Skip to main navigation Skip to search Skip to main content

A LCG-based secure protocol for wireless sensor networks

Bo Sun, Chung-Chih Li, Kui Wu, Yang Xiao

Research output: Chapters, Conference Papers, Creative and Literary WorksRGC 32 - Refereed conference paper (with host publication)peer-review

Abstract

In this paper, based on a Linear Congruential Generator (LCG), we propose a new block cipher that is suitable for constructing a lightweight secure protocol for resource-constrained wireless sensor networks. Based on the Plumstead's inference algorithm, we are motivated to embed the generated pseudo-random numbers with sensor data messages in order to provide security. Specifically, the security of our proposed cipher is achieved by adding random noise and random permutations to the original data messages. The analysis of our cipher indicates that it can satisfy the security requirements of wireless sensor networks. We demonstrate that secure protocols based on our proposed cipher satisfy the baseline security requirements: data confidentiality, authenticity, and integrity with low overhead. Performance analysis demonstrates that our proposed block cipher is more lightweight than RC5 in terms of the number of basic operations. © 2006 Crown Copyright.
Original languageEnglish
Title of host publication2006 IEEE International Conference on Communications, ICC 2006
PublisherIEEE
Pages3627-3632
Volume8
ISBN (Print)1424403553, 9781424403554
DOIs
Publication statusPublished - 2006
Externally publishedYes
Event2006 IEEE International Conference on Communications, ICC 2006 - Istanbul, Türkiye
Duration: 11 Jul 200615 Jul 2006

Publication series

NameIEEE International Conference on Communications
Volume8
ISSN (Print)0536-1486

Conference

Conference2006 IEEE International Conference on Communications, ICC 2006
PlaceTürkiye
CityIstanbul
Period11/07/0615/07/06

Bibliographical note

Publication details (e.g. title, author(s), publication statuses and dates) are captured on an “AS IS” and “AS AVAILABLE” basis at the time of record harvesting from the data source. Suggestions for further amendments or supplementary information can be sent to [email protected].

Fingerprint

Dive into the research topics of 'A LCG-based secure protocol for wireless sensor networks'. Together they form a unique fingerprint.

Cite this