Next Article in Journal
Performance Evaluation of Smartphone Inertial Sensors Measurement for Range of Motion
Next Article in Special Issue
Harvesting Entropy for Random Number Generation for Internet of Things Constrained Devices Using On-Board Sensors
Previous Article in Journal
Temperature and Humidity Sensor Powered by an Individual Microbial Fuel Cell in a Power Management System
Previous Article in Special Issue
A Self-Assessment Stereo Capture Model Applicable to the Internet of Things
Article Menu

Export Article

Open AccessArticle
Sensors 2015, 15(9), 23145-23167; doi:10.3390/s150923145

Butterfly Encryption Scheme for Resource-Constrained Wireless Networks

Faculty of Computer Science, Dalhousie University, 6050 University Ave., PO Box 15000, Halifax, NS B3H 4R2, Canada
This paper is an extended version of our paper published in Sampangi, R.V.; Sampalli, S. RFID encryption scheme featuring pseudorandom numbers and Butterfly seed generation. In Proceedings of the 2014 22nd International Conference on Software, Telecommunications and Computer Networks (SoftCOM), Split, Croatia, 17–19 September 2014; doi:10.1109/SOFTCOM.2014.7039120 .
*
Author to whom correspondence should be addressed.
Academic Editor: Leonhard M. Reindl
Received: 13 July 2015 / Revised: 27 August 2015 / Accepted: 8 September 2015 / Published: 15 September 2015
(This article belongs to the Special Issue Identification, Information & Knowledge in the Internet of Things)
View Full-Text   |   Download PDF [910 KB, uploaded 15 September 2015]   |  

Abstract

Resource-constrained wireless networks are emerging networks such as Radio Frequency Identification (RFID) and Wireless Body Area Networks (WBAN) that might have restrictions on the available resources and the computations that can be performed. These emerging technologies are increasing in popularity, particularly in defence, anti-counterfeiting, logistics and medical applications, and in consumer applications with growing popularity of the Internet of Things. With communication over wireless channels, it is essential to focus attention on securing data. In this paper, we present an encryption scheme called Butterfly encryption scheme. We first discuss a seed update mechanism for pseudorandom number generators (PRNG), and employ this technique to generate keys and authentication parameters for resource-constrained wireless networks. Our scheme is lightweight, as in it requires less resource when implemented and offers high security through increased unpredictability, owing to continuously changing parameters. Our work focuses on accomplishing high security through simplicity and reuse. We evaluate our encryption scheme using simulation, key similarity assessment, key sequence randomness assessment, protocol analysis and security analysis. View Full-Text
Keywords: security; key management; authentication; resource-constrained wireless networks; RFID; Wireless Body Area Networks security; key management; authentication; resource-constrained wireless networks; RFID; Wireless Body Area Networks
This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. (CC BY 4.0).

Scifeed alert for new publications

Never miss any articles matching your research from any publisher
  • Get alerts for new papers matching your research
  • Find out the new papers from selected authors
  • Updated daily for 49'000+ journals and 6000+ publishers
  • Define your Scifeed now

SciFeed Share & Cite This Article

MDPI and ACS Style

Sampangi, R.V.; Sampalli, S. Butterfly Encryption Scheme for Resource-Constrained Wireless Networks. Sensors 2015, 15, 23145-23167.

Show more citation formats Show less citations formats

Related Articles

Article Metrics

Article Access Statistics

1

Comments

[Return to top]
Sensors EISSN 1424-8220 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top