A Light Weight Enhancement to RC4 Based Security for Resource Constrained Wireless Devices
نویسندگان
چکیده
The Wired Equivalent Privacy (WEP) uses the 64 bit RC4 secret key stream cipher as its layer 2 security protocol. Although the underlying RC4 cipher is secure, the potential reuse of the same key stream by different frames is a weakness in the WEP. One enhancement to WEP is the Temporal Key Integrity Protocol (TKIP), which acts as a wrapper to the WEP protocol and uses a 128 bit RC4 encryption to eliminate the possibility of key reuse within a given session. However, TKIP cannot be gainfully employed in devices where the 64 bit RC4 encryption is hardwired. Also, with 128 bit encryption TKIP can secure 10 frames per session. Comparing this to the typical number of frames per session (500-1000), it is easy to see that the use of a 128 bit key causes unnecessary drain of power. The Wifi Protected Access (WPA), uses a 128 bit Advanced Encryption Standard (AES) cipher in the Counter-Mode-CBC-MAC Protocol (CCMP). This protocol requires higher computational power than the TKIP and is only intended for devices which possess higher computational power and memory. In this paper, we propose a light weight enhancement to the 64 bit WEP, which provides significant improvement in security (measured as the number of frames securely transmitted before base key change) with small energy and memory overhead. Moreover, our technique can be tailored to the specific needs of resource constrained environments to provide just the necessary level of security. We use the Intrinsyc CerfCube [2] as a resource constrained wireless device and measure the resource consumed by various wireless security protocols on this device. From the experimental results we see that proposed LWE consumes about 62% less power compared to TKIP and 99% less power compared CCMP (AES), while providing a security enhancement of 2 over the WEP protocol. These results demonstrate the utility of LWE as a good security protocol for wireless networks with battery power constrained devices and systems where 64 bit WEP is hardwired.
منابع مشابه
An RC4 based Light Weight Secure Protocol for Sensor Networks
As sensor networks edge closer toward wide-spread deployment, security issues become a central concern. So far, the main research focus has been on making sensor networks feasible and useful, and less emphasis was placed on security. In this paper we present a new light weight secure protocol based on RC4 stream cipher. In addition, we construct an RC4 based one-way hash function, which can be ...
متن کاملA Security Protocol for Wireless Sensor Networks
In this paper, we present an security protocol for Wireless Sensor Networks (WSNs). It is based on the forward and backward property of RC4 states and achieves data confidentiality, data authentication, data integrity, and data freshness with low overhead and simple operation. Furthermore, an RC4-based hash function for the generation of Message Authentication Code (MAC) is presented. The propo...
متن کاملDoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation
Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...
متن کاملLEBRP - A Lightweight and Energy Balancing Routing Protocol for Energy-Constrained Wireless Ad Hoc Networks
A wireless ad hoc network typically refers to any set of wireless networks where all devices have equal status on a network and are free to associate with any other wireless ad hoc network devices in their range. As the nature of these networks, they commonly do not have external power supplies, and each node has a limited internal power source. In this paper, we put forward a new routing proto...
متن کاملCryptography for Resource Constrained Devices: A Survey
Specifically designed and developed cryptographic algorithms, which are suitable for implementation in resource constrained devices such as RFID systems, smart cards and wireless sensor networks are called light weight cryptographic algorithms. In this paper a survey is done on the selected light weight cryptographic algorithms. The light weight cryptographic algorithms are of two types, block ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- I. J. Network Security
دوره 5 شماره
صفحات -
تاریخ انتشار 2007