Cargando…

Butterfly Encryption Scheme for Resource-Constrained Wireless Networks †

Resource-constrained wireless networks are emerging networks such as Radio Frequency Identification (RFID) and Wireless Body Area Networks (WBAN) that might have restrictions on the available resources and the computations that can be performed. These emerging technologies are increasing in populari...

Descripción completa

Detalles Bibliográficos
Autores principales: Sampangi, Raghav V., Sampalli, Srinivas
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2015
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4610504/
https://www.ncbi.nlm.nih.gov/pubmed/26389899
http://dx.doi.org/10.3390/s150923145
_version_ 1782395951957147648
author Sampangi, Raghav V.
Sampalli, Srinivas
author_facet Sampangi, Raghav V.
Sampalli, Srinivas
author_sort Sampangi, Raghav V.
collection PubMed
description Resource-constrained wireless networks are emerging networks such as Radio Frequency Identification (RFID) and Wireless Body Area Networks (WBAN) that might have restrictions on the available resources and the computations that can be performed. These emerging technologies are increasing in popularity, particularly in defence, anti-counterfeiting, logistics and medical applications, and in consumer applications with growing popularity of the Internet of Things. With communication over wireless channels, it is essential to focus attention on securing data. In this paper, we present an encryption scheme called Butterfly encryption scheme. We first discuss a seed update mechanism for pseudorandom number generators (PRNG), and employ this technique to generate keys and authentication parameters for resource-constrained wireless networks. Our scheme is lightweight, as in it requires less resource when implemented and offers high security through increased unpredictability, owing to continuously changing parameters. Our work focuses on accomplishing high security through simplicity and reuse. We evaluate our encryption scheme using simulation, key similarity assessment, key sequence randomness assessment, protocol analysis and security analysis.
format Online
Article
Text
id pubmed-4610504
institution National Center for Biotechnology Information
language English
publishDate 2015
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-46105042015-10-26 Butterfly Encryption Scheme for Resource-Constrained Wireless Networks † Sampangi, Raghav V. Sampalli, Srinivas Sensors (Basel) Article Resource-constrained wireless networks are emerging networks such as Radio Frequency Identification (RFID) and Wireless Body Area Networks (WBAN) that might have restrictions on the available resources and the computations that can be performed. These emerging technologies are increasing in popularity, particularly in defence, anti-counterfeiting, logistics and medical applications, and in consumer applications with growing popularity of the Internet of Things. With communication over wireless channels, it is essential to focus attention on securing data. In this paper, we present an encryption scheme called Butterfly encryption scheme. We first discuss a seed update mechanism for pseudorandom number generators (PRNG), and employ this technique to generate keys and authentication parameters for resource-constrained wireless networks. Our scheme is lightweight, as in it requires less resource when implemented and offers high security through increased unpredictability, owing to continuously changing parameters. Our work focuses on accomplishing high security through simplicity and reuse. We evaluate our encryption scheme using simulation, key similarity assessment, key sequence randomness assessment, protocol analysis and security analysis. MDPI 2015-09-15 /pmc/articles/PMC4610504/ /pubmed/26389899 http://dx.doi.org/10.3390/s150923145 Text en © 2015 by the authors; licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Sampangi, Raghav V.
Sampalli, Srinivas
Butterfly Encryption Scheme for Resource-Constrained Wireless Networks †
title Butterfly Encryption Scheme for Resource-Constrained Wireless Networks †
title_full Butterfly Encryption Scheme for Resource-Constrained Wireless Networks †
title_fullStr Butterfly Encryption Scheme for Resource-Constrained Wireless Networks †
title_full_unstemmed Butterfly Encryption Scheme for Resource-Constrained Wireless Networks †
title_short Butterfly Encryption Scheme for Resource-Constrained Wireless Networks †
title_sort butterfly encryption scheme for resource-constrained wireless networks †
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4610504/
https://www.ncbi.nlm.nih.gov/pubmed/26389899
http://dx.doi.org/10.3390/s150923145
work_keys_str_mv AT sampangiraghavv butterflyencryptionschemeforresourceconstrainedwirelessnetworks
AT sampallisrinivas butterflyencryptionschemeforresourceconstrainedwirelessnetworks