Enhancing the Process of AES: A Lightweight Cryptography Algorithm AES for Ad-hoc Environments

Enhancing the Process of AES: A Lightweight Cryptography Algorithm AES for Ad-hoc Environments

Ad hoc networks have become more widespread and important because they support mobility and can be used in different situations and some difficult areas such as rescue missions, military, and vehicular communications. Security is stated among the most significant challenges facing Ad Hoc networks due to its characteristic features such as the topology dynamicity, lack of infrastructure centralization, and open architecture. Ad hoc networks work on battery power, and this kind of networks tend to consume more power and time to process data and memory resources through data encryption, eventually requiring a higher amount of power and more time. Therefore, an AES lightweight algorithm is proposed, which is one of the complicated encryption algorithms. This algorithm will be modified to improve the security as well as reduce the amount of time and energy consumed in comparison with the original algorithm. The enhanced version is based on the outputs of sub byte and shift row, in addition to an exclusive X-OR operator between them, whereby the output of the X-OR operator is added to the round key layer. The results confirm that this enhanced algorithm is efficient, accurate, and robust against multiple types of attacks related to ad hoc networks.

___

  • Basagni, S., Conti, M., Giordano, S., & Stojmenovic, I. (Eds.). (2004). Mobile ad hoc networking. John Wiley & Sons.
  • V.Rani, Dr. Renu Dhir, “ A Survey of Ad Hoc Network: A Review” IJARCCSE,Volume 3, Issue 3. (2013).
  • lmahdi, E., Yoo, S. M., & Sharshembiev, K. (2018, January). Securing data forwarding against blackhole attacks in mobile ad hoc networks. In 2018 IEEE 8th annual computing and communication workshop and conference (CCWC) (pp. 463-467). IEEE. Costa, D. G., Figuerêdo, S., & Oliveira, G. (2017). Cryptography in wireless multimedia sensor networks: A survey and research directions. Cryptography, 1(1), 4.
  • Alyas, H. H., & Abdullah, A. A. (2021). Enhancement the ChaCha20 Encryption Algorithm Based on Chaotic Maps. In Next Generation of Internet of Things (pp. 91-107). Springer, Singapore.
  • Vanda, L. Buttyán et al., “Lightweight authentication protocols for low-cost RFID tags,” in Second Workshop on Security in Ubiquitous Computing–Ubicomp, vol. 2003, (2003).
  • Abdullah, A. A., & Obeid, N. R. (2021, March). Efficient Implementation for PRINCE Algorithm in FPGA Based on the BB84 Protocol. In Journal of Physics: Conference Series (Vol. 1818, No. 1, p. 012216). IOP Publishing.
  • Agwa, E. Yahya, and Y. Ismail, “Power efficient AES core for IoT constrained devices implemented in 130nm CMOS,” Proc. - IEEE Int. Symp. Circuits Syst., pp. 2–5, (2017).
  • Muhammad Usman, Irfan Ahmed, M. Imran Aslam, Shujaat Khan and Usman Ali Shah, SIT: “A Lightweight Encryption Algorithm for Secure Internet of Things,” International Journal of Advanced Computer Science and Applications, Vol. 8, No. 1, (2017). \ Tenzin Kunchok, Prof. Kirubanand V. B, “A lightweight hybrid encryption technique to secure IoT data transmission”, International Journal of Engineering & Technology, vol. 7, no. 2.6 , (2018)
  • Aziz, A., & Singh, K, Lightweight security scheme for Internet of Things. Wireless Personal Communication Issue: 104, 2/2019, Springer online available: 26 Oct (2018).
  • Abdullah, D.; Rahim, R.; Siahaan, A.P.U.; Ulva, A.F.; Fitri, Z.; Malahayati, M.; Harun, H. Super-Encryption Cryptography with IDEA and WAKE Algorithm. J. Phys. Conf. Ser. (2018).
  • Mohanty, S.N.; Ramya, K.C.; Rani, S.S.; Gupta, D.; Shankar, K.; Lakshmanaprabu, S.K.; Khanna, A. An efficient Lightweight integrated Blockchain (ELIB) model for IoT security and privacy. Future Gener. Comput. Syst. (2020).
  • J. Daemen, V. Rijmen, and K. U. Leuven, AES Proposal: Rijndael. (NIST), National Institute of Standards, (1999).
  • N. I. of Standards-(NIST), Advanced Encryption Standard (AES). Federal Information Processing Standards Publication197, (2001).
  • P.V.S. Shastry, A. Agnihotri, D. Kachhwaha, J. Singh and M.S. Sutaone, “A Combinational Logic Implementation of S-Box of AES,” IEEE 54th Int. Midwest Symp on Circuits and Systems (MWSCAS), pp. 1-4. (2011).
  • Schneier, B. (2015). Secrets and lies: digital security in a networked world. John Wiley & Sons.
Journal of Advanced Research in Natural and Applied Sciences-Cover
  • Yayın Aralığı: Yılda 4 Sayı
  • Başlangıç: 2015
  • Yayıncı: Çanakkale Onsekiz Mart Üniversitesi
Sayıdaki Diğer Makaleler

Effect of Grovth Medium on L-Dopa and Dopamine Production Using Citrobacter freundii (NRRL B-2643)

Meltem ÇAKMAK, Veyis SELEN, Dursun ÖZER, Fikret KARATAŞ, Sinan SAYDAM

Sentiment Analysis from Face Expressions Based on Image Processing Using Deep Learning Methods

Orhan Emre AKSOY, Selda GÜNEY

Fretting behavior of piston ring-cylinder liner components of a diesel engine running on TiO2 nanolubricant

Ali Can YILMAZ

Makine Öğrenmesi Yöntemleri ile Türkiye’de Covid-19’a İlişkin Günlük Vaka, Ağır Hasta, Vefat ve İyileşen Sayısı Tahmini

Figen ÖZEN

An Integrated Risk Management Framework for Global Supply Chains

Mualla Gonca AVCI

Enhancing the Process of AES: A Lightweight Cryptography Algorithm AES for Ad-hoc Environments

Mustafa ALHANDHAL, Alharith A. ABDULLAH, Oğuz ATA, Çağatay AYDİN

Group-Based Authentication Methods in The OneM2M Ecosystem

İbrahim Uğur ABA, Erhan TAŞKIN

The Changes in Biochemical Compositions of Five Different Macroalgae and Seagrass (Halophila stipulacea (Forsskal) Ascherson 1867) Collected from Iskenderun Bay

Mehmet NAZ, Selin SAYIN, Zafer ÇETİN, Eyüp İlker SAYGILI, Ergün TAŞKIN, Oktay SÖYLER

Culturable Bacterial Communities Related to Different Larval Stages of Sanys irrosea (Guenee, 1852) (Lepidoptera: Noctuoidae)

Ali SEVİM, Elif SEVİM

Deniz Ulaştırma İşletme Mühendisliği Bölümlerindeki Hiyerarşik Yapının Öğrenciler Üzerindeki Psikolojik Etkilerinin Kapsamlı Analizi

Devran YAZIR, Sefa YAY