Browse > Article
http://dx.doi.org/10.6109/jkiice.2011.15.7.1510

Optimized implementation of HIGHT algorithm for sensor network  

Seo, Hwa-Jeong (부산대학교 컴퓨터공학과)
Kim, Ho-Won (부산대학교 컴퓨터공학과)
Abstract
As emergence of the ubiquitous society, it is possible to access the network for services needed to us in anytime and anywhere. The phenomena has been accelerated by revitalization of the sensor network offering the sensing information and data. Currently, sensor network contributes the convenience for various services such as environment monitoring, health care and home automation. However, sensor network has a weak point compared to traditional network, which is easily exposed to attacker. For this reason, messages communicated over the sensor network, are encrypted with symmetric key and transmitted. A number of symmetric cryptography algorithms have been researched. Among of them HIGHT algorithm in hardware and software implementation are more efficient than tradition AES in terms of speed and chip size. Therefore, it is suitable to resource constrained devices including RFID tag, Sensor node and Smart card. In the paper, we present the optimized software implementation on the ultra-light symmetric cryptography algorithm, HIGHT.
Keywords
Sensor network; MSP430; HIGHT; Symmetric cryptography;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Texas instruments, "MSP430x11x MIXED SIGNAL MICROCONTROLLERS", 2004.
2 W. Liu, R. Luo, and H. Yang. Cryptography overhead evaluation and analysis for wireless sensor networks. Communications and Mobile Computing, International Conference on, pp. 496-501, 2009.
3 D. Engels, X. Fan, G. Gong, H. Hu, and E. M. Smith, "Hummingbird:Ultra-Lightweight Cryptography for Resource- Constrained Devices", to appear in the proceedings of The 14th International Conference on Financial Cryptography and Data Security FC 2010, 2010.
4 A. Poschmann, Lightweight Cryptography Cryptographic Engineering for a Pervasive World", Ph.D. Thesis, Department of Electrical Engineering and Information Sciences, Ruhr-UniversitAaet Bochum, Bochum, Germany, 2009.
5 A. Perrig, J. Stankovic, and D. Wagner, ""Security in Wireless Sensor Networks,"" Communications of the ACM, vol. 47, no. 6, pp. 53-57, June 2004.   DOI   ScienceOn
6 Kinney, P. 2003. "ZigBee Technology: Wireless Control that Simply Works." ZigBee Alliance.
7 Deukjo Hong, Jaechul Sung, Seokhie Hong, Jongin Lim, Sangjin Lee, Bonseok Koo, Changhoon Lee, Donghoon Chang, Jaesang Lee, Kitae Jeong, Hyun Kim, Jongsung Kim, and Seongtaek Chee. HIGHT: A New Block Cipher Suitable for Low-Resource Device. In Louis Goubin and Mitsuru Matsui, editors, CHES, volume 4249 of Lecture Notes in Computer Science, pp. 46-59. Springer, 2006.