Integration of PRESENT Cipher Model Using Bit Permutation in Wireless Sensor Network for Data Security

2020 ◽  
Vol 17 (11) ◽  
pp. 5037-5045
Author(s):  
Alakananda Tripathy ◽  
Sateesh Kumar Pradhan ◽  
Ajit Kumar Nayak ◽  
Smita Rath ◽  
Alok Ranjan Tripathy

Security of data has become the biggest concern in recent years, due to the growing number of wireless networks. Accordingly, cryptography is becoming essential in improving data security. Encryption schemes that transforms the data into an incomprehensible shape. It plays an important role in applications such as wireless sensor networks, as most of the data is transmitted through an unsafe channel. Ultra-lightweight cryptography is one the most preferable research areas which having significant contribution towards the security aspects. There is a low power block cipher PRESENT. In this proposed work a PRESENT as reference block cipher is implemented. Here a method called PRESENT block cipher is used with key shuffling and S-Box. This method produces a 64 bits cipher text as result on input text of size 64 bits and key having of 128 bit. This developed method gives better results in comparison to other existing cipher on performance on different hardware and software platforms. With less memory requirement it produces a higher accuracy and confidentiality of the message is maintained. The proposed cipher have the better encryption time, decryption time, throughput. This proposed cipher has better resistance to crypt analysis according to avalanche effect. This proposed cipher can well be applicable for application where small traced area and low power decadence are vital design metrics.

2018 ◽  
Vol 8 (3) ◽  
pp. 205
Author(s):  
R. Benny Gandara

Standar IEEE 802.15.4 merupakan standar acuan pengembangan protokol yang diterapkan untuk teknologi industrial wireless sensor network pada saat ini. Unsur keamanan data dalam industrial wireless sensor network perlu untuk diperhatikan karena dampak gangguan yang timbul akan dapat berpengaruh secara langsung pada proses industri yang sedang beroperasi dan berdampak pada keselamatan pekerja, peralatan dan lingkungan serta keekonomian. Metode enkripsi adalah metode umum yang dipergunakan dalam perlindungan data pada sistem wireless sensor network. Metode enkripsi pada layer physical dengan menggunakan algoritma stream cipher Rabbit dipergunakan sebagai metode alternatif perlindungan data pada sistem aplikasi industrial wireless sensor network yang mana pada umumnya menggunakan metode enkripsi block cipher pada lapisan upper layer. Algoritma Rabbit akan dibandingkan dengan algoritma RC4 yang telah diteliti sebelumnya. Dari hasil simulasi, algoritma Rabbit dengan jumlah kunci yang lebih pendek dan cipher text yang lebih sedikit dapat memberikan hasil yang lebih baik untuk nilai avalanche effect, entrophy dan penggunaan CPU dibandingkan dengan algoritma RC4. Meskipun mendapatkan hasil yang bervariasi pada penggunaan memori dan end to end delay, algoritma Rabbit pada jumlah node tertentu masih dapat memenuhi standar kebutuhan industri untuk aplikasi sektor migas.


2020 ◽  
Author(s):  
Dedy Agung Prabowo ◽  
Ujang Juhardi ◽  
Bambang Agus Herlambang

Recently, Information technology develops rapidly. It is possible for us to get some informationquickly, properly and efficiently. The information technology also has many advantages fo r people. Theneed for information is increasing according to the need of its users. This proves that informationtechnology can make our job easier and it can help us to save our time particularly for the job thatrelated to information and data processin g. With the increasing use of computer technology today, italso brings up some problems. One of them is security and confidentiality problem which is animportant aspect in an information system. Data security is an important thing in maintaining theconf identiality of particular data that only can be known by those who have right. RC6 is a symmetrickey algorithm which encrypts 128 bit plaintext blocks to 128 bit ciphertext blocks. The encryptionprocess involves four operations which is the critical arit hmetic operation of this block cipher. As alegal state, Indonesia has issued a regulation in a form of laws governing information and electronictransaction or commonly referred to UU ITE. Besides, Islam is a religion that comprehensively givesthe guidan ce of life for people. Islam has provided guidance in the various fields ranging from social,politics, economics and various other fields.


Sensors ◽  
2021 ◽  
Vol 21 (12) ◽  
pp. 3976
Author(s):  
Sun Jin Kim ◽  
Myeong-Lok Seol ◽  
Byun-Young Chung ◽  
Dae-Sic Jang ◽  
Jonghwan Kim ◽  
...  

