Developing and Evaluation of New Hybrid Encryption Algorithms

Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2014, Vol 13, Issue 1

Abstract

Wireless Sensor networks consist of hundreds or thousands of low cost, low power and self-organizing nodes which are highly distributed. As wireless sensor networks continue to grow, so does the need for effective security mechanisms because sensor networks may interact with sensitive data. Encryption algorithms play good roles in information security systems (ISS). Those algorithms consume a significant amount of computing resources such as battery power. Wireless Sensor networks are powered by a battery which is a very limited resource. At present, various types of cryptographic algorithms provide high security to information on networks, but there are also has some drawbacks.  The present asymmetric encryption methods and symmetric encryption methods can offer the security levels but with many limitations. For instance key maintenance is a great problem faced in symmetric encryption methods and less security level is the problem of asymmetric encryption methods even though key maintenance is easy. To improve the strength of these algorithms, we propose a new hybrid cryptographic algorithm in this paper. The algorithm is designed using combination of two symmetric cryptographic techniques and two Asymmetric cryptographic techniques. This protocol provides three cryptographic primitives, integrity, confidentiality and authentication. It is a hybrid encryption method where elliptical curve cryptography (ECC) and advanced encryption (AES) are combined to provide node encryption. RSA algorithm and Blowfish are combined to provide authentication and (MD5) for integrity. The results show that the proposed hybrid cryptographic algorithm gives better performance in terms of computation time and the size of cipher text.This paper tries to present a fair comparison between the new protocols with four existing different hybrid protocols according to power consumption. A comparison has been conducted for those protocols at different settings for each protocol such as different sizes of data blocks, and finally encryption/decryption speed. Experimental results are given to demonstrate the effectiveness of each algorithm.

Authors and Affiliations

DiaaSalama AbdElminaam, Hatem M. Abdul Kader, Mohie M. Hadhoud, Salah M El-Sayed

Keywords

Related Articles

Model-Based Parallelizer for Embedded Control Systems on Single-ISA Heterogeneous Multicore

This paper presents a model-based parallelization approach to parallelize embedded systems on single-ISA heterogeneous multicore processors, especially processors with the ARM big.LITTLE architecture, wherein the core as...

A Performance Evaluation of Shape Based Image Retrieval Using Heuristic Function

Heuristic function plays an important role in content based image retrieval. The heuristic function used for feature selection and feature optimization for retrieval process. The feature selection process are depends on...

An Evaluation of Mobility Effect on Tiny Service Discovery Protocol for Wireless Sensor Networks

In mobile sensors environment, nodes change their positions this leads to crucially affects service discovery of wireless sensor networks (WSNs). Therefor the accuracy of most service discovery can be limited to just sma...

Congestion Control for Fault Tolerant Multicast Routing in MANET

Mobile Ad hoc Network (MANET) is a collection of two or more devices or nodes or terminals with wireless communications and networking capability that communicate with each other without the aid of any centralized admini...

Improvement inEnergy Efficiency of Wireless Sensor Network

Clustering in wireless sensor network is important to increase the lifetime of sensor network. LEACH protocol is one of the clustering routing protocols in wireless sensor networks. In LEACH each node has the equal proba...

Download PDF file
  • EP ID EP650466
  • DOI 10.24297/ijct.v13i1.2926
  • Views 95
  • Downloads 0

How To Cite

DiaaSalama AbdElminaam, Hatem M. Abdul Kader, Mohie M. Hadhoud, Salah M El-Sayed (2014). Developing and Evaluation of New Hybrid Encryption Algorithms. INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY, 13(1), 4038-4052. https://europub.co.uk./articles/-A-650466