Authenticated Encryption for Wireless Sensor Network
Total Page:16
File Type:pdf, Size:1020Kb
Journal of Wireless Communication, Network and Mobile Engineering Technology Volume 4 Issue 1 Authenticated Encryption for Wireless Sensor Network Padmavathi H.G, Dr Dinesh S, Dr Manjunath M*, Prof. G Venkatesha Brindavan College of Engineering, Dwarakanagar, Bagalur Main Road, Bangalore, Karnataka Corresponding author’s email id: [email protected] * DOI: http://doi.org/10.5281/zenodo.2637774 Abstract Wireless Sensor Networks (WSNs) are becoming popular day by day. Security issues on WSN thus draw much attention. To receive trusted information from these sensor nodes they have to send authenticated messages. Encryption is alone not enough to ensure the confidentiality, authenticity and integrity of communicated data. AES encryption algorithm is adopted by many WSN standards such as IEEE 802.15.4 and IEEE 802.15.6. AES algorithm which provides data encryption, also provides additional security services such as data authentication, integrity when it is combined with appropriate functionality.In this paper we have discussed different modes of operation of block ciphers which gives authenticated encryption. AES-CCM (Advanced Encryption Standard –Counter Mode with Cipher Block Chaining Mode) is a security standard that gives highest level of security. Software implementation of the algorithm is done in java and the obtained results show that it is a good solution for wireless sensor network Security. Keywords: Security, Authentication, Blockciphers, WSN, AES-CCM (Advanced Encryption Standard –Counter Mode with Cipher Block Chaining Mode) INTRODUCTION sensor nodes. Because of the Selection of suitable security scheme is communication channel and the trust less critical in wireless sensor networks environment, security issues have been a (WSNs) due to wireless media big problem on WSN node research. IEEE communication and limited resources of 802.15.4 is one of the standards defining 47 Page 47-55 © MANTECH PUBLICATIONS 2019. All Rights Reserved Journal of Wireless Communication, Network and Mobile Engineering Technology Volume 4 Issue 1 radio and media access control for a low to encrypt only 16 bytes of messages and rate, low power WSN [1].IEEE 802.15.4 blowfish is able to encrypt 8 bytes long investigates low data rate WSN solutions messages. Longer messages are split into with a battery life ranging from few blocks. Each block is combined with months to several years. The IEEE previously encrypted blocks and passed to 802.15.4 standard is intended to operate in the block cipher. Block combining is unlicensed and international frequency called an operation mode and there are band.802.15.4 specifies cryptographic multiple secure ways how to do it. Mode procedures for protecting communications of operation is a technique for enhancing at medium access control layer. The MAC the effect of a cryptographic algorithm or layer of 802.15.4 uses the AES-CCM adapting the algorithm for an application. protocol as security mechanism, it uses the These modes of operation (ECB, CBC, AES algorithm as the core, uses CTR CFB, OFB, and CTR) are intended to use mode to ensure confidentiality of data, with any block ciphers including triple uses CBC-MAC mode to authenticate the DES and AES. These modes of operation public information of the header in MAC can provide confidentiality or authenticity, frame [1]. but are not able to provide both simultaneously. In this paper we use java cryptographic library functions to implement generic Authenticated Encryption (AE) is a term AES algorithm in CCM mode. used to describe encryption systems which simultaneously protect confidentiality, The paper is organized as follows. Section authenticity and integrity of II presents the Authenticated Encryption communications.AE rejects any modified and modes of operation. Section III gives cipher text as invalid. It is not possible to the security protocol suite of IEEE take encrypted data, modify them and end 802.15.4. Section IV gives the result of up with valid cipher text. This property is implementation and limitations. Section V also called cipher text integrity. Any is conclusion. cipher that does not provide cipher text integrity or authenticated encryption is AUTHENTICATED ENCRYPTION probably vulnerable to some active attack. Block ciphers are only able to encrypt short messages. For example AES is able 48 Page 47-55 © MANTECH PUBLICATIONS 2019. All Rights Reserved Journal of Wireless Communication, Network and Mobile Engineering Technology Volume 4 Issue 1 Basic components of AE are Message message. Computing the MAC requires authentication Code and Symmetric senders and receivers share a secret key. encryption. Composition methods are: Depending upon the secret key, the sender computes a MAC and adds it to the Encrypt-and –MAC message it sends. On the other end, the MAC-then-Encrypt receiver sharing the secret key recalculates Encrypt-then-MAC the MAC and accepts the message if and only if the received and the computed Encrypt-then-MAC provides the