Energy Efficient Encryption Algorithm for Low Resources Devices

Bassam W. Aboshosha, Mohamed M. Dessouky, Ayman Elsayed
Saving energy is one of the most challenging aspects in the wireless network devices. Such devices are connected together to perform a certain task. A well-known example of these structures is the Wireless Sensor Network (WSN). Distributed WSN consists of several spread nodes in a harsh area. Therefore, once network has been established sensors replacement is not a possible option before at least five years which called network lifetime. So, it is a necessity to develop specific energy aware algorithms that could save battery lifetime as much as possible. Security and Privacy are the vital elements which need to be addressed to hold up to the trust of users in WSN environment. Because the majority of modern cryptographic algorithms were designed for desktop/server environments, many of these algorithms cannot be implemented in the constrained devices used by these networks. Symmetric key algorithms are a typically efficient and fast cryptosystem, so it has significant applications in many realms. For a WSN with constraint computational resources, the cryptosystem based on symmetric key algorithms is extremely suitable for such an agile and dynamic environment. Therefore, a Simple Lightweight Encryption Algorithm (SLEA) based on addition and subtraction operations and compact Substitution-boxes (S-boxes) is proposed for wireless networks due to its low energy consumption, simple hardware requirements and suitable level of security. In addition, the algorithm tries to overcome the limitations of both public- and symmetric-key protocols. It relies on a smart version of Feistel structure.


Wireless networks; security; privacy; Wireless Sensor Networks(WSNs); cryptosystem; SLEA; Feistel structure


Atzori, L., Iera, A. & Morabito, G. (2010). The internet of things: a survey. Comput Netwok, 54(15), 2787–2805.

Gubbi, J., Buyya, R., Marusic, S. & Palaniswami, M. (2013). Internet of things (iot): A vision, architectural

elements, and future directions. Future Generation Computer Systems,29(7), 1645–1660.

Want, R., & Dustdar, S. (2015). Activating the internet of things. IEEEComputer Society,48(9), 16–20.

Mariona, J., Hallman, R., Kline, M., Miguel, J., Major, M. & Kerr, L. (2016). Security in the industrial internet of things. International Conference on Internet of Things and Big Data. At Rome, Italy

Suo, H., Wan, J., Zou, C., & Liu., J. (2012). Security in the internet of things: A Review. IEEE International Conference on Computer Science and Electronics Engineering.

Ho, G., Leung, D., Mishra, P., Hosseini, A., Song, D., & Wagner, D. (2016). Smart locks: Lessons for securing commodity internet of things devices. The11th ACM on Asia Conference on Computer and Communications Security .

National Bureau of Standards, U.S. Department of Commerce. (1977, January). Data Encryption Standard. Federal Information Processing Standard (FIPS).

Stallings, W. (2009). Cryptography and network security: Principals and Practices.

Lai, X. & Massey, J. (1990). A proposal for a new block encryption standard. In Proceedings of the EUROCRYPT 90 Conference, 389-404.

Schneier. (1994, April). The Blowfish encryption algorithm.Dr. Dobb’s Journal of Software Tools,19(4), 38-40.

Daemen & Rijmen, V. (1999, September 3). AES Proposal: Rijndael, AES algorithm submission. International Journal of Computer Applications.

Nechvatal, James., Barker, Elaine., Bassham, Lawrence., Burr, William., Dworkin, Morris., Foti, James., & Roback, Edward. (2001, May– June). Report on the Development of the Advanced Encryption Standard

(AES). International Journal of Computer Applications, 106 (3).

Coppersmith, D. (1994, May). The Data Encryption Standard (DES) and Its Strength Against Attacks. IBM Journal of Research and Development, 243 - 250.

Biham, E., Shamir, A. (1991). Differential cryptanalysis of DES-like cryptosystems. Journal of Cryptology,4(l).

Leander, G., Paar, C., Poschmann, A., Schramm, K. (2007, March). New Lightweight DES Variants. Fast

Software Encryption 2007, LNCS, Springer-Verlag, 26.-28.

Bogdanov, A., Knudsen, L.R., Leander, G., Paar, C., Poschmann, A., Robshaw, M.J.B., . . . Vikkelsoe, C.

(2007, September 10). PRESENT: An Ultra-Lightweight Block Cipher. International Workshop on Cryptographic Hardware and Embedded Systems, Vienna, Austria: LNCS, Springer-Verlag.

Korte, T., & Silverlight. (2009, February). Implementation of PRESENT. thesis, Embedded Security

Group. Ruhr University Bochum.

Beaulieu, R., Shors, D., Smith, J., Treatman-Clark, S., Weeks, B., & Wingers, L. (2013). The SIMON and

SPECK Families of Lightweight Block Ciphers. IACR Cryptology ePrint Archive.

Rivest, R.L. (1994, December 14–16). The RC5 Encryption Algorithm. Second International Workshop on Fast Software Encryption (FSE 1994), Leuven, Belgium: LNCS 1008.

Wheeler, D.J., & Needham, R.M. (1994, December 14–16). TEA, A Tiny Encryption Algorithm. Proc.

Second International Workshop on Fast Software Encryption (FSE 1994), Leuven, Belgium: LNCS 1008,


Christophe, De Canni‘ere. (2005). GOST article. Encyclopedia of Cryptography and Security, 242-243.

Courtois, Nicolas, T., Miształ, Michał. (2011). Differential cryptanalysis of GOST . Cryptology ePrint

Archive, from http: //

Courtois, Nicolas T. (2012). An improved differential attack on full GOST. Cryptology ePrint Archive, from

Seberry, Jennifer., Zhang, Xian-Mo., Zheng, Yuliang. (1993, August 10). Systematic generation of cryptographically robust s-boxes. The First ACM Conference on Computer and Communications Security. New York, USA.

Copyright (c) 2019 The Academic Research Community publication Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.