Sie sind auf Seite 1von 18

LIGHTWEIGHT SECURITY

ALGORITHM FOR WIRELESS


NODE CONNECTED WITH IOT
AUTHORS
D Aakash
P Shanthi

Presented by
NAME:

D. Aakash

COURSE: M.Tech -Embedded Systems


SASTRA UNIVERSITY

CONTENTS
Objective
Introduction
Literature Survey
Related works
Proposed scheme
Block Diagram
Design Flow Diagram
Hardware Output
Conclusion

OBJECTIVE
To determine a Lightweight Security Encryption algorithm

for Resource Constrained Application


In this, the combination of Substitution and Permutation is

used to bring out a cipher that can withstand certain


cryptanalysis
Implementation of the algorithm in a prototype that

securely share sensor data for IoT application

Introduction
Wireless Sensor Network is a wide field that only rely on the

sensor data.
IoT (Internet of thing) is an extension of WSN ,where we use

cloud for transmission and reception of data anywhere .


Major factor considered
Resource
Memory
Power
Execution Time
Security algorithm must be a trade off to all these factors

Internet Of Things
Kevin Ashton coined "Internet of Things" phrase to

describe a system where the Internet is connected to the


physical world via ubiquitous sensors
Key Open Issues of the IoT
Architecture (edge devices, servers, discovery services, privacy
etc.)
security
Governance, naming, identity, interfaces
Service openness, interoperability
Connections of real and virtual world
Spectrum (HF, UHF, ISM etc.?)
Standards

Lightweight Cryptography
Symmetric Cryptography Vs Asymmetric Cryptography
Block and Stream Cipher
Why Block Cipher?
Security
Higher Throughput
Low power Consumption
Compactness
Less Gate Equivalents

Literature Survey
S.NO
1.

PAPER TITLE
PUBLICATION
A comprehensive
Journal of Network and
survey of modern
Computer Applications
symmetric
cryptographic solutions
for resource
constrained
environments

DESCRIPTION
Survey of various LWC algorithms.

2.

Lightweight
Cryptography for
FPGAs

International Conference on Propose lightweight cryptography


Reconfigurable Computing for FPGAs by introducing block
and FPGAs, 2009
cipher independent optimization
techniques for Xilinx Spartan3
FPGAs and applying them to the
lightweight cryptographic algorithms
HIGHT and Present.

3.

Design &
Implementation of an
Encryption Algorithm
for use in RFID
System

International Journal of
RFID Security and
Cryptography (IJRFIDSC),
March/June 2012

The Tiny Encryption Algorithm (TEA)


is a
suitable lightweight cryptographic
algorithm used in medium security
systems such as RFID systems.

4.

Performance Analysis of IOSR Journal of Computer


New Light Weight
Engineering (IOSRJCE) ,
Cryptographic
2012
Algorithms

Humming Bird-2 and PRESENT are


two recently proposed Light weight
cryptographic algorithms .
Performance analyses of these two
efficient algorithms are done in this
paper.

5.

PRESENTAn ultralightweight block cipher


in Cryptographic
Hardware and
Embedded Systems

Springer, 2007
vol. 4727

Substitution Permutation network for


Extremely resource constrained
Only commensurate level of security
High execution Time
Latency

6.

The 128
bit block cipher CLEFIA
in Fast Software
Encryption

Springer, 2007
vol. 4593

Fiestal structure with Substitution


box More secure
Consume more space due to larger
number of rounds

7.

TEA, a tiny encryption


algorithm
in Fast Software
Encryption

Springer, 1994
vol. 1008

Simplest algorithm
Few lines of code
Easily breakable

Related Works
Method

Description

Limitation

PRESENT

Substitution Permutation network


for Extremely resource
constrained

Only commensurate level


of security
High execution Time
Latency

LED

Combination of PRESENT AES


SPN

Faster in software and


slower in Hardware
Consumes more energy
in hardware

CLEFIA

Fiestal structure with Substitution


box
More secure

Consume more space


due to larger number of
rounds

TEA

Simplest algorithm
Few lines of code

Easily breakable

SEA

Latency is less
Fiestal Structure

Gate equivalent is higher


hence memory required is
more

PROPOSED SCHEME:
GRP :A BIT PERMUTATION INSTRUSTION
Permutation
GRP

Merit
Uses lesser memory and
less GE Count
Better cryptographic
properties

Demerit
Number of stages varies
with number of bits
Latency increase with
bits size increases

OMFLIP
(Omega-Flip)

Operate in single cycle and


uses Fixed number of
stages for permuting
Less Latency

Easily reversible

DDR
(Data-Dependent
rotation)

Easy to implement only for


small fraction of bitwise
operation

Latency is more and


require more cycles

PPERM3R

In this the control bit is


easy to generate support
repetition and result in the
middle of permutation can
be obtained

Latency is more
Initialization process
takes time
2n permutation is harder
from n permutation

Table Lookup

This method is faster


And easy to implement in
Hardware

It consumes more
memory, latency is more
and require more number
of instructions

8 bit GRP permutation

TRANSPOSITION CIPHER
GRP bit level permutation uses less memory
Therefore power consumption is also less

PRESENT-GRP: A NEW HYBRID


LIGHTWEIGHT DESIGN
GRP Permutation
Simple structure
use Less Memory space
GRP Bit Permutation lags in S-box

S-Box is selected from PRESENT algorithm is Added


Hybrid Structure consist of one Confusion and one Diffusion

property
Lesser Gate equivalent

Block Diagram

Security Analysis
Differential Cryptanalysis
It is used to explore the strength of the algorithm by checking its

non-random behavior by giving certain differences in the input and


output to check it is highly probable that is a highly secure block
cipher

Linear Cryptanalysis
It is done with the Walsh Transform which describes the closeness

of the Boolean function f to whether it is affine or linear function

Design Flow Diagram

Hardware Output

Conclusion
Enhance the security level and balance trade off with

performance and cost.


Security level can be improved by modifying and enhancing the

Substitution box of the algorithm


To develop a secure end to end efficient system.
Hardware implementation in low power nodes without affecting

its normal performance


Hardware implementation for WSN secure channel can be

done

THANK YOU

Das könnte Ihnen auch gefallen