| Literature DB >> 26389899 |
Raghav V Sampangi1, Srinivas Sampalli2.
Abstract
Resource-constrained wireless networks are emerging networks such as Radio Frequency Identification (RFID) and Wireless Body Area Networks (WBAN) that might have restrictions on the available resources and the computations that can be performed. These emerging technologies are increasing in popularity, particularly in defence, anti-counterfeiting, logistics and medical applications, and in consumer applications with growing popularity of the Internet of Things. With communication over wireless channels, it is essential to focus attention on securing data. In this paper, we present an encryption scheme called Butterfly encryption scheme. We first discuss a seed update mechanism for pseudorandom number generators (PRNG), and employ this technique to generate keys and authentication parameters for resource-constrained wireless networks. Our scheme is lightweight, as in it requires less resource when implemented and offers high security through increased unpredictability, owing to continuously changing parameters. Our work focuses on accomplishing high security through simplicity and reuse. We evaluate our encryption scheme using simulation, key similarity assessment, key sequence randomness assessment, protocol analysis and security analysis.Entities:
Keywords: RFID; Wireless Body Area Networks; authentication; key management; resource-constrained wireless networks; security
Year: 2015 PMID: 26389899 PMCID: PMC4610504 DOI: 10.3390/s150923145
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1Working of the proposed encryption scheme [8].
Figure 2Protocol of Operation (Generalized Version of the Protocol Presented in [8]).
Message Code () format and description [8].
| MC | Bit Pattern | Description |
|---|---|---|
|
| 00 | First message sent by Alice |
|
| 01 | Response sent by Bob (Equation ( |
|
| 10 | Acknowledgement sent by Alice (Equation ( |
|
| 11 | Special message: Instructs Bob to update |
| its PRNG seed, if Alice is valid (Equation ( |
Figure 3A Typical WBAN System [29].
Figure 4Variation in coefficients. (a) Butterfly (); (b) Butterfly (); (c) Liu et al.’s proposal; (d) Zhu et al.’s proposal; (e) Dong et al.’s proposal.
Summary of similarity between keys.
| Configuration | Average SSI ( |
|---|---|
| Butterfly ( | 0.3809 |
| Butterfly ( | 0.3833 |
| Liu | 0.3826 |
| Zhu | 0.4110 |
| Dong | 0.3815 |
NIST STS Assessment: Summary of results (Number of sequences out of 10,000 that passed each test).
| Configuration (Keys Considered) | FM Test | FB Test | Runs Test | LR Test | DFT Test |
|---|---|---|---|---|---|
| Butterfly ( | 9895 | 9908 | 9906 | 9896 | 9862 |
| Butterfly ( | 9906 | 9906 | 10,000 | 9917 | 10,000 |
| Liu | 9913 | 9914 | 9888 | 9912 | 9837 |
| Zhu | 9891 | 9892 | 9892 | 9886 | 9832 |
| Dong | 9898 | 9926 | 9890 | 9894 | 9833 |
: Frequency (Monobit) Test; : Frequency Test within a Block; : Longest Runs of Ones in a Block; : Discrete Fourier Transform (Spectral Test).
Logic Circuit Estimation.
| Logic Circuit | Count |
|---|---|
| PRNG | |
| Addition | |
| XOR * | |
| NOT (Invert) | 1 bit |
| MUX (Multiplexer) |
* XOR is used for encryption and as combination function in our scheme.
Results: Evaluation of the Protocol Using Scyther [8].
| Claim | Bob | Alice | ||
|---|---|---|---|---|
| Secret | OK | NAWB * | OK | NAWB |
| Secret | OK | NAWB | OK | NAWB |
| Secret | OK | NAWB | OK | NAWB |
| Secret | OK | NAWB | OK | NAWB |
| Secret | OK | NAWB | OK | NAWB |
| Secret | OK | NAWB | OK | NAWB |
| Secret | OK | NAWB | OK | NAWB |
| Secret | OK | NAWB | OK | NAWB |
| Secret | OK | NAWB | OK | NAWB |
| Secret | OK | NAWB | OK | NAWB |
| Secret | OK | NAWB | OK | NAWB |
| OK | NA-Verified | OK | NAWB | |
| OK | NA-Verified | OK | NAWB | |
| OK | NAWB | OK | NAWB | |
| OK | NAWB | OK | NAWB | |
* NAWB = No attacks, within bounds; † NA-Verified = No attacks, verified.