most MACs are the same. The success of this secure solution for authenticated idea heavily relies on the strength of MAC encryption. Authenticated encryptions are which is generally difficult to forge secure against active attackers. Most without a secret key. This security measure common operation modes that provide also prevents the adversary from modifying a authentication are: valid message and making it acceptable to a receiver without the knowledge of a GCM (Galois Counter Mode) shared secret key [3]. CCM (Counter Mode with Cipher Block Chaining Mode) Symmetric Encryption OCB (Offset Code Book Mode) AES is cryptographic algorithm which has CWC (Cater-Wegman Counter Mode) become the basic choice of encryption for a wide range of application.AES is a symmetric-key block cipher with a These AE modes extend the advantages of Plaintext length of 128 bits and a flexible the known modes and improve them by the Key length of 128, 192 or 256 bits. The carefully chosen algorithm to provide output of the AES algorithm is also 128 confidentiality and authenticity [3]. bits and it is called Cipher text. In most wireless standards such as IEEE 802.15.4, Message Authentication Code the key length is 128 bits. To ensure message authentication and integrity, a message authentication code The AES algorithm contains encryption (MAC) is appended to each message sent. and key Expansion processes. This MAC is viewed as a cryptographically secure checksum of the 49 Page 47-55 © MANTECH PUBLICATIONS 2019. All Rights Reserved Journal of Wireless Communication, Network and Mobile Engineering Technology Volume 4 Issue 1 Encryption process consists of 10 The GCM mode uses a variation of the rounds and in each round it does Sub Counter mode with an incrementing Bytes (), Shift Rows (), Mix Colums() function to ensure the confidentiality. And and Add Round Keys() operations. the authentication is ensured by using a hash function over a binary Galois field, Key Expansion process is done by a this hash function is called GHASH. The function called Schedule Key () which encryption and authentication of GCM are in turn consists of two operations secure against the chosen-plaintext attack. namely SubWord() and Rotword(). The implementation of GCM can be done in both hardware and software [4]. AES provides various security services based on 7 modes of operations [4]. Counter mode with Cipher Block Chaining Mode Galois/Counter Mode The CCM mode is a combination of the The Galois/Counter Mode (GCM) is a Counter (CTR) mode and the Cipher block cipher mode of operation which is Block Channing (CBC) mode, where the used to provide authenticated encryption. Counter mode and the CBC mode are As the name suggests, the GCM mode applied respectively to provide combines the well-known counter mode confidentiality and authenticity with using with the new Galois mode. The GCM a single key. The CCM mode is only mode can be applied to 64-bit block defined to support the 128-bit block cipher cipher. GCM has two functions, algorithm, such as AES-128. The CCM authenticated encryption and authenticated mode accepts a variable-length decryption. The two outputs of the authentication tags (from 32-bits to 128- authenticated encryption function are: bits), thus allowing varying degrees of protection against unauthorized A cipher text, denoted C, which has the modifications. same length as that of the plaintext The CCM mode has two functions, namely An authentication tag, denoted T, encryption-authentication function and which has any bit length between 64 decryption-verification function. Because and 128 the CCM mode uses single key, the key does not allow to be accessed without 50 Page 47-55 © MANTECH PUBLICATIONS 2019. All Rights Reserved Journal of Wireless Communication, Network and Mobile Engineering Technology Volume 4 Issue 1 evidence. The value of the nonce should SECURITY MODEL FOR WSN be unique for each key in encryption [4]. The IEEE 802.15.4 standard is designed for low-rate wireless personal area Offset Code Book Mode networks (LR-WPANs).Unlike wireless The Offset Code Book (OCB) mode is local area networks (WLANs), another AE mode, which provides the connections effected via WPANs involve confidentiality and the authenticity little or no infrastructure. This is set to simultaneously. Before appearing of the become the standard communications AE modes, the confidentiality and the protocol for use in wireless sensor authenticity are provided separately by two networks. Features allow small, power systems: block cipher for the efficient, inexpensive solutions to be confidentiality and MAC for the implemented for an expansive range of authenticity. devices. However, the OCB mode combines The main objectives of an LR-WPAN are appropriately block cipher and MAC, and ease of installation, reliable data transfer, the computational cost is lower as the two short-range operation, and extremely low separate systems. The OCB mode accepts cost and reasonable battery life, whilst the block cipher, which has the size of maintaining a simple and flexible protocol.