Survey and Benchmark of Block Ciphers for Wireless Sensor Networks

Y.W. Law, J.M. Doumen, Pieter H. Hartel

Research output: Contribution to journalArticleAcademicpeer-review

181 Citations (Scopus)
122 Downloads (Pure)

Abstract

Cryptographic algorithms play an important role in the security architecture of wireless sensor networks (WSNs). Choosing the most storage- and energy-efficient block cipher is essential, due to the facts that these networks are meant to operate without human intervention for a long period of time with little energy supply, and that available storage is scarce on these sensor nodes. However, to our knowledge, no systematic work has been done in this area so far.We construct an evaluation framework in which we first identify the candidates of block ciphers suitable for WSNs, based on existing literature and authoritative recommendations. For evaluating and assessing these candidates, we not only consider the security properties but also the storage- and energy-efficiency of the candidates. Finally, based on the evaluation results, we select the most suitable ciphers for WSNs, namely Skipjack, MISTY1, and Rijndael, depending on the combination of available memory and required security (energy efficiency being implicit). In terms of operation mode, we recommend Output Feedback Mode for pairwise links but Cipher Block Chaining for group communications.
Original languageUndefined
Article number10.1145/1138127.1138130
Pages (from-to)65-93
Number of pages29
JournalACM transactions on sensor networks
Volume2
Issue number1/1
DOIs
Publication statusPublished - Feb 2006

Keywords

  • EC Grant Agreement nr.: FP5/34734
  • IR-62863
  • METIS-237388
  • EWI-1923
  • SCS-Cybersecurity

Cite this

@article{d3ee2f2cd47c40be897964c88a750425,
title = "Survey and Benchmark of Block Ciphers for Wireless Sensor Networks",
abstract = "Cryptographic algorithms play an important role in the security architecture of wireless sensor networks (WSNs). Choosing the most storage- and energy-efficient block cipher is essential, due to the facts that these networks are meant to operate without human intervention for a long period of time with little energy supply, and that available storage is scarce on these sensor nodes. However, to our knowledge, no systematic work has been done in this area so far.We construct an evaluation framework in which we first identify the candidates of block ciphers suitable for WSNs, based on existing literature and authoritative recommendations. For evaluating and assessing these candidates, we not only consider the security properties but also the storage- and energy-efficiency of the candidates. Finally, based on the evaluation results, we select the most suitable ciphers for WSNs, namely Skipjack, MISTY1, and Rijndael, depending on the combination of available memory and required security (energy efficiency being implicit). In terms of operation mode, we recommend Output Feedback Mode for pairwise links but Cipher Block Chaining for group communications.",
keywords = "EC Grant Agreement nr.: FP5/34734, IR-62863, METIS-237388, EWI-1923, SCS-Cybersecurity",
author = "Y.W. Law and J.M. Doumen and Hartel, {Pieter H.}",
note = "10.1145/1138127.1138130",
year = "2006",
month = "2",
doi = "10.1145/1138127.1138130",
language = "Undefined",
volume = "2",
pages = "65--93",
journal = "ACM transactions on sensor networks",
issn = "1550-4859",
publisher = "Association for Computing Machinery (ACM)",
number = "1/1",

}

Survey and Benchmark of Block Ciphers for Wireless Sensor Networks. / Law, Y.W.; Doumen, J.M.; Hartel, Pieter H.

In: ACM transactions on sensor networks, Vol. 2, No. 1/1, 10.1145/1138127.1138130, 02.2006, p. 65-93.

Research output: Contribution to journalArticleAcademicpeer-review

TY - JOUR

T1 - Survey and Benchmark of Block Ciphers for Wireless Sensor Networks

AU - Law, Y.W.

AU - Doumen, J.M.

AU - Hartel, Pieter H.

N1 - 10.1145/1138127.1138130

PY - 2006/2

Y1 - 2006/2

N2 - Cryptographic algorithms play an important role in the security architecture of wireless sensor networks (WSNs). Choosing the most storage- and energy-efficient block cipher is essential, due to the facts that these networks are meant to operate without human intervention for a long period of time with little energy supply, and that available storage is scarce on these sensor nodes. However, to our knowledge, no systematic work has been done in this area so far.We construct an evaluation framework in which we first identify the candidates of block ciphers suitable for WSNs, based on existing literature and authoritative recommendations. For evaluating and assessing these candidates, we not only consider the security properties but also the storage- and energy-efficiency of the candidates. Finally, based on the evaluation results, we select the most suitable ciphers for WSNs, namely Skipjack, MISTY1, and Rijndael, depending on the combination of available memory and required security (energy efficiency being implicit). In terms of operation mode, we recommend Output Feedback Mode for pairwise links but Cipher Block Chaining for group communications.

AB - Cryptographic algorithms play an important role in the security architecture of wireless sensor networks (WSNs). Choosing the most storage- and energy-efficient block cipher is essential, due to the facts that these networks are meant to operate without human intervention for a long period of time with little energy supply, and that available storage is scarce on these sensor nodes. However, to our knowledge, no systematic work has been done in this area so far.We construct an evaluation framework in which we first identify the candidates of block ciphers suitable for WSNs, based on existing literature and authoritative recommendations. For evaluating and assessing these candidates, we not only consider the security properties but also the storage- and energy-efficiency of the candidates. Finally, based on the evaluation results, we select the most suitable ciphers for WSNs, namely Skipjack, MISTY1, and Rijndael, depending on the combination of available memory and required security (energy efficiency being implicit). In terms of operation mode, we recommend Output Feedback Mode for pairwise links but Cipher Block Chaining for group communications.

KW - EC Grant Agreement nr.: FP5/34734

KW - IR-62863

KW - METIS-237388

KW - EWI-1923

KW - SCS-Cybersecurity

U2 - 10.1145/1138127.1138130

DO - 10.1145/1138127.1138130

M3 - Article

VL - 2

SP - 65

EP - 93

JO - ACM transactions on sensor networks

JF - ACM transactions on sensor networks

SN - 1550-4859

IS - 1/1

M1 - 10.1145/1138127.1138130

ER -