TY - GEN
T1 - A comparative analysis of hc-128 and rabbit encryption schemes for pervasive computing in WSN environment
AU - Kausar, Firdous
AU - Naureen, Ayesha
PY - 2009
Y1 - 2009
N2 - Confidentiality, integrity and availability (CIA) are the three basic requirements for an encryption mechanism utilized in any security architecture. Implementation of such a comprehensive security framework for pervasive computing environment, specifically in wireless sensor networks (WSN), is not feasible in the context of scarce resource availability and its efficient utilization. Application of stream ciphers for conventional security applications has proved to be proficient in terms of efficient energy and memory consumption. This paper presents WSN-specific NesC based implementations of two stream ciphers selected from the eSTREAM project, namely HC-128 and Rabbit. HC-128 and Rabbit have both qualified for the final portfolio phase of the eSTREAM project but their suitability for WSNs needs to be justified in a totally different context. If the two stream ciphers manage to adhere to the WSN-specific requirements and perform efficiently under these requirements only then the scheme/s can be classified as suitable. This paper tends to test the suitability of HC-128 and Rabbit for WSN-specific environment and evaluates the schemes in terms of memory usage, time consumption and energy utilization. The aim of this study is to present either one of the two schemes as an efficient solution for pervasive computing.
AB - Confidentiality, integrity and availability (CIA) are the three basic requirements for an encryption mechanism utilized in any security architecture. Implementation of such a comprehensive security framework for pervasive computing environment, specifically in wireless sensor networks (WSN), is not feasible in the context of scarce resource availability and its efficient utilization. Application of stream ciphers for conventional security applications has proved to be proficient in terms of efficient energy and memory consumption. This paper presents WSN-specific NesC based implementations of two stream ciphers selected from the eSTREAM project, namely HC-128 and Rabbit. HC-128 and Rabbit have both qualified for the final portfolio phase of the eSTREAM project but their suitability for WSNs needs to be justified in a totally different context. If the two stream ciphers manage to adhere to the WSN-specific requirements and perform efficiently under these requirements only then the scheme/s can be classified as suitable. This paper tends to test the suitability of HC-128 and Rabbit for WSN-specific environment and evaluates the schemes in terms of memory usage, time consumption and energy utilization. The aim of this study is to present either one of the two schemes as an efficient solution for pervasive computing.
KW - H-128
KW - Pervasive Computing
KW - Rabbit
KW - Stream Ciphers
KW - Wireless Sensor Network (WSN)
UR - http://www.scopus.com/inward/record.url?scp=70350648509&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=70350648509&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-02617-1_69
DO - 10.1007/978-3-642-02617-1_69
M3 - Conference contribution
AN - SCOPUS:70350648509
SN - 3642026168
SN - 9783642026164
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 682
EP - 691
BT - Advances in Information Security and Assurance - Third International Conference and Workshops, ISA 2009, Proceedings
T2 - 3rd International Conference on Information Security and Assurance, ISA 2009
Y2 - 25 June 2009 through 27 June 2009
ER -