Part of the book series:Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ((LNICST,volume 402))
Included in the following conference series:
Abstract
Several efforts has been seen claiming the lightweight block ciphers as a necessarily suitable substitute in securing the Internet of Things. Currently, it has been able to envisage as a pervasive frame of reference almost all across the privacy preserving of smart and sensor oriented appliances. Different approaches are likely to be inefficient, bringing desired degree of security considering the easiness and surely the process of simplicity but security. Strengthening the well-known symmetric key and block dependent algorithm using either chaos motivated logistic map or elliptic curve has shown a far reaching potentials to be a discretion in secure real-time communication. The popular feature of logistic maps, such as the un-foreseeability and randomness often expected to be used in dynamic key-propagation in sync with chaos and scheduling technique towards data integrity. As a bit alternation in keys, able to come up with oversize deviation, also would have consequence to leverage data confidentiality. Henceforth it may have proximity to time consumption, which may lead to a challenge to make sure instant data exchange between participating node entities. In consideration of delay latency required to both secure encryption and decryption, the proposed approach suggests a modification on the key-origination matrix along with S-box. It has plausibly been taken us to this point that the time required proportionate to the plain-text sent while the plain-text disproportionate to the probability happening a letter on the message made. In line with that the effort so far sought how apparent chaos escalates the desired key-initiation before message transmission.
Supported by RMIT RTS Program.
This is a preview of subscription content,log in via an institution to check access.
Access this chapter
Subscribe and save
- Get 10 units per month
- Download Article/Chapter or eBook
- 1 Unit = 1 Article or 1 Chapter
- Cancel anytime
Buy Now
- Chapter
- JPY 3498
- Price includes VAT (Japan)
- eBook
- JPY 9723
- Price includes VAT (Japan)
- Softcover Book
- JPY 12154
- Price includes VAT (Japan)
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Song, T., Li, R., Mei, B., Yu, J., Xing, X., Cheng, X.: A privacy preserving communication protocol for IoT applications in smart homes. IEEE Internet Things J.4(6), 1844–1852 (2017)
Moosavi, S.R., et al.: End-to-end security scheme for mobility enabled healthcare Internet of Things. Future Gener. Comput. Syst.64, 108–124 (2016)
Sehgal, A., Perelman, V., Kuryla, S., Schonwalder, J.: Management of resource constrained devices in the internet of things. IEEE Commun. Mag.50(12) (2012)
Mukhopadhyay, S.C., Suryadevara, N.K.: Internet of Things: challenges and opportunities. In: Mukhopadhyay, S.C. (ed.) Internet of Things. SSMI, vol. 9, pp. 1–17. Springer, Cham (2014).https://doi.org/10.1007/978-3-319-04223-7_1
Lee, I., Lee, K.: The Internet of Things (IoT): applications, investments, and challenges for enterprises. Bus. Horiz.58(4), 431–440 (2015)
Yang, J., He, S., Lin, Y., Lv, Z.: Multimedia cloud transmission and storage system based on internet of things. Multimed. Tools Appli.76(17), 17735–17750 (2015).https://doi.org/10.1007/s11042-015-2967-9
Farash, M.S., Turkanović, M., Kumari, S.: An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment. Ad Hoc Netw.36, 152–176 (2016)
Saied, Y.B., Olivereau, A., Zeghlache, D., Laurent, M.: Lightweight collaborative key establishment scheme for the Internet of Things. Comput. Netw.64, 273–295 (2014)
Jing, Q., Vasilakos, A.V., Wan, J., Lu, J., Qiu, D.: Security of the Internet of Things: perspectives and challenges. Wirel. Netw.20(8), 2481–2501 (2014).https://doi.org/10.1007/s11276-014-0761-7
Yao, X., Chen, Z., Tian, Y.: A lightweight attribute-based encryption scheme for the Internet of Things. Future Gener. Comput. Syst.49, 104–112 (2015)
Turkanović, M., Brumen, B., Hölbl, M.: A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion. Ad Hoc Netw.20, 96–112 (2014)
Sicari, S., Rizzardi, A., Grieco, L.A., Coen-Porisini, A.: Security, privacy and trust in Internet of Things: the road ahead. Comput. Netw.76, 146–164 (2015)
Ion, M., Zhang, J., Schooler, E.M.: Toward content-centric privacy in ICN: attribute-based encryption and routing. In Proceedings of the 3rd ACM SIGCOMM Workshop on Information-Centric Networking, pp. 39–40. ACM. (2013)
Doukas, C., Maglogiannis, I.: Bringing IoT and cloud computing towards pervasive healthcare. In: Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), pp. 922–926. IEEE (2012)
Beaulieu, R., Treatman-Clark, S., Shors, D., Weeks, B., Smith, J., Wingers, L.: The SIMON and SPECK lightweight block ciphers. In: Design Automation Conference (DAC), 2015 52nd ACM/EDAC/IEEE, pp. 1–6. IEEE (2015)
