DOI QR코드

DOI QR Code

Optimized implementation of HIGHT algorithm for sensor network

센서네트워크에 적용가능한 HIGHT 알고리즘의 최적화 구현 기법

  • Received : 2011.05.08
  • Accepted : 2011.06.15
  • Published : 2011.07.31

Abstract

As emergence of the ubiquitous society, it is possible to access the network for services needed to us in anytime and anywhere. The phenomena has been accelerated by revitalization of the sensor network offering the sensing information and data. Currently, sensor network contributes the convenience for various services such as environment monitoring, health care and home automation. However, sensor network has a weak point compared to traditional network, which is easily exposed to attacker. For this reason, messages communicated over the sensor network, are encrypted with symmetric key and transmitted. A number of symmetric cryptography algorithms have been researched. Among of them HIGHT algorithm in hardware and software implementation are more efficient than tradition AES in terms of speed and chip size. Therefore, it is suitable to resource constrained devices including RFID tag, Sensor node and Smart card. In the paper, we present the optimized software implementation on the ultra-light symmetric cryptography algorithm, HIGHT.

유비쿼터스 세상의 도래와 함께 언제 어디서나 네트워크 망에 접속하여 자신에게 필요한 서비스를 이용하는 것이 가능해 졌다. 이는 지역의 센싱 정보와 데이터를 제공하는 센서 네트워크의 발달로 인해 가속화되어 가고 있다. 현재 센서 네트워크는 환경 모니터링, 헬스케어 그리고 홈자동화와 같은 우리 삶의 편의에 큰 기여를 하고 있다. 하지만 기존의 네트워크와는 달리 한정적인 자원을 가진 센서를 통한 무선통신을 수행함으로써 공격자에게 쉽게 노출되는 단점을 가진다. 따라서 센서 네트워크 상에서의 안전한 보안통신을 위해 통신간에 유통되는 메시지는 대칭키로 암호화되어 전송된다. 지금까지 많은 대칭키 암호화알고리즘이 연구되어 왔으며 그 중에서도 HIGHT 알고리즘은 하드웨어와 소프트웨어 구현에서 기존의 AES보다 속도측면에서 효율적이다. 따라서 RFID 태그와 센서 노드 그리고 스마트 카드와 같은 자원 한정적인 장비에 적합하다. 본 논문에서는 초경량 대칭키 암호화 알고리즘인 HIGHT 알고리즘의 소프트웨어 최적화 구현 기법을 제시한다.

Keywords

References

  1. A. Perrig, J. Stankovic, and D. Wagner, ""Security in Wireless Sensor Networks,"" Communications of the ACM, vol. 47, no. 6, pp. 53-57, June 2004. https://doi.org/10.1145/990680.990707
  2. Kinney, P. 2003. "ZigBee Technology: Wireless Control that Simply Works." ZigBee Alliance.
  3. Deukjo Hong, Jaechul Sung, Seokhie Hong, Jongin Lim, Sangjin Lee, Bonseok Koo, Changhoon Lee, Donghoon Chang, Jaesang Lee, Kitae Jeong, Hyun Kim, Jongsung Kim, and Seongtaek Chee. HIGHT: A New Block Cipher Suitable for Low-Resource Device. In Louis Goubin and Mitsuru Matsui, editors, CHES, volume 4249 of Lecture Notes in Computer Science, pp. 46-59. Springer, 2006.
  4. Texas instruments, "MSP430x11x MIXED SIGNAL MICROCONTROLLERS", 2004.
  5. W. Liu, R. Luo, and H. Yang. Cryptography overhead evaluation and analysis for wireless sensor networks. Communications and Mobile Computing, International Conference on, pp. 496-501, 2009.
  6. D. Engels, X. Fan, G. Gong, H. Hu, and E. M. Smith, "Hummingbird:Ultra-Lightweight Cryptography for Resource- Constrained Devices", to appear in the proceedings of The 14th International Conference on Financial Cryptography and Data Security FC 2010, 2010.
  7. A. Poschmann, Lightweight Cryptography Cryptographic Engineering for a Pervasive World", Ph.D. Thesis, Department of Electrical Engineering and Information Sciences, Ruhr-UniversitAaet Bochum, Bochum, Germany, 2009.

Cited by

  1. Design of a Key Scheduler for Supporting the Parallel Encryption and Decryption Processes of HIGHT vol.24, pp.2, 2015, https://doi.org/10.5369/JSST.2015.24.2.107
  2. State Analysis and Location Tracking Technology through EEG and Position Data Analysis vol.8, pp.2, 2011, https://doi.org/10.14801/jaitc.2018.8.2.27
  3. Parallel Implementations of ARX-Based Block Ciphers on Graphic Processing Units vol.8, pp.11, 2011, https://doi.org/10.3390/math8111894