Skip to main content
Log in

Combining Encryption and Compression in Wireless Sensor Networks

  • Published:
International Journal of Wireless Information Networks Aims and scope Submit manuscript

Abstract

More and more, wireless sensor networks (WSNs) are making their way out of the laboratory and into real-world deployments where they must be concerned with issues of security. These networks of motes are also being tasked with sensing and monitoring duties that often require high-fidelity data to be delivered from individual nodes, a situation which precludes the use of data aggregation and other techniques to reduce the volume of sensing data by condensing it within the network. This paper makes a case for why continued research in the area of joint compression and encryption is relevant to the field of wireless sensor networks and presents an approach based on the LZW algorithm combined with cryptographically strong pseudo-random number generators.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1

Similar content being viewed by others

Notes

  1. compress refused to create an output file. The benefits of the BWT stage in bzip2 for this data set can be observed in the high compression ratio achieved.

  2. The software is freely available for download but required some modifications in order to compile either under Linux or Windows. Please contact the authors if instructions are desired.

References

  1. K. C. Barr and K. Asanovic̀, Energy-aware lossless data. ACM Transactions on Computer Systems, Vol. 24, No. 3, pp. 250–291, 2006. doi:10.1145/1151690.1151692.

    Article  Google Scholar 

  2. C. Castelluccia and A. Francillon, TinyRNG, a cryptographic random number generator for wireless sensor network nodes. In: 5th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks. IEEE, New York, NY, USA, 2007. http://www.ist-ubisecsens.org/publications/TinyRNG.pdf.

  3. E. Celikel and M. E. Dalkılıç, Computer and Information Sciences—ISCIS 2003, Lecture Notes in Computer Science, Vol. 2869/2003. A Security Embedded Text Compression Algorithm, pp. 187–195. Springer, Berlin/Heidelberg, 2003. doi:10.1007/b14229. http://www.springerlink.com/content/qrufqeq4ba5eala5/.

  4. Crossbow Technology Inc., MICAz Datasheet, 2009. http://www.xbow.com/Products/Product_pdf_files/Wireless_pdf/MICAz_Datasheet.pdf.

  5. P. Ganesan, R. Venugopalan, P. Peddabachagari, A. Dean, F. Mueller, and M. Sichitiu, Analyzing and modeling encryption overhead for sensor network nodes. In: WSNA ’03: Proceedings of the 2nd ACM International Conference on Wireless Sensor Networks and Applications, pp. 151–159. ACM Press, New York, NY, USA, 2003. doi:10.1145/941350.941372.

  6. Incorporated Research Institutions for Seismology, SAC software, 2009. http://www.iris.edu/manuals/sac/index.htm.

  7. R.W. Ives and N. Magotra, Lossless compression of waveform data using multiple-pass adaptive filtering. In: Geoscience and Remote Sensing Symposium, 2000. Proceedings. IGARSS 2000. IEEE 2000 International, Vol. 6, pp. 2648–2650, 2000. doi:10.1109/IGARSS.2000.859669.

  8. J. Ruusu, Aespipe AES utility, v2.3b, 2009. http://loop-aes.sourceforge.net/.

  9. H. Karl and A. Willig, Protocols and Architectures for Wireless Sensor Networks. John Wiley & Sons, 2005.

  10. J. Kelsey, B. Schneier, and D. Wagner, Related-key cryptanalysis of 3-WAY, Biham-DES, CAST, DES-X, NewDES, RC2, and TEA, 2009. http://www.schneier.com/paper-relatedkey.pdf. Published on author’s website.

  11. T. Krishnam and S. Oraintara, Fast and lossless implementation of the forward and inverse mdct computation in mpeg audio coding. In: IEEE International Symposium on Circuits and Systems, 2002, Vol. 2, pp. II-181–II-184, 2002.

  12. P. Levis, N. Patel, D. Culler, S. Shenker, and Trickle, A Self-regulating Algorithm for Code Propagation and Maintenance in Wireless Sensor Networks, 2004. http://www.tinyos.net/papers/trickle-nsdi04.pdf.

  13. F. Liu and H. Koenig, A novel encryption algorithm for high resolution video. In: NOSSDAV ’05: Proceedings of the International Workshop on Network and Operating Systems Support for Digital Audio and Video, pp. 69–74. ACM Press, New York, NY, USA, 2005. doi:10.1145/1065983.1066001.

  14. S. Liu, O. V. Gavrylyako, and P. G. Bradford, Implementing the TEA algorithm on sensors. In: ACM-SE 42: Proceedings of the 42nd annual Southeast Regional Conference, pp. 64–69. ACM Press, New York, NY, USA, 2004. doi:10.1145/986537.986553.

  15. Moteiv Corporation, Tmote Sky Datasheet, 2006. http://www.moteiv.com/products/docs/tmote-sky-datasheet.pdf.

  16. A. Rukhin et al., A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications, 2001. http://csrc.nist.gov/rng/SP800-22b.pdf.

  17. C. M. Sadler and M. Martonosi, Data compression algorithms for energy-constrained devices in delay tolerant networks. In: SenSys ’06: Proceedings of the 4th International Conference on Embedded Networked Sensor Systems, pp. 265–278. ACM Press, New York, NY, USA (2006). doi:10.1145/1182807.1182834.

  18. S.W. Seong and P. Mishra, A bitmask-based code compression technique for embedded systems. In: ICCAD ’06: Proceedings of the 2006 IEEE/ACM International Conference on Computer-aided Design, pp. 251–254. ACM Press, New York, NY, USA, 2006. doi:10.1145/1233501.1233551.

  19. J. Soto, The NIST Statistical Test Suite (STS), Vol. 5, 2009. http://csrc.nist.gov/rng/.

  20. W. Stallings, Cryptography and Network Security: Principles and Practices. Pearson Education, Upper Saddle River, NJ, 2006.

  21. L. Tang, Methods for encrypting and decrypting MPEG video data efficiently. In: MULTIMEDIA ’96: Proceedings of the Fourth ACM International Conference on Multimedia, pp. 219–229. ACM Press, New York, NY, USA, 1996. doi:10.1145/244130.244209.

  22. T. Ylonen et al., OpenSSH Homepage, 2009. http://www.openssh.com/.

  23. T. Tran, The BinDCT: fast multiplierless approximation of the DCT, 2000. http://citeseer.ist.psu.edu/tran99bindct.html.

  24. C. Y. Wan, A. T. Campbell, and L. Krishnamurthy, PSFQ: a reliable transport protocol for wireless sensor networks. In: WSNA ’02: Proceedings of the 1st ACM International workshop on Wireless sensor networks and applications, pp. 1–11. ACM Press, New York, NY, USA, 2002. doi:10.1145/570738.570740.

  25. Y. Wu, S. Lonardi, and W. Szpankowski, Error-resilient LZW data compression. In: Data Compression Conference, 2006. DCC 2006. Proceedings, pp. 193–202. IEEE Computer Society, Washington, DC, USA, 2006. doi:10.1109/DCC.2006.33.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Orest Pilskalns.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Mancill, T., Pilskalns, O. Combining Encryption and Compression in Wireless Sensor Networks. Int J Wireless Inf Networks 18, 39–49 (2011). https://doi.org/10.1007/s10776-010-0127-8

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10776-010-0127-8

Keywords

Navigation