LOCHA: A Light-Weight One-way Cryptographic Hash Algorithm for Wireless Sensor Network

被引:27
作者
Chowdhury, Amrita Roy [1 ]
Chatterjee, Tanusree [2 ]
DasBit, Sipra [1 ]
机构
[1] Bengal Engn & Sci Univ, Dept Comp Sci & Tech, Sibpur, Howrah, India
[2] Regent Educ & Res Fdn Grp Inst, Dept Comp Sci & Engn, Kolkata, India
来源
5TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT-2014), THE 4TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY (SEIT-2014) | 2014年 / 32卷
关键词
Cryptographic hash function; wireless sensor network; mote class attacker; avalanche effect; MD5;
D O I
10.1016/j.procs.2014.05.453
中图分类号
TP18 [人工智能理论];
学科分类号
140502 [人工智能];
摘要
Cryptographic hash functions are used to protect the authenticity of information. Some of the most popular and commonly used cryptographic hash algorithms are MD5, SHA1, RIPEMD. These hash algorithms are used in a wide variety of security applications e.g. securing node/message in traditional networks. However, the commonly used hash algorithms require huge computational overhead which is not affordable by applications in energy-starved network e. g. wireless sensor network (WSN). In these applications the major constraints are communication, computation and storage overheads; out of which communication and computation overheads consume high energy. Keeping this fact in mind, in this paper, a light-weight, one-way, cryptographic hash algorithm is developed with a target to produce a hash-digest with fixed and relatively small length for such an energy-starved wireless network. The primary focus is making the algorithm light-weight so that upon using it in application of network like WSN, the nodes can successfully run the algorithm with low energy. We claim the algorithm fulfils all the basic properties such as preimage resistance, collision resistance of a one-way unkeyed hash function. Finally the comparative usability of the hash algorithm in the said application domain is worked out and that shows the dominance of our scheme over two of the state-of-the-art hashing schemes. (C) 2014 Published by Elsevier B.V.
引用
收藏
页码:497 / 504
页数:8
相关论文
共 19 条
[1]
Wireless sensor networks: a survey [J].
Akyildiz, IF ;
Su, W ;
Sankarasubramaniam, Y ;
Cayirci, E .
COMPUTER NETWORKS, 2002, 38 (04) :393-422
[2]
Whirlwind: a new cryptographic hash function [J].
Barreto, Paulo ;
Nikov, Ventzislav ;
Nikova, Svetla ;
Rijmen, Vincent ;
Tischhauser, Elmar .
DESIGNS CODES AND CRYPTOGRAPHY, 2010, 56 (2-3) :141-162
[3]
Dahmen Erik, 2009, 8 INT C CRYPT NETW S
[4]
DAS ML, 2004, IEEE T CONSUMER ELEC, V50
[5]
Cryptanalysis of MD4 [J].
Dobbertin, H .
JOURNAL OF CRYPTOLOGY, 1998, 11 (04) :253-271
[6]
Dong XM, 2009, 2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, P4529
[7]
Fuh-Gwo Jeng, 2010, Journal of Networks, V5, P921, DOI 10.4304/jnw.5.8.921-928
[8]
A dynamic TDMA based scheme for securing query processing in WSN [J].
Ghosal, Amrita ;
Halder, Subir ;
DasBit, Sipra .
WIRELESS NETWORKS, 2012, 18 (02) :165-184
[9]
Survey of Hardware Systems for Wireless Sensor Networks [J].
Hempstead, Mark ;
Lyons, Michael J. ;
Brooks, David ;
Wei, Gu-Yeon .
JOURNAL OF LOW POWER ELECTRONICS, 2008, 4 (01) :11-20
[10]
Jararweh Y., 2012, J. Inf. Secur, V3, P69, DOI [10.4236/jis.2012.32008, DOI 10.4236/JIS.2012.32008]