A Lightweight Authentication Protocol for Secure Communications between Resource-Limited Devices and Wireless Sensor Networks
Piotr Książak,
William Farrelly and
Kevin Curran
Additional contact information
Piotr Książak: Department of Computing, Letterkenny Institute of Technology, Letterkenny, Ireland
William Farrelly: Department of Computing, Letterkenny Institute of Technology, Letterkenny, Ireland
Kevin Curran: Faculty of Computing & Engineering, Ulster University, Londonderry, UK
International Journal of Information Security and Privacy (IJISP), 2014, vol. 8, issue 4, 62-102
Abstract:
The number of Resource-Limited Wireless Devices utilized in many areas of IT is growing rapidly. Some of the applications of these devices pose real security threats that can be addressed using authentication and cryptography. Many of the available authentication and encryption software solutions are predicated on the availability of ample processing power and memory. These demands cannot be met by the majority of ubiquitous computing devices, thus there is a need to apply lightweight cryptography primitives and lightweight authentication protocols that meet these demands in any application of security to devices with limited resources. A security framework is presented here that combines aspects of the Gossamer protocol and the Scalable Encryption Algorithm (SEA) to provide an implementation of inter-device security. The Gossamer Protocol is additionally used as a means of exchanging session keys for use with the SEA encryption protocol. Our system performed well with the code space requirements smaller than 600 bytes (excluding shared libraries) and a performance of 27 milliseconds per one 96-bit block of data.
Date: 2014
References: Add references at CitEc
Citations:
Downloads: (external link)
http://services.igi-global.com/resolvedoi/resolve. ... 018/IJISP.2014100104 (application/pdf)
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:igg:jisp00:v:8:y:2014:i:4:p:62-102
Access Statistics for this article
International Journal of Information Security and Privacy (IJISP) is currently edited by Yassine Maleh
More articles in International Journal of Information Security and Privacy (IJISP) from IGI Global
Bibliographic data for series maintained by Journal Editor ().