Security Analysis and Optimization of AES S-Boxes Against CPA Attack in Wireless Sensor Network

Author(s):  
Zhaoxia Zheng ◽  
Xuecheng Zou ◽  
Zhenglin Liu ◽  
Yicheng Chen
2018 ◽  
Vol 14 (06) ◽  
pp. 151
Author(s):  
Shuang Xu ◽  
Tong Zhou

<p class="0abstract"><span lang="EN-US">In order to study the intelligent buildings, the intelligent building network security of wireless sensor was explored. Because of its advantages of low cost, easy installation, low maintenance and update cost, wireless sensor network system was applied to intelligent building. In view of the characteristics of various influencing factors on the wireless sensor network working environment, node hardware cost and location accuracy, a secure localization algorithm based on DV-Hop was put forward. The security analysis results showed that the algorithm resisted external attacks and guaranteed the accuracy of location results. Based on the above findings, it is concluded that the algorithm can be used to protect the safety of wireless sensor network in building. </span></p>


Author(s):  
Ghada Zaibi ◽  
Fabrice Peyrard ◽  
Abdennaceur Kachouri ◽  
Danièle Fournier-Prunaret ◽  
Mounir Samet

A new and secure chaos-based block cipher for image encryption in wireless sensor networks is proposed. The security analysis and the performances of the proposed algorithm have been investigated. The statistical analysis includes the histograms and correlation coefficients of adjacent pixels. In the differential analysis, the authors use the Number of Pixels Change Rate (NPCR) and the Unified Changing Average (UACI) measures to demonstrate the security against differential attacks. Key sensitivity analysis and key space analysis show that the proposed cipher is secure and resistant to brute force attack. The authors demonstrate that the performance of the cipher exceeds the studied encryption algorithms as well as AES (Advanced Encryption Standard). An implementation on a real wireless sensor network testbed is realized, and the energy consumption is investigated.


2013 ◽  
Author(s):  
A. Diaz. ◽  
J. Gonzalez-Bayon ◽  
P. González de Aledo Marugán ◽  
P. Sanchez

2020 ◽  
Vol 19 (1) ◽  
pp. 001
Author(s):  
Ivica Marjanović ◽  
Dejan Milić ◽  
Jelena Anastasov ◽  
Aleksandra Cvetković

In this paper, a physical layer security analysis of wireless sensor network in the presence of an attacker, employing opportunistic scheduling approach, is presented. The intended as well as unintended transmission paths experience the Weibull fading. A novel analytical expression for the intercept probability is derived. In order to emphasize the advantages of the opportunistic scheduling approach, a comparative analysis with round-robin and optimal scheduling schemes is also given. The impact of a number of active sensors and the impact of fading channel conditions over main and wiretap channels on the intercept probabilities is obtained. The accuracy of theoretical results is confirmed by independent Monte Carlo simulation results.


Sign in / Sign up

Export Citation Format

Share Document