Survey and benchmark of block ciphers for wireless sensor networks
- 1 February 2006
- journal article
- Published by Association for Computing Machinery (ACM) in ACM Transactions on Sensor Networks
- Vol. 2 (1), 65-93
- https://doi.org/10.1145/1138127.1138130
Abstract
Cryptographic algorithms play an important role in the security architecture of wireless sensor networks (WSNs). Choosing the most storage- and energy-efficient block cipher is essential, due to the facts that these networks are meant to operate without human intervention for a long period of time with little energy supply, and that available storage is scarce on these sensor nodes. However, to our knowledge, no systematic work has been done in this area so far. We construct an evaluation framework in which we first identify the candidates of block ciphers suitable for WSNs, based on existing literature and authoritative recommendations. For evaluating and assessing these candidates, we not only consider the security properties but also the storage- and energy-efficiency of the candidates. Finally, based on the evaluation results, we select the most suitable ciphers for WSNs, namely Skipjack, MISTY1, and Rijndael, depending on the combination of available memory and required security (energy efficiency being implicit). In terms of operation mode, we recommend Output Feedback Mode for pairwise links but Cipher Block Chaining for group communications.Keywords
This publication has 37 references indexed in Scilit:
- About the XL Algorithm over GF(2)Lecture Notes in Computer Science, 2003
- Cryptanalysis of Block Ciphers with Overdefined Systems of EquationsLecture Notes in Computer Science, 2002
- In How Many Ways Can You Write Rijndael?Lecture Notes in Computer Science, 2002
- Solving Underdefined Systems of Multivariate Quadratic EquationsLecture Notes in Computer Science, 2002
- A Simple Algebraic Representation of RijndaelLecture Notes in Computer Science, 2001
- On MISTY1 Higher Order Differential CryptanalysisLecture Notes in Computer Science, 2001
- Advanced Slide AttacksLecture Notes in Computer Science, 2000
- Improved Impossible Differentials on TwofishLecture Notes in Computer Science, 2000
- Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible DifferentialsLecture Notes in Computer Science, 1999
- Improved cryptanalysis of RC5Lecture Notes in Computer Science, 1998