Paper 5
Paper 5
Received on: April, 2024 Revised and Accepted on: May, 2024 Published on: July, 2024
ABSTRACT
Security concerns have been brought up by the electronics industry's widespread use of ubiquitous gadgets. The
limitations of power consumption, space, and speed make it impractical to construct a full-fledged cryptographic
environment using traditional encryption techniques in embedded systems like the Internet of Things. Lightweight
cryptography is the main focus in order to get over these obstacles. This study proposes a new lightweight
cryptography cipher that modifies the original PRESENT cipher by introducing a new layer between the S-box
layer and P-layer of the current encryption-decryption process, lowering the encryption round, and changing the
Key Register updating technique. The delta value function of the lightweight cipher known as the Modified Tiny
Encryption Algorithm (MTEA) is added to the key register to update its encryption value. By adding an additional
layer, we are able to lower the PRESENT round from 31 to 25, which is the bare requirement for security.
Encrypting the key register increases the suggested algorithm's efficiency. By using MATLAB2022a and
SIMULINK2022a are product of math work, widely used for mathematical computing algorithm development,
data analysis, visualization and simulation.
Keywords: New lightweight cryptography cipher, NLCC Security, MTEA, LSA.
1. INTRODUCTION quality. WSN integration with the Internet has received
These days, the popularity of wireless sensor networks a lot of attention lately (Gubbi et al, 2013). WSNs are
(WSNs) and their many application fields is growing vulnerable to a variety of attack types that target
due to their low cost, flexibility, ease of deployment, various network levels. Due to various limitations
and capacity for self-organization (Rawat et al., 2014). (such as haphazard deployment in unmonitored areas)
In a wireless sensor network (WSN), sensor nodes and restrictions on energy, computing, and storage
gather relevant environmental data (such as: resources, adopting strong and intricate security
temperature, humidity, and image quality) and send measures is extremely difficult when it comes to sensor
messages to the base station (BS) via wireless and network security (Saleem et al, 2023).
multi-hop communications. As seen in figure 1, the BS
is a downstream of all data originating from the sensor One of the most damaging attacks known to target the
nodes. originality attribute of network messages is the replay
(man-in-the-middle) technique. Typically, the attacker
only replays the application data and signalling
information many times, which can result in missing or
erroneous alarms depending on how the message is
repeated. In fact, the attacker might be more cunning
and replay the message's data field alone. In wireless
sensor networks, where sensed data is frequently
sensitive and must be unique, as shown in Figure 1, this
novel repeat attack scenario is far riskier.