Randomness improvement of chaotic maps for image encryption in a wireless communication scheme using PIC-microcontroller via Zigbee channels

被引:99
作者
Garcia-Guerrero, E. E. [1 ]
Inzunza-Gonzalez, E. [1 ]
Lopez-Bonilla, O. R. [1 ]
Cardenas-Valdez, J. R. [2 ]
Tlelo-Cuautle, E. [3 ]
机构
[1] UABC, Fac Engn Architecture & Design, Ensenada 22860, Baja California, Mexico
[2] Tijuana Inst Technol, Dept Elect & Elect Engn, ITT, Tijuana 22435, Baja California, Mexico
[3] INAOE, Dept Elect, Puebla 72840, Mexico
关键词
Image encryption; Chaotic map; M2M; Microcontroller; Embedded system; Wireless communication; RANDOM NUMBER GENERATOR; SYSTEM; SYNCHRONIZATION; IMPLEMENTATION; CRYPTANALYSIS; TINKERBELL; DESIGN;
D O I
10.1016/j.chaos.2020.109646
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
Recently, a lot of research has been done in chaotic cryptography field using different kinds of chaotic systems, like chaotic maps, which are being considered as one of the secure and efficient methods to protect confidential information. This article highlights that the main cryptography requirements demand that the new embedded cryptosystems have to be more efficient and secure, it means that they must be faster and offer greater security. For instance, the new cryptosystems require to be compatible with the new telecommunication protocols and, in addition, to be efficient in energy consumption. In this manner, this article introduces a process to improve the randomness of five chaotic maps that are implemented on a PIC-microcontroller. The improved chaotic maps are tested to encrypt digital images in a wireless communication scheme, particularly on a machine-to-machine (M2M) link, via ZigBee channels. We show that function mod 255 improves the randomness of the pseudo-random number generators (PRNG), which is verified performing NIST SP 800-22 statistical tests, histograms, phase-plane analysis, entropy, correlation of adjacent pixels, differential attacks, and using digital images of size 256 x 256 and 512 x 512 pixels. A comparative analysis is presented versus related works that also use chaotic encryption and classic algorithms, such as: AES, DES, 3DES and IDEA. The security analysis confirms that the proposed process to improve the randomness of chaotic maps, is appropriate to implement an encryption scheme that is secure and robust against several known attacks and other statistical tests. Finally, it was experimentally verified that this chaotic encryption scheme can be used in practical applications such as M2M and Internet of things (IoT). (C) 2020 Elsevier Ltd. All rights reserved.
引用
收藏
页数:12
相关论文
共 79 条
[1]   Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications [J].
Al-Fuqaha, Ala ;
Guizani, Mohsen ;
Mohammadi, Mehdi ;
Aledhari, Mohammed ;
Ayyash, Moussa .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (04) :2347-2376
[2]   Some basic cryptographic requirements for chaos-based cryptosystems [J].
Alvarez, Gonzalo ;
Li, Shujun .
INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 2006, 16 (08) :2129-2151
[3]   Suggested Integral Analysis for Chaos-Based Image Cryptosystems [J].
Angel Murillo-Escobar, Miguel ;
Omar Meranza-Castillon, Manuel ;
Martha Lopez-Gutierrez, Rosa ;
Cruz-Hernandez, Cesar .
ENTROPY, 2019, 21 (08)
[4]  
[Anonymous], 2008, IEEE Standard 754-2008 for Binary Floating-Point Arithmetic, DOI [10.1109/IEEESTD.2019.8859679, DOI 10.1109/IEEESTD.2008.4610935]
[5]  
[Anonymous], 1883, J. des Sciences Militaires
[6]  
Ashton K., 2009, RFID J, V22, P97
[7]  
Atteya AM, 2014, IEEE INT NEW CIRC, P217, DOI 10.1109/NEWCAS.2014.6934022
[8]   Synchronized hybrid chaotic generators: Application to real-time wireless speech encryption [J].
Azzaz, Mohamed Salah ;
Tanougast, Camel ;
Sadoudi, Said ;
Bouridane, Ahmed .
COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2013, 18 (08) :2035-2047
[9]   Introducing a chaotic map with a wide range of long-term memory as a model of patch-clamped ion channels current time series [J].
Bahramian, Alireza ;
Nouri, Ali ;
Baghdadi, Golnaz ;
Gharibzadeh, Shahriar ;
Towhidkhah, Farzad ;
Jafari, Sajad .
CHAOS SOLITONS & FRACTALS, 2019, 126 :361-368
[10]   A novel bit-level image encryption algorithm based on 2D-LICM hyperchaotic map [J].
Cao, Chun ;
Sun, Kehui ;
Liu, Wenhao .
SIGNAL PROCESSING, 2018, 143 :122-133