†" /> 期刊论文

期刊论文详细信息
Sensors
Butterfly Encryption Scheme for Resource-Constrained Wireless Networks
Raghav V. Sampangi1  Srinivas Sampalli2 
[1] Faculty of Computer Science, Dalhousie University, 6050 University Ave., PO Box 15000, Halifax, NS B3H 4R2, Canada; E-Mail
关键词: security;    key management;    authentication;    resource-constrained wireless networks;    RFID;    Wireless Body Area Networks;   
DOI  :  10.3390/s150923145
来源: mdpi
PDF
【 摘 要 】

Resource-constrained wireless networks are emerging networks such as Radio Frequency Identification (RFID) and Wireless Body Area Networks (WBAN) that might have restrictions on the available resources and the computations that can be performed. These emerging technologies are increasing in popularity, particularly in defence, anti-counterfeiting, logistics and medical applications, and in consumer applications with growing popularity of the Internet of Things. With communication over wireless channels, it is essential to focus attention on securing data. In this paper, we present an encryption scheme called Butterfly encryption scheme. We first discuss a seed update mechanism for pseudorandom number generators (PRNG), and employ this technique to generate keys and authentication parameters for resource-constrained wireless networks. Our scheme is lightweight, as in it requires less resource when implemented and offers high security through increased unpredictability, owing to continuously changing parameters. Our work focuses on accomplishing high security through simplicity and reuse. We evaluate our encryption scheme using simulation, key similarity assessment, key sequence randomness assessment, protocol analysis and security analysis.

【 授权许可】

CC BY   
© 2015 by the authors; licensee MDPI, Basel, Switzerland.

【 预 览 】
附件列表
Files Size Format View
RO202003190006305ZK.pdf 909KB PDF download
  文献评价指标  
  下载次数:2次 浏览次数:11次