the quality of service and further a comparison was made with existing lightweight algorithms.
© 2011-2019 Australian Journal of Wireless Technologies, Mobility and Security e-ISSN 2200-1883
- P.L.L.P. Pan Wang, Professor Sohail Chaudhry, S. Li, T. Tryfonas, and H. Li, “The Internet of Things: a Security Point of View”, Internet Research, Vol. 26, no. 2, pp. 337–359, 2016.
- Tobias Heer, Oscar Garcia-Morchon, Rene Hummen, Sye Loong Keoh, Sandeep S. Kumar, and Klaus Wehrle. "Security Challenges in the IP-based Internet of Thing". Journal on Wireless Personal Communications, Springer. December 2011, Volume 61, Issue 3, pp 527-542
- National Institute of Standards and Technology, NIST Report on Lightweight Cryptography, NISTIR 8114, March 2017, https://doi.org/10.6028/NIST.IR.8114.
- U.S. Department of Commerce, Advanced Encryption Standard (AES), Federal Information Processing Standards (FIPS) Publication 197, November 2001.
- Bogdanov, A., Knudsen, L.R., Leander, G., Paar, C., Poschmann, A., Robshaw, M.J.B., Seurin, Y., and Vikkelsoe, C., PRESENT: An Ultra-Lightweight Block Cipher. Proc. 9th International Workshop on Cryptographic Hardware and Embedded Systems (CHES 2007), Vienna, Austria, September 10-13, 2007, LNCS 4727, pp. 450-466.
- Beaulieu, R., Shors, D., Smith, J., Treatman-Clark, S., Weeks, B., and Wingers, L., The SIMON and SPECK Families of Lightweight Block Ciphers, IACR Cryptology ePrint Archive, 2013.
- Rivest, R.L., The RC5 Encryption Algorithm. Proc. Second International Workshop on Fast Software Encryption (FSE 1994), Leuven, Belgium, December 14–16, 1994, LNCS 1008, pp. 86-96.
- Wheeler, D.J., and Needham, R.M., TEA, A Tiny Encryption Algorithm. Proc. Second International Workshop on Fast Software Encryption (FSE 1994), Leuven, Belgium, December 14–16, 1994, LNCS 1008, pp. 363-366.
- Needham, R.M., and Wheeler, D.J., Tea extensions, Technical Report, Computer Laboratory, University of Cambridge, October 1997.
- D. Hong, J. Sung, S. Hong, J. Lim, S. Lee, B.-S; Koo, C. Lee, D. Chang, J. Lee, K. Jeong, H. Kim, J. Kim, and S. Chee. HIGHT: A New Block Cipher Suitable for Low-Resource Device. In L. Goubin and M. Matsui, editors, Proceedings of CHES 2006, LNCS, volume 4249, pages 46–59, Springer-Verlag, 2006.
- Biryukov, A., and Perrin, L., Lightweight Block Ciphers, https://www.cryptolux.org/index.php/Lightweight_Block_Ciphers, [accessed January 10, 2018]
- Hell, M., Johansson, T., and Meier, W., Grain: A Stream Cipher for Constrained Environments, International Journal of Wireless and Mobile Computing (IJWMC), 2007, Vol. 2, (1), pp. 86-93.
- De Cannière, C., and Preneel, B., Trivium: ‘New Stream Cipher Designs - The eSTREAM Finalists’ (Springer, 2008), LNCS 4986, pp. 244-266.
- Babbage, S., and Dodd, M., The MICKEY Stream Ciphers: ‘New Stream Cipher Designs - The eSTREAM Finalists’ (Springer, 2008), LNCS 4986, pp. 191-209.
- Guo, J., Peyrin, T., and Poschmann, A., The PHOTON Family of Lightweight Hash Functions. Proc. 31st Annual International Cryptology Conference (CRYPTO 2011), Santa Barbara, CA, USA, August 14-18, 2011, LNCS 6841, pp. 222-239.
- Aumasson, J.P., Henzen, L., Meier, W., and Naya-Plasencia, M., Quark: A Lightweight Hash, Journal of Cryptology, 2013, Vol. 26, (2), pp. 313-339.
- Bogdanov, A., Knežević, M., Leander, G., Toz, D., Varıcı, K., and Verbauwhede, I., SPONGENT: A Lightweight Hash Function. Proc. 13th International Workshop on Cryptographic Hardware and Embedded Systems (CHES 2011), Nara, Japan, September 28 – October 1, 2011, LNCS 6917, pp. 312-325.
- Hirose, S., Ideguchi, K., Kuwakado, H., Owada, T., Preneel, B., and Yoshida, H., A Lightweight 256-Bit Hash Function for Hardware and Low-End Devices: Lesamnta-LW. Proc. 13th International Conference on Information Security and Cryptology (ICISC 2010), Seoul, Korea, December 1-3, 2010, LNCS 6829, pp. 151-168.
- Poschmann, A.Y.: Lightweight Cryptography: Cryptographic Engineering for a Pervasive World. Ph.D. Thesis, Ruhr University Bochum, 2009.
- Mouha, N., Mennink, B., Van Herrewege, A., Watanabe, D., Preneel, B., and Verbauwhede, I., Chaskey: An Efficient MAC Algorithm for 32-bit Microcontrollers. Proc. 21st International Conference on Selected Areas in Cryptography (SAC 2014), Montreal, QC, Canada, August 14-15, 2014, LNCS 8781, pp. 306-323.
- Gong, Z., Hartel, P., Nikova, S., Tang, S.H., and Zhu, B., TuLP: A Family of Lightweight Message Authentication Codes for Body Sensor Networks, Journal of Computer Science and Technology, 2014, Vol. 29, (1), pp. 53-68.
- ISO, ISO/IEC 29167-10:2015, Information Technology - Automated Identification and Data Capture Techniques - Part 10: Crypto Suite AES-128 Security Services for Air Interface Communications, 2015.
- S. Khan, M. S. Ibrahim, M. Ebrahim, and H. Amjad, “FPGA implementation of secure force (64-bit) Low Complexity Encryption Algorithm”, International Journal of Computer Network and Information Security, Vol. 7, No. 12, p. 60, 2015.