Self-powered wireless sensor systems have emerged as an important topic for condition monitoring in nuclear power plants. However, commercial wireless sensor systems still cannot be fully self-sustainable due to the high power consumption caused by excessive signal processing in a mini-electronic computing system. In this sense, it is essential not only to integrate the sensor system with energy-harvesting devices but also to develop simple data processing methods for low power schemes. In this paper, we report a patch-type vibration visualization (PVV) sensor system based on the triboelectric effect and a visualization technique for self-sustainable operation. The PVV sensor system composed of a polyethylene terephthalate (PET)/Al/LCD screen directly converts the triboelectric signal into an informative black pattern on the LCD screen without excessive signal processing, enabling extremely low power operation. In addition, a proposed image processing method reconverts the black patterns to frequency and acceleration values through a remote-control camera. With these simple signal-to-pattern conversion and pattern-to-data reconversion techniques, a vibration visualization sensor network has successfully been demonstrated.


Energies ◽  
2021 ◽  
Vol 14 (7) ◽  
pp. 1823
Author(s):  
Mohammad Haidar ◽  
Hussein Chible ◽  
Corrado Boragno ◽  
Daniele D. Caviglia

Sensor nodes have been assigned a lot of tasks in a connected environment that is growing rapidly. The power supply remains a challenge that is not answered convincingly. Energy harvesting is an emerging solution that is being studied to integrate in low power applications such as internet of things (IoT) and wireless sensor networks (WSN). In this work an interface circuit for a novel fluttering wind energy harvester is presented. The system consists of a switching converter controlled by a low power microcontroller. Optimization techniques on the hardware and software level have been implemented, and a prototype is developed for testing. Experiments have been done with generated input signals resulting in up to 67% efficiency for a constant voltage input. Other experiments were conducted in a wind tunnel that showed a transient output that is compatible with the target applications.


2019 ◽  
Vol 2019 ◽  
pp. 1-10 ◽  
Author(s):  
Daniel Ayala-Ruiz ◽  
Alejandro Castillo Atoche ◽  
Erica Ruiz-Ibarra ◽  
Edith Osorio de la Rosa ◽  
Javier Vázquez Castillo

Long power wide area networks (LPWAN) systems play an important role in monitoring environmental conditions for smart cities applications. With the development of Internet of Things (IoT), wireless sensor networks (WSN), and energy harvesting devices, ultra-low power sensor nodes (SNs) are able to collect and monitor the information for environmental protection, urban planning, and risk prevention. This paper presents a WSN of self-powered IoT SNs energetically autonomous using Plant Microbial Fuel Cells (PMFCs). An energy harvesting device has been adapted with the PMFC to enable a batteryless operation of the SN providing power supply to the sensor network. The low-power communication feature of the SN network is used to monitor the environmental data with a dynamic power management strategy successfully designed for the PMFC-based LoRa sensor node. Environmental data of ozone (O3) and carbon dioxide (CO2) are monitored in real time through a web application providing IoT cloud services with security and privacy protocols.


2017 ◽  
Vol 27 (03) ◽  
pp. 1850037 ◽  
Author(s):  
Yasir ◽  
Ning Wu ◽  
Xiaoqiang Zhang

This paper proposes compact hardware implementations of 64-bit NESSIE proposed MISTY1 block cipher for area constrained and low power ASIC applications. The architectures comprise only one round MISTY1 block cipher algorithm having optimized FO/FI function by re-utilizing S9/S7 substitution functions. A focus is also made on efficient logic implementations of S9 and S7 substitution functions using common sub-expression elimination (CSE) and parallel AND/XOR gates hierarchy. The proposed architecture 1 generates extended key with independent FI function and is suitable for MISTY1 8-rounds implementation. On the other hand, the proposed architecture 2 uses a single FO/FI function for both MISTY1 round function as well as extended key generation and can be employed for MISTY1 [Formula: see text] rounds. To analyze the performance and covered area for ASICs, Synopsys Design Complier, SMIC 0.18[Formula: see text][Formula: see text]m @ 1.8[Formula: see text]V is used. The hardware constituted 3041 and 2331 NAND gates achieving throughput of 171 and 166 Mbps for 8 rounds implementation of architectures 1 and 2, respectively. Comprehensive analysis of proposed designs is covered in this paper.


2012 ◽  
Vol 73 (3) ◽  
pp. 731-740 ◽  
Author(s):  
Hanen Thabet ◽  
Stéphane Meillère ◽  
Mohamed Masmoudi ◽  
Jean-Luc Seguin ◽  
Hervé Barthelemy ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document