Sensor Data Encryption Protocol for Wireless Network Security

Authors(1) :-Dharani. S

Network Security is one of the important concept in data security as the data to be made secure. To make data secure, there exist number of algorithm like AES (Advanced Encryption Standard). The security can be enhanced by using standardized and proven-secure block ciphers as advanced encryption standard (AES) for data encryption and authentication. However, these security functions take a large amount of processing power and power/energy consumption. In this paper, we present our hardware optimization strategies for AES for high-speed ultralow-power ultralow-energy IoT applications with multiple levels of security. Our design supports multiple security levels through different key sizes, power and energy optimization for both datapath and key expansion. The estimated power results show that our implementation may achieve an energy per bit comparable with the lightweight standardized algorithm PRESENT of less than 1 pJ/b at 10 MHz at 0.6 V with throughput of 28 Mb/s in ST FDSOI 28-nm technology. In terms of security evaluation, our proposed datapath, 32-b key out of 128 b cannot be revealed by correlation power analysis attack using less than 20 000 traces.

Authors and Affiliations

Dharani. S
Microelectronics and Control System (M.Tech), Electronics and Instrumentation Engineering, Dayananda Sagar College of Engineering, Bangalore, Karnataka, India

Wireless Sensor Network, Wireless Network Security, Network Security,

  1. Roman, P. Najera, and J. Lopez, “Securing the Internet of Things,” Computer, vol. 44, no. 9, pp. 51–58, Sep. 2011.
  2. Barki, A. Bouabdallah, S. Gharout, and J. Traoré, “M2M security:Challenges and solutions,” IEEE Commun. Surveys Tuts., vol. 18, no. 2pp. 1241–1254, 2nd Quart., 2016.
  3. L. Keoh, S. Kumar, and H. Tschofenig, “Securing the Internet of Things: A standardization perspective,” IEEE Internet Things J., vol. 1,no. 3, pp. 265–275, Apr. 2014.
  4. Advanced Encryption Standard, Gaithersburg, MD, USA, U.S Nat.Institute of Standards and Technology, 2001. [5] IEEE Standard for Local and Mtropolitan Area Networks—Part 15.4: Low-Rate Wireless Persional Area Networks (LR-WPANS), IEEE Standardization Group, Piscataway, NJ, USA, 2011.
  5. LoraWan Specification, LoRa Alliance, Inc., San Ramon, CA, USA, 2015.
  6. Sigfox Technology Overview—Security, accessed on Nov. 15, 2016. [Online]. Available:
  7. Z-Wave Device Class Specification, Sigma Designs, Milpitas, CA, USA, 2016.
  8. Bogdanov et al., “PRESENT: An ultra-lightweight block cipher,” in Cryptographic Hardware and Embedded Systems—CHES 2007 (Lecture Notes in Computer Science), vol. 4727, P. Paillier and I. Verbauwhede, Eds. Berlin, Germany: Springer, 2007, pp. 450–466.
  9. C. Liu, J. H. Hsiao, H. C. Chang, and C. Y. Lee, “A 2.97 Gb/s DPA-resistant AES engine with self-generated random sequence,” in Proc. Eur. Solid-State Circuit Conf. (ESSCIRC), Sep. 2011, pp. 71–74.
  10. Maene and I. Verbauwhede, “Single-cycle implementations of block ciphers,” in Lightweight Cryptography for Security Privacy (Lecture Notes in Computer Science), vol. 9542, T. Güneysu, G. Leander, and A. Moradi, Eds. Cham, Switzerland: Springer, 2016, pp. 131–147. [Online]. Available: 319-29078-2_8
  11. Mathew et al., “53 Gbps Native GF(24)2 composite-field AES-encrypt/decrypt accelerator for content-protection in 45 nm high performance microprocessors,” IEEE J. Solid-State Circuits, vol. 46, no. 4, pp. 767–776, Apr. 2011.
  12. Mathew et al., “340 mV—1.1 V, 289 Gbps/W, 2090-gate nanoAES hardware accelerator with area-optimized encrypt/decrypt GF(24)2 polynomialsin 22 nm tri-gate CMOS,” IEEE J. Solid-State Circuits, vol. 50, no. 4, pp. 1048–1058, Apr. 2015.
  13. Zhao, Y. Ha, and M. Alioto, “AES architectures for minimum-energy operation and silicon demonstration in 65 nm with lowest energy per encryption,” in Proc. IEEE Int. Symp. Circuits Syst. (ISCAS), May 2015, pp. 2349–2352.
  14. Shirai, K. Shibutani, T. Akishita, S. Moriai, and T. Iwata, “The 128-bit blockcipher CLEFIA,” in Proc. 14th Int. Conf. Fast Softw. Encryption, 2007, pp. 181–195.

Publication Details

Published in : Volume 4 | Issue 6 | May-June 2018
Date of Publication : 2018-05-08
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 643-650
Manuscript Number : CSEIT1846121
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

Dharani. S, "Sensor Data Encryption Protocol for Wireless Network Security", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 4, Issue 6, pp.643-650, May-June-2018.
Journal URL :

Article Preview

Follow Us

Contact Us