Browse > Article
http://dx.doi.org/10.13089/JKIISC.2008.18.5.3

Performance Analysis and Comparison of Stream Ciphers for Secure Sensor Networks  

Yun, Min (School of Computer and Information Engineering, Inha University)
Na, Hyoung-Jun (TmaxSoft)
Lee, Mun-Kyu (School of Computer and Information Engineering, Inha University)
Park, Kun-Soo (School of Computer Science and Engineering, Seoul National University)
Abstract
A Wireless Sensor Network (WSN for short) is a wireless network consisting of distributed small devices which are called sensor nodes or motes. Recently, there has been an extensive research on WSN and also on its security. For secure storage and secure transmission of the sensed information, sensor nodes should be equipped with cryptographic algorithms. Moreover, these algorithms should be efficiently implemented since sensor nodes are highly resource-constrained devices. There are already some existing algorithms applicable to sensor nodes, including public key ciphers such as TinyECC and standard block ciphers such as AES. Stream ciphers, however, are still to be analyzed, since they were only recently standardized in the eSTREAM project. In this paper, we implement over the MicaZ platform nine software-based stream ciphers out of the ten in the second and final phases of the eSTREAM project, and we evaluate their performance. Especially, we apply several optimization techniques to six ciphers including SOSEMANUK, Salsa20 and Rabbit, which have survived after the final phase of the eSTREAM project. We also present the implementation results of hardware-oriented stream ciphers and AES-CFB fur reference. According to our experiment, the encryption speeds of these software-based stream ciphers are in the range of 31-406Kbps, thus most of these ciphers are fairly acceptable fur sensor nodes. In particular, the survivors, SOSEMANUK, Salsa20 and Rabbit, show the throughputs of 406Kbps, 176Kbps and 121Kbps using 70KB, 14KB and 22KB of ROM and 2811B, 799B and 755B of RAM, respectively. From the viewpoint of encryption speed, the performances of these ciphers are much better than that of the software-based AES, which shows the speed of 106Kbps.
Keywords
wireless sensor network; cryptography; stream cipher; MicaZ; eSTREAM;
Citations & Related Records
연도 인용수 순위
  • Reference
1 A. Liu, P. Ning, "TinyECC:Elliptic Curve Cryptography for Sensor Networks (Version 1.0)," http://discovery.csc.ncsu.edu/softare/TinyECC/, November 2007
2 NESSIE, https://www.cosic.east.kul- euven.be/nessie/
3 D. Bernstein, "Salsa20," http://www.ecrypt.eu.org/stream/salsa20p3.html
4 M. Boesgaard, M. Vesterager, T. Christensen, E. Zenner, "The Stream Cipher Rabbit," http://www.ecrypt.eu.org/stream/rabbitp3.html
5 H. Wu, "Stream Cipher HC-128," http://www.ecrypt.eu.org/stream/hcp3.html/
6 D. Whiting, B. Schneier, S. Lucks, F. Muller, "Phelix - Fast Encryption and Authentication in a Single Cryptograp hic Primitive," http://www.ecrypt.eu.org/stream/phelixp2.html
7 P. Hawkes, M. Paddon, G. Rose, M. W. de Vries, "Primitive Specification for NLSv2," http://www.ecrypt.eu.org/stream/nlsp3.html
8 Y. W. Law, J. Doumen, P. Hartel "Survey and Benchmark of Block Ciphers for Wireless Sensor Networks," ACM Transactions on Sensor Networks, Vol. 2, No. 1, pp. 65-93, February 2006   DOI
9 K. Chen, M. Henricksen, W. Millan, J. Fuller, L. Simpson, E. Dawson, H. Lee, S. Moon, "Dragon:A Fast Word Based Stream Cipher," http://www.ecrypt.eu.org/stream/dragonp3.html
10 D. Gay, P. Levis, R. von Behren, M. Welsh, E. Brewer, D. Culler. "The nesC language:A Holistic Approach to Networked Embedded Systems," PLDI 2003, June 2003
11 C. Berbain, O. Billet, A. Canteaut, N. Courtois, H. Gilbert, L. Goubin, A. Gouget, L. Granboulan, C. Lauradoux, M. Minier, T. Pornin, H. Sibert, "Sosemanuk, a fast software-oriented stream cipher," http://www.ecrypt.eu.org/stream/sosemanukp3.html
12 A. Biryukov, "A new 128 bit key stream cipher :LEX," http://www.ecrypt.eu.org/stream/lexp3.html
13 P. Ekdahl, T. Johansson. "A new version of the stream cipher SNOW," SAC 2002, LNCS 2295, pp. 47-61, 2002
14 E. Biham, R. Anderson, L. Knudsen. "SERPENT :A new block cipher proposal," FSE'98, LNCS 1372, pp. 222-238, 1998
15 Atmel, ATmega128(L) Datasheet, http://www.atmel.com/dyn/resources/prod_documents/doc2467.pdf
16 TinyOS, http://tinyos.net
17 M. Matsumoto, M. Saito, T. Nishimura, M. Hagita, "CryptMT Strea m Cipher Version 3," http://www.ecrypt.eu.org/stream/cryptmtp3.html
18 Paulo Barreto's public domain C implementation of AES, http://www.esat.kuleuven.ac.be/~rijmen/rijndael/rijndael-fst-3.0.zip
19 G. Meiser, T. Eisenbarth, K. Lemke-Rust, C. Paar, "Software Implementation of eSTREAM Profile I Ciphers on Embedded 8-bit AVR Microcontrollers," http://www.ecrypt.eu.org/stream/sw.html
20 E. Biham, J. Seberry, "Py (Roo):A Fast and Secure Stream Cipher Using Rolling Arrays," http://www.ecrypt.eu.org/stream/pyp2.html
21 eSTREAM, the ECRYPT Stream Cipher Project, http://www.ecrypt.eu.org/stream/
22 ZigBee, Wireless Control That simply Works, http://www.Zigbee.org