Rahulamathavan, Y., Phan, R.C.W., Rajarajan, M., Misra, S., Kondoz, A.: Privacy-preserving blockchain based IoT ecosystem using attribute-based encryption. In: 2017 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS), pp. 1–6. IEEE. December (2017)
Babar, S., Stango, A., Prasad, N., Sen, J., Prasad, R.: Proposed embedded security framework for internet of things (IoT). In: 2011 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE), pp. 1–5. IEEE. February 2011
Baptista, M.S.: Cryptography with chaos. Phys. Lett. A240(1–2), 50–54 (1998)
Rahaman, Z., Corraya, A.D., Sumi, M.A., Bahar, A.N.: A novel structure of advance encryption standard with 3-dimensional dynamic S-box and key generation matrix. Int. J. Adv. Comput. Sci. Appl.8(2), 314–320 (2017)
Kocarev, L.: Chaos-based cryptography: a brief overview. IEEE Circuits Syst. Mag.1(3), 6–21 (2001)
Guckenheimer, J., Holmes, P.: Nonlinear Oscillations, Dynamical Systems, and Bifurcations of Vector Fields. AMS, vol. 42. Springer, New York (1983).https://doi.org/10.1007/978-1-4612-1140-2
Schneier, B.: Applied cryptography-protocols, algorithms, and source code in C (1996)
Kotulski, Z., Szczepański, J., Górski, K., Paszkiewicz, A., Zugaj, A..: Application of discrete chaotic dynamical systems in cryptography–DCC method. Int. J. Bifurcation Chaos9(06), 1121–1135 (1999)
Alvarez, G., Montoya, F., Romera, M., Pastor, G.: Breaking parameter modulated chaotic secure communication system. Chaos Solitons Fractals21(4), 783–787 (2004)
Fridrich, J.: Symmetric ciphers based on two-dimensional chaotic maps. Int. J. Bifurcation Chaos8(06), 1259–1284 (1998)
Ziv, J., Lempel, A.: A universal algorithm for sequential data compression. IEEE Trans. Inf. Theory23(3), 337–343 (1977)
Lian, S., Sun, J., Wang, Z.: A block cipher based on a suitable use of the chaotic standard map. Chaos Solitons Fractals26(1), 117–129 (2005)
Kocarev, L., Jakimoski, G.: Logistic map as a block encryption algorithm. Phys. Lett. A289(4–5), 199–206 (2001)
Jakimoski, G., Kocarev, L.: Differential and linear probabilities of a block-encryption cipher. IEEE Trans. Circuits Syst. I Fundam. Theory Appl.50(1), 121–123 (2003)
Doukas, C., Maglogiannis, I.: Bringing IoT and cloud computing towards pervasive healthcare. In: 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), pp. 922–926. IEEE, July 2012
He, D., Zeadally, S.: An analysis of RFID authentication schemes for internet of things in healthcare environment using elliptic curve cryptography. IEEE Internet Things J.2(1), 72–83 (2015)
Aziz, A., Singh, K.: Lightweight security scheme for Internet of Things. Wirel. Pers. Commun.104(2), 577–593 (2018).https://doi.org/10.1007/s11277-018-6035-4
Author, F.: Article title. Journal2(5), 99–110 (2016)
Author, F., Author, S.: Title of a proceedings paper. In: Editor, F., Editor, S. (eds.) CONFERENCE 2016, LNCS, vol. 9999, pp. 1–13. Springer, Heidelberg (2016).https://doi.org/10.10007/1234567890
Author, F., Author, S., Author, T.: Book title, 2nd edn. Publisher, Location (1999)
Author, A.-B.: Contribution title. In: 9th International Proceedings on Proceedings, pp. 1–2. Publisher, Location (2010)
LNCS Homepage.http://www.springer.com/lncs. Accessed 4 Oct 2017
Author information
Authors and Affiliations
RMIT University, Melbourne, VIC, 3000, Australia
Ziaur Rahman, Xun Yi & Ibrahim Khalil
DSI Ltd., Dhaka, 1206, Bangladesh
Mousumi Sumi
- Ziaur Rahman
You can also search for this author inPubMed Google Scholar
- Xun Yi
You can also search for this author inPubMed Google Scholar
- Ibrahim Khalil
You can also search for this author inPubMed Google Scholar
- Mousumi Sumi
You can also search for this author inPubMed Google Scholar
Corresponding author
Correspondence toZiaur Rahman.
Editor information
Editors and Affiliations
Monash University, Clayton, VIC, Australia
Xingliang Yuan
School of Computer Science, University of Sydney, Camperdown, NSW, Australia
Wei Bao
RMIT University, Melbourne, VIC, Australia
Xun Yi
University of Sydney, Camperdown, NSW, Australia
Nguyen Hoang Tran
Rights and permissions
Copyright information
© 2021 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Rahman, Z., Yi, X., Khalil, I., Sumi, M. (2021). Chaos and Logistic Map Based Key Generation Technique for AES-Driven IoT Security. In: Yuan, X., Bao, W., Yi, X., Tran, N.H. (eds) Quality, Reliability, Security and Robustness in Heterogeneous Systems. QShine 2021. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 402. Springer, Cham. https://doi.org/10.1007/978-3-030-91424-0_11
Download citation
Published:
Publisher Name:Springer, Cham
Print ISBN:978-3-030-91423-3
Online ISBN:978-3-030-91424-0
eBook Packages:Computer ScienceComputer Science (R0)
Share this paper
Anyone you share the following link with will be able to read this content:
Sorry, a shareable link is not currently available for this article.
Provided by the Springer Nature SharedIt content-sharing initiative