Tytuł artykułu
Wybrane pełne teksty z tego czasopisma
Identyfikatory
Warianty tytułu
Opracowanie i analiza kryptograficznego algorytmu dla zoptymalizowanego genetycznie czujnika bezprzewodowego
Języki publikacji
Abstrakty
This article proposes a methodology for obtaining a cryptographic algorithm, optimized for wireless sensor networks, through genetic algorithm. With the objective of increasing the level of security, computational efficiency and highlighting the energy consumption, considering that the autonomy of the wireless sensor devices is directly influenced by this factor. In aptitude function of genetic algorithm, were used metrics of algorithm runtime, maximum deviation and irregular, space occupied in memory and correlation coefficient (a new proposed metric), in order to find a safe and fast algorithm. The results obtained through computational simulations show the efficiency of the proposed methodology, in terms of processing time, coefficient of correlation and occupation of memory.
W tym artykule zaproponowano metodologię uzyskiwania algorytmu kryptograficznego, zoptymalizowanego dla bezprzewodowych sieci czujników, za pomoca˛ algorytmu genetycznego. W celu zwiększenia poziomu bezpieczeństwa, wydajności obliczeniowej i podkreślenia zużycia energii, biorąc pod uwagę fakt, że ten czynnik ma bezposśredni wpływ na autonomię bezprzewodowych czujników. W funkcji uzdatniania algorytmu genetycznego wykorzystano metryki czasu pracy algorytmu, maksymalnego odchylenia i nieregularności, miejsca zajmowanego w pamięci i współczynnika korelacji (nowa proponowana metryka), aby znaleźć bezpieczny i szybki algorytm. Wyniki uzyskane za pomocą symulacji obliczeniowych pokazują efektywność proponowanej metodologii, pod względem czasu przetwarzania, współczynnika korelacji i zajęcia pamięci.
Wydawca
Czasopismo
Rocznik
Tom
Strony
79--84
Opis fizyczny
Bibliogr. 25 poz., rys., tab.
Twórcy
autor
- Universidade Federal do Rio Grande do Norte
autor
- Universidade Federal do Rio Grande do Norte
autor
- Universidade Federal Rural do Semi-Árido
autor
- Universidade Federal Rural do Semi-Árido
autor
- Universidade Federal do Rio Grande do Norte
Bibliografia
- [1] Shim, K.A. A Survey of Public-Key Cryptographic Primitives Issues in Wireless Sensor Networks 2012.
- [2] IEEE Standards 802.15.4. Technical report, The Institute of Electrical and Electronics Engineers, Inc., New York, USA., 2003.
- [3] ZigBee Specification Version 1.0. Technical report, ZigBee Aliance, 2004.
- [4] IEEE 802.15.4e - IEEE Standard for Local and metropolitan area networks–Part 15.4: Low-Rate Wireless Personal Area Networks (LR-WPANs) Amendment 1: MAC sublayer. Technical report, The Institute of Electrical and Electronics Engineers, Inc., New York, USA., 2012.
- [5] Biryukov A., Dunkelman O., Keller N., Khovratovich D., Shamir A.: Key recovery attacks of practical complexity on AES-256 variants with up to 10 rounds 2010. pp. 299–319.
- [6] Biryukov, A., Großschädl J.: Cryptanalysis of the full AES using GPU-like special-purpose hardware. Fundamenta Informaticae 2012, 114, 221–237.
- [7] Rinne S., Eisenbarth T., Paar C.: Performance analysis of contemporary light-weight block ciphers on 8-bit microcontrollers. Ecrypt Workshop SPEED. Citeseer, 2007, pp. 33–43.
- [8] Meiser G., Eisenbarth T., Lemke-Rust K., Paar C.: Efficient implementation of eSTREAM ciphers on 8-bit AVR microcontrollers. Industrial Embedded Systems, 2008. SIES 2008. International Symposium on. IEEE, 2008, pp. 58–66.
- [9] Polimón J., Hernández-Castro J.C., Estévez-Tapiador J.M., Ribagorda A.: Automated design of a lightweight block cipher with Genetic Programming. International Journal of Knowledge-based and Intelligent Engineering Systems 2008, 12, 3–14.
- [10] Estevez-Tapiador J.M., Hernandez-Castro J.C., Peris-Lopez P., Ribagorda A.: Automated Design of Cryptographic Hash Schemes by Evolving Highly-Nonlinear Functions. Journal of Information Science & Engineering 2008, 24.
- [11] Picek S., Carlet C., Jakobovic D., Miller J.F., Batina L.: Correlation immunity of boolean functions: an evolutionary algorithms perspective 2015. pp. 1095–1102.
- [12] Semente R.S., Salazar A.O., Oliveira F.D.: CRYSEED: An automatic 8-bit cryptographic algorithm developed with genetic programming. Instrumentation and Measurement Technology Conference (I2MTC) Proceedings, 2014 IEEE International. IEEE, 2014, pp. 1065–1068.
- [13] Daemen J., Rijmen V.: AES proposal: Rijndael 1999.
- [14] Wheeler D.J., Needham R.M.: TEA, a tiny encryption algorithm. International Workshop on Fast Software Encryption. Springer, 1994, pp. 363–366.
- [15] Needham R.M., Wheeler D.J.: Tea extensions. Report (Cambridge University, Cambridge, UK, 1997) Google Scholar 1997.
- [16] Wheeler D.J., Needham R.M.: Correction to xtea. Unpublished manuscript, Computer Laboratory, Cambridge University, England 1998.
- [17] Gaba S., Aggarwal I., Pandey S.: Design of efficient XTEA using Verilog. International Journal of Scientific and Research Publications 2012, 2.
- [18] Zafar F. Tiny encryption algorithm for cryptographic gradient noise; University of Maryland, Baltimore County, 2010.
- [19] Yarrkov E. Cryptanalysis of XXTEA. IACR Cryptology ePrint Archive 2010, 2010, 254.
- [20] Koza J.R. Hierarchical Genetic Algorithms Operating on Populations of Computer Programs. IJCAI, 1989, pp. 768–774.
- [21] Ahmad J., Ahmed F.: Efficiency analysis and security evaluation of image encryption schemes. International Journal of Video and Image Processing and Network Security 2010, 23, 25.
- [22] Ahmed H.E.D.H., Kalash H.M., Allah O.F.: Encryption efficiency analysis and security evaluation of RC6 block cipher for digital images. Electrical Engineering, 2007. ICEE’07. International Conference on. IEEE, 2007, pp. 1–7.
- [23] El Fishawy N.F., Zaid O.M.A.: Quality of encryption measurement of bitmap images with RC6, MRC6, and Rijndael block cipher algorithms. IJ Network Security 2007, 5, 241–251.
- [24] Hernandez-Castro J.C., Estevez-Tapiador J.M., Ribagorda- Garnacho A., Ramos-Alvarez B.: Wheedham: An automatically designed block cipher by means of genetic programming. Evolutionary Computation, 2006. CEC 2006. IEEE Congress on. IEEE, 2006, pp. 192–199.
- [25] SIPI, U. The usc-sipi image database, 2016.
Uwagi
Opracowanie rekordu w ramach umowy 509/P-DUN/2018 ze środków MNiSW przeznaczonych na działalność upowszechniającą naukę (2018).
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-70e75868-86a9-41e5-a64e-3eeb35fa2ff4