sis 23(5):

Research Article

Modified Rijndael Algorithm for Resource-Constrained IoT-Based Wireless Sensor Networks

Download206 downloads
  • @ARTICLE{10.4108/eetsis.2748,
        author={Mohammad Sirajuddin and Dr. B. Sateesh Kumar},
        title={Modified Rijndael Algorithm for Resource-Constrained IoT-Based Wireless Sensor Networks},
        journal={EAI Endorsed Transactions on Scalable Information Systems},
        volume={10},
        number={5},
        publisher={EAI},
        journal_a={SIS},
        year={2023},
        month={8},
        keywords={modified rijndael algorithm, lightweight cryptography, IoT security, MRA},
        doi={10.4108/eetsis.2748}
    }
    
  • Mohammad Sirajuddin
    Dr. B. Sateesh Kumar
    Year: 2023
    Modified Rijndael Algorithm for Resource-Constrained IoT-Based Wireless Sensor Networks
    SIS
    EAI
    DOI: 10.4108/eetsis.2748
Mohammad Sirajuddin1,*, Dr. B. Sateesh Kumar2
  • 1: Jawaharlal Nehru Technological University
  • 2: Jawaharlal Nehru Technological University, Hyderabad
*Contact email: sirajuddin.jntu@gmail.com

Abstract

INTRODUCTION: IoT devices are small, have limited battery and computing capabilities, and cannot tolerate complex encryption. OBJECTIVES: Many encryption algorithms struggle to strike a balance between security and complexity. Increasing the level of security necessitates increasing complexity, which leads to higher encryption and decryption times. This research aims to provide a novel encryption method, Modified Rijndael Algorithm that balances security and complexity. METHODS: The classic Rijndael encryption technique has been modified to make it lighter and more secure, suitable for resource-constrained IoT devices. RESULTS: These modifications include adding the novel pre-processing step SISA-Crossover based on the two-point crossover operation of genetic algorithms, removing the Sub Byte step, changing the shift column phase, and decreasing the rounds. CONCLUSION: The proposed technique provides speed and higher security in encryption and decryption, increasing efficiency and randomness while reducing encryption and decryption times by 21.06% and CPU consumption by 13.2% compared to the traditional method.