1st International ICST Workshop on Technologies for Situated and Autonomic Communications

Research Article

Highly Adaptive Cryptographic Suites for Autonomic WSNs

Download505 downloads
  • @INPROCEEDINGS{10.4108/ICST.BIONETICS2007.2457,
        author={Dennis Bliefernicht and Daniel Schreckling},
        title={Highly Adaptive Cryptographic Suites for Autonomic WSNs},
        proceedings={1st International ICST Workshop on Technologies for Situated and Autonomic Communications},
        proceedings_a={SAC},
        year={2008},
        month={8},
        keywords={Adaptive Security   Cryptography   Sensor Networks},
        doi={10.4108/ICST.BIONETICS2007.2457}
    }
    
  • Dennis Bliefernicht
    Daniel Schreckling
    Year: 2008
    Highly Adaptive Cryptographic Suites for Autonomic WSNs
    SAC
    IEEE
    DOI: 10.4108/ICST.BIONETICS2007.2457
Dennis Bliefernicht1,*, Daniel Schreckling1,*
  • 1: Computer Science Department University of Hamburg Vogt-Koelln-Str. 30 D-22527 Hamburg, Germany
*Contact email: 1bliefer@informatik.uni-hamburg.de, schreckling@informatik.uni-hamburg.de

Abstract

This paper presents a novel approach to support flexible cryptographic suites on resource restricted devices. Common primitives which are used for symmetric key algorithms have been thoroughly analysed by the hardware and cryptography community to design more efficient implementations. A side product of this development and a common fact for cryptographers is the strong modularisation of block ciphers and the similarities therein. This contribution shows how an efficient combination framework can exploit these characteristics to support a large variety of cryptographic primitives on resource restricted hardware. We present a collection of basic building blocks, which can be combined dynamically to implement various primitives. With the high energy consumption of radio transmission in mind the presented work takes a different direction from existing approaches which aim at highly optimised primitives. By exploiting the modular redundancy within existing block ciphers the presented approach can adapt to a node context and choose the primitives optimal for a specific task in terms of security requirements, and resource consumption. This work additionally discusses how this modularity enables a device to efficiently update existing and install new primitives, and how it may adapt implementations to resource restricted execution environments.