Movatterモバイル変換


[0]ホーム

URL:


Skip to main content

Advertisement

Springer Nature Link
Log in

Chaos and Logistic Map Based Key Generation Technique for AES-Driven IoT Security

  • Conference paper
  • First Online:

Abstract

Several efforts has been seen claiming the lightweight block ciphers as a necessarily suitable substitute in securing the Internet of Things. Currently, it has been able to envisage as a pervasive frame of reference almost all across the privacy preserving of smart and sensor oriented appliances. Different approaches are likely to be inefficient, bringing desired degree of security considering the easiness and surely the process of simplicity but security. Strengthening the well-known symmetric key and block dependent algorithm using either chaos motivated logistic map or elliptic curve has shown a far reaching potentials to be a discretion in secure real-time communication. The popular feature of logistic maps, such as the un-foreseeability and randomness often expected to be used in dynamic key-propagation in sync with chaos and scheduling technique towards data integrity. As a bit alternation in keys, able to come up with oversize deviation, also would have consequence to leverage data confidentiality. Henceforth it may have proximity to time consumption, which may lead to a challenge to make sure instant data exchange between participating node entities. In consideration of delay latency required to both secure encryption and decryption, the proposed approach suggests a modification on the key-origination matrix along with S-box. It has plausibly been taken us to this point that the time required proportionate to the plain-text sent while the plain-text disproportionate to the probability happening a letter on the message made. In line with that the effort so far sought how apparent chaos escalates the desired key-initiation before message transmission.

Supported by RMIT RTS Program.

This is a preview of subscription content,log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
JPY 3498
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
JPY 9723
Price includes VAT (Japan)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
JPY 12154
Price includes VAT (Japan)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide -see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Similar content being viewed by others

References

  1. Song, T., Li, R., Mei, B., Yu, J., Xing, X., Cheng, X.: A privacy preserving communication protocol for IoT applications in smart homes. IEEE Internet Things J.4(6), 1844–1852 (2017)

    Google Scholar 

  2. Moosavi, S.R., et al.: End-to-end security scheme for mobility enabled healthcare Internet of Things. Future Gener. Comput. Syst.64, 108–124 (2016)

    Google Scholar 

  3. Sehgal, A., Perelman, V., Kuryla, S., Schonwalder, J.: Management of resource constrained devices in the internet of things. IEEE Commun. Mag.50(12) (2012)

    Google Scholar 

  4. Mukhopadhyay, S.C., Suryadevara, N.K.: Internet of Things: challenges and opportunities. In: Mukhopadhyay, S.C. (ed.) Internet of Things. SSMI, vol. 9, pp. 1–17. Springer, Cham (2014).https://doi.org/10.1007/978-3-319-04223-7_1

    Chapter  Google Scholar 

  5. Lee, I., Lee, K.: The Internet of Things (IoT): applications, investments, and challenges for enterprises. Bus. Horiz.58(4), 431–440 (2015)

    Google Scholar 

  6. Yang, J., He, S., Lin, Y., Lv, Z.: Multimedia cloud transmission and storage system based on internet of things. Multimed. Tools Appli.76(17), 17735–17750 (2015).https://doi.org/10.1007/s11042-015-2967-9

  7. Farash, M.S., Turkanović, M., Kumari, S.: An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment. Ad Hoc Netw.36, 152–176 (2016)

    Google Scholar 

  8. Saied, Y.B., Olivereau, A., Zeghlache, D., Laurent, M.: Lightweight collaborative key establishment scheme for the Internet of Things. Comput. Netw.64, 273–295 (2014)

    Google Scholar 

  9. Jing, Q., Vasilakos, A.V., Wan, J., Lu, J., Qiu, D.: Security of the Internet of Things: perspectives and challenges. Wirel. Netw.20(8), 2481–2501 (2014).https://doi.org/10.1007/s11276-014-0761-7

  10. Yao, X., Chen, Z., Tian, Y.: A lightweight attribute-based encryption scheme for the Internet of Things. Future Gener. Comput. Syst.49, 104–112 (2015)

    Google Scholar 

  11. Turkanović, M., Brumen, B., Hölbl, M.: A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion. Ad Hoc Netw.20, 96–112 (2014)

    Google Scholar 

  12. Sicari, S., Rizzardi, A., Grieco, L.A., Coen-Porisini, A.: Security, privacy and trust in Internet of Things: the road ahead. Comput. Netw.76, 146–164 (2015)

    Google Scholar 

  13. Ion, M., Zhang, J., Schooler, E.M.: Toward content-centric privacy in ICN: attribute-based encryption and routing. In Proceedings of the 3rd ACM SIGCOMM Workshop on Information-Centric Networking, pp. 39–40. ACM. (2013)

    Google Scholar 

  14. Doukas, C., Maglogiannis, I.: Bringing IoT and cloud computing towards pervasive healthcare. In: Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), pp. 922–926. IEEE (2012)

    Google Scholar 

  15. Beaulieu, R., Treatman-Clark, S., Shors, D., Weeks, B., Smith, J., Wingers, L.: The SIMON and SPECK lightweight block ciphers. In: Design Automation Conference (DAC), 2015 52nd ACM/EDAC/IEEE, pp. 1–6. IEEE (2015)

    Google Scholar 

  16. Rahulamathavan, Y., Phan, R.C.W., Rajarajan, M., Misra, S., Kondoz, A.: Privacy-preserving blockchain based IoT ecosystem using attribute-based encryption. In: 2017 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS), pp. 1–6. IEEE. December (2017)

    Google Scholar 

  17. Babar, S., Stango, A., Prasad, N., Sen, J., Prasad, R.: Proposed embedded security framework for internet of things (IoT). In: 2011 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE), pp. 1–5. IEEE. February 2011

