Wireless Multimedia Sensor Network (WMSN) is an advancement of Wireless Sensor Network (WSN) that encapsulates WSN with multimedia information like image and video. The primary factors considered in the design and deployment of WSN are low power consumption, high speed and memory requirements. Security is indeed a major concern, in any communication system. Consequently, design of compact and high speed WMSN with cryptography algorithm for security, without compromising on sensor node performance is a challenge and this paper proposes a new lightweight symmetric key encryption algorithm based on 1 D cellular automata theory. Simulations are performed using MatLab and synthesized using Xilinx ISE. The proposed approach supports both software and hardware implementation and provides better performance compared to other existing algorithms in terms of number of slices, throughput and other hardware utilization.
References
[1]
Misra, S., Reisslein, M. and Xue, G.L. (2008) A Survey of Multimedia Streaming in Wireless Sensor Networks. IEEE Communications Surveys and Tutorials, 10, 18-39. http://dx.doi.org/10.1109/SURV.2008.080404
[2]
Gures, E. and Akan, O.B. (2005) Multimedia Communication in Wireless Sensor Networks. Proceedings Annals of Telecommunications, 60, 799-827.
[3]
Augusto, M., Claudionor, M.M., Diogenes, N.C. and Silva, C.D. (2003) Survey on Wireless Sensor Network Devices. Proceedings of IEEE Emerging Technologies and Factory Automation, 1, 537-544.
[4]
Sarkar, P. (2000) A Brief History of Cellular Automata. Journal of ACM Computing Surveys (CSUR), 32, 80-107. http://dx.doi.org/10.1145/349194.349202
[5]
Nandi, S., Kar, B.K. and Chaudhuri, P.P. (1994) Theory and Application of Cellular Automata in Cryptography. IEEE Transaction on Computers, 43, 1346-1357. http://dx.doi.org/10.1109/12.338094
[6]
Wolfram, S. (1986) Cryptography with Cellular Automata. Crypto’85, LNCS 218, Springer-Verlag, 429-432. http://dx.doi.org/10.1007/3-540-39799-x_32
[7]
Koc, C.K. and Apohan, A.M. (1997) Inversion of Cellular Automata Iteration. IEE Proceedings of Computer and Digital Technique, 144, 279-284. http://dx.doi.org/10.1049/ip-cdt:19971518
[8]
Blackburn, S., Murphy, S., Paterson, K., et al. (1997) Comments on Theory and Application of Cellular Automata in Cryptography. IEEE Transactions on Computers, 46, 637-639. http://dx.doi.org/10.1109/12.589245
[9]
Tripathy, S. and Nandi, S. (2009) LCASE: Lightweight Cellular Automata-based Symmetric-key Encryption. International Journal of Network Security, 8, 243-252.
[10]
Jegadish Kumar, K.J., Chenna Kesava Reddy, K. and Salivahanan, S. (2011) Novel and Efficient Cellular Automata based Symmetric Key Encryption Algorithm for Wireless Sensor Networks. International Journal of Computer Applications (IJCA), 13, 30-37. http://dx.doi.org/10.5120/1767-2424
[11]
Sen, S., Shaw, C., Chowdhuri, D.R., Ganguly, N. and Pal Chaudhuri, P. (2002) Cellular Automata Based Cryptosystem (CAC). Information and Communications Security, Springer-Verlag, 303-314. http://dx.doi.org/10.1007/3-540-36159-6_26
[12]
Han, S.J., Oh, H.-S. and Park, J. (1996) The Improved Data Encryption Standard (DES) Algorithm. Proceedings of IEEE 4th International Symposium on Spread Spectrum Techniques and Applications, Volume 3, Mainz, 22-25 September 1996, 1310-1314.
[13]
Meyers, R.K. and Desoky, A.H. (2008) An Implementation of the Blowfish Cryptosystem. IEEE International Symposium on Signal Processing and Information Technology, Sarajevo, 16-19 December 2008, 346-351.
[14]
Fang, R., Ying-Jian, Y. and Xiao-Bing, F. (2009) A Small and Efficient Hardware Implementation of the KASUMI. International Conference on Information Engineering, Taiyuan, 10-11 July 2009, 377-380.
[15]
Israsena, P. (2006) Securing Ubiquitous and Low-Cost RFID Using Tiny Encryption Algorithm. Proceedings of the 1st International Symposium on Wireless Pervasive Computing, Phuket, 16-18 January 2006. http://dx.doi.org/10.1109/iswpc.2006.1613621
[16]
Israsena, P. (2006) On XTEA-Based Encryption/Authentication Core for Wireless Pervasive Communication. International Symposium on Communications and Information Technologies, Bangkok, 18 October-20 September 2006, 59-62. http://dx.doi.org/10.1109/iscit.2006.339887
[17]
Pramstaller, N., Mangard, S., Dominikus, S. and Wolkerstorfer, J. (2004) Efficient AES Implementations on ASICs and FPGAs. Proceedings ofthe Fourth Workshop on the Advanced Encryption Standard (AES)—State of the Crypto Analysis, Volume 3373 of LNCS, Springer-Verlag, 98-112.
[18]
Standaert, F.X., Rouvroy, G., Quisquater, J.J. and Legat, J.D. (2003) Efficient Implementation of Rijndael Encryption in Reconfigurable Hardware: Improvements and Design Tradeoffs. Proceedings of Cryptography Hardware Embedded devices (CHES), Volume 2779 of the series Lecture Notes in Computer Science, 334-350. http://dx.doi.org/10.1007/978-3-540-45238-6_27
[19]
Mace, F., Standaert, F.X. and Quisquater, J.J. (2008) FPGA Implementation(s) of a Scalable Encryption Algorithm. IEEE Transactions on VLSI Systems, 16, 212-216. http://dx.doi.org/10.1109/TVLSI.2007.904139
[20]
Jegadish Kumar, K.J., Salivahanan, S. and Chenna Kesava Reddy, K. (2010) Implementation of Low Power Scalable Encryption Algorithm. International Journal of Computer Applications, 11, 14-18.
[21]
Standaert, F.X., Rouvroy, G., Quisquater, J.J. and Legat, J.D. (2003) A Methodology to Implement Block Cipher in Reconfigurable Hardware and Its Application to Fast and Compact AES RIJNDAEL. 11th ACM International Symposium on Field-Programmable Gate Arrays (FPGA’03), 216-224.
[22]
Leander, G., Paar, C., Poschmann, A. and Schramm, K. (2007) New Lightweight DES Variants. Proceedings of FSE’07, Volume 4593 of LNCS, Springer-Verlag, 196-220. http://dx.doi.org/10.1007/978-3-540-74619-5_13
[23]
Bogdanov, A., Knudsen, L.R., Leander, G., Paar, C., Poschmann, A., Robshaw, M.J.B., Seurin, Y. and Vikkelsoe, C. (2007) PRESENT: An Ultra-Lightweight Block Cipher. Proceedings of CHES’07, Volume 4727 of LNCS, Springer-Verlag, 450-466. http://dx.doi.org/10.1007/978-3-540-74735-2_31
[24]
Wheeler, D. and Needham, R. (1997) TEA Extensions. Technical Report, Computer Laboratory, University of Cambridge, Cambridge.