By Topic

Linear cryptanalysis of a survivable data transmission mechanism for sensor networks

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
Ruiping Ma ; College of Engineering, University of Massachusetts, Dartmouth, 02747, USA ; Liudong Xing ; Howard E. Michel ; Vinod M. Vokkarane

Wireless sensor networks (WSN) are being used in a wide range of application areas, such as national security, attack and disaster preparation and response, military surveillance, and medical care. All these applications require a certain level of reliability and security during data transmission. Data loss or corruption in WSN may be due to hardware failures, wireless channel noises, or malicious attacks. To overcome all these inevitable factors, we have recently presented a selective hybrid cipher (SHC) based algorithm that integrates selective encryption and forward error correction codes for achieving simultaneously secure and reliable data transmission in resource-constrained WSN. In this work, we implement an instance of the SHC-based data transmission mechanism using AES and Reed-Solomon codes, and analyze its security property using the linear cryptanalysis (LC) technique. The LC analysis results of the SHC-based algorithm are compared with those of the traditional DES and AES algorithms. Comparison results show that the SHC design has inherent LC attack resistance and is stronger than DES. The results also show that the proposed SHC-based mechanism can provide security-level that is comparable to AES with the improvement in computational complexity and reduction in energy consumption.

Published in:

Homeland Security (HST), 2012 IEEE Conference on Technologies for

Date of Conference:

13-15 Nov. 2012