    Google Scholar 

  18. Baptista, M.S.: Cryptography with chaos. Phys. Lett. A240(1–2), 50–54 (1998)

    Google Scholar 

  19. Rahaman, Z., Corraya, A.D., Sumi, M.A., Bahar, A.N.: A novel structure of advance encryption standard with 3-dimensional dynamic S-box and key generation matrix. Int. J. Adv. Comput. Sci. Appl.8(2), 314–320 (2017)

    Google Scholar 

  20. Kocarev, L.: Chaos-based cryptography: a brief overview. IEEE Circuits Syst. Mag.1(3), 6–21 (2001)

    Google Scholar 

  21. Guckenheimer, J., Holmes, P.: Nonlinear Oscillations, Dynamical Systems, and Bifurcations of Vector Fields. AMS, vol. 42. Springer, New York (1983).https://doi.org/10.1007/978-1-4612-1140-2

    Book MATH  Google Scholar 

  22. Schneier, B.: Applied cryptography-protocols, algorithms, and source code in C (1996)

    Google Scholar 

  23. Kotulski, Z., Szczepański, J., Górski, K., Paszkiewicz, A., Zugaj, A..: Application of discrete chaotic dynamical systems in cryptography–DCC method. Int. J. Bifurcation Chaos9(06), 1121–1135 (1999)

    Google Scholar 

  24. Alvarez, G., Montoya, F., Romera, M., Pastor, G.: Breaking parameter modulated chaotic secure communication system. Chaos Solitons Fractals21(4), 783–787 (2004)

    Google Scholar 

  25. Fridrich, J.: Symmetric ciphers based on two-dimensional chaotic maps. Int. J. Bifurcation Chaos8(06), 1259–1284 (1998)

    Google Scholar 

  26. Ziv, J., Lempel, A.: A universal algorithm for sequential data compression. IEEE Trans. Inf. Theory23(3), 337–343 (1977)

    Google Scholar 

  27. Lian, S., Sun, J., Wang, Z.: A block cipher based on a suitable use of the chaotic standard map. Chaos Solitons Fractals26(1), 117–129 (2005)

    Google Scholar 

  28. Kocarev, L., Jakimoski, G.: Logistic map as a block encryption algorithm. Phys. Lett. A289(4–5), 199–206 (2001)

    Google Scholar 

  29. Jakimoski, G., Kocarev, L.: Differential and linear probabilities of a block-encryption cipher. IEEE Trans. Circuits Syst. I Fundam. Theory Appl.50(1), 121–123 (2003)

    Google Scholar 

  30. Doukas, C., Maglogiannis, I.: Bringing IoT and cloud computing towards pervasive healthcare. In: 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), pp. 922–926. IEEE, July 2012

    Google Scholar 

  31. He, D., Zeadally, S.: An analysis of RFID authentication schemes for internet of things in healthcare environment using elliptic curve cryptography. IEEE Internet Things J.2(1), 72–83 (2015)

    Google Scholar 

  32. Aziz, A., Singh, K.: Lightweight security scheme for Internet of Things. Wirel. Pers. Commun.104(2), 577–593 (2018).https://doi.org/10.1007/s11277-018-6035-4

  33. Author, F.: Article title. Journal2(5), 99–110 (2016)

    Google Scholar 

  34. Author, F., Author, S.: Title of a proceedings paper. In: Editor, F., Editor, S. (eds.) CONFERENCE 2016, LNCS, vol. 9999, pp. 1–13. Springer, Heidelberg (2016).https://doi.org/10.10007/1234567890

  35. Author, F., Author, S., Author, T.: Book title, 2nd edn. Publisher, Location (1999)

    Google Scholar 

  36. Author, A.-B.: Contribution title. In: 9th International Proceedings on Proceedings, pp. 1–2. Publisher, Location (2010)

    Google Scholar 

  37. LNCS Homepage.http://www.springer.com/lncs. Accessed 4 Oct 2017

Download references

Author information

Authors and Affiliations

  1. RMIT University, Melbourne, VIC, 3000, Australia

    Ziaur Rahman, Xun Yi & Ibrahim Khalil

  2. DSI Ltd., Dhaka, 1206, Bangladesh

    Mousumi Sumi

Authors
  1. Ziaur Rahman

    You can also search for this author inPubMed Google Scholar

  2. Xun Yi

    You can also search for this author inPubMed Google Scholar

  3. Ibrahim Khalil

    You can also search for this author inPubMed Google Scholar

  4. Mousumi Sumi

    You can also search for this author inPubMed Google Scholar

Corresponding author

Correspondence toZiaur Rahman.

Editor information

Editors and Affiliations

  1. Monash University, Clayton, VIC, Australia

    Xingliang Yuan

  2. School of Computer Science, University of Sydney, Camperdown, NSW, Australia

    Wei Bao

  3. RMIT University, Melbourne, VIC, Australia

    Xun Yi

  4. University of Sydney, Camperdown, NSW, Australia

    Nguyen Hoang Tran

Rights and permissions

Copyright information

© 2021 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Rahman, Z., Yi, X., Khalil, I., Sumi, M. (2021). Chaos and Logistic Map Based Key Generation Technique for AES-Driven IoT Security. In: Yuan, X., Bao, W., Yi, X., Tran, N.H. (eds) Quality, Reliability, Security and Robustness in Heterogeneous Systems. QShine 2021. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 402. Springer, Cham. https://doi.org/10.1007/978-3-030-91424-0_11

Download citation

Publish with us

Access this chapter

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
JPY 3498
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
JPY 9723
Price includes VAT (Japan)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
JPY 12154
Price includes VAT (Japan)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide -see info

Tax calculation will be finalised at checkout

Purchases are for personal use only


[8]ページ先頭

©2009-2025 Movatter.jp