Implementing a Symmetric Lightweight Cryptosystem in Highly Constrained IoT Devices by Using a Chaotic S-Box

被引:56
作者
Alshammari, Badr M. [1 ]
Guesmi, Ramzi [2 ,3 ]
Guesmi, Tawfik [1 ]
Alsaif, Haitham [1 ]
Alzamil, Ahmed [1 ]
机构
[1] Univ Hail, Coll Engn, Hail 81481, Saudi Arabia
[2] Univ Jendouba, ISLAI Beja, Beja 9000, Tunisia
[3] Sfax Univ, Natl Engn Sch Sfax, Lab Elect & Informat Technol, Sfax 3038, Tunisia
来源
SYMMETRY-BASEL | 2021年 / 13卷 / 01期
关键词
Internet of Things; lightweight cryptography; chaos; Boolean function; S-box; Hilbert curve; AES; wireless sensor;
D O I
10.3390/sym13010129
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
In the Internet of Things (IoT), a lot of constrained devices are interconnected. The data collected from those devices can be the target of cyberattacks. In this paper, a lightweight cryptosystem that can be efficiently implemented in highly constrained IOT devices is proposed. The algorithm is mainly based on Advanced Encryption Standard (AES) and a new chaotic S-box. Since its adoption by the IEEE 802.15.4 protocol, AES in embedded platforms have been increasingly used. The main cryptographic properties of the generated S-box have been validated. The randomness of the generated S-box has been confirmed by the NIST tests. Experimental results and security analysis demonstrated that the cryptosystem can, on the one hand, reach good encryption results and respects the limitation of the sensor's resources, on the other hand. So the proposed solution could be reliably applied in image encryption and secure communication between networked smart objects.
引用
收藏
页码:1 / 20
页数:20
相关论文
共 70 条
[1]  
Abomhara M., 2015, Journal of Cyber Security and Mobility, P65
[2]   Design of a strong S-box based on a matrix approach [J].
Aboytes-Gonzalez, J. A. ;
Murguia, J. S. ;
Mejia-Carlos, M. ;
Gonzalez-Aguilar, H. ;
Ramirez-Torres, M. T. .
NONLINEAR DYNAMICS, 2018, 94 (03) :2003-2012
[3]   Efficient and simple method for designing chaotic S-boxes [J].
Asim, Muhammad ;
Jeoti, Varun .
ETRI JOURNAL, 2008, 30 (01) :170-172
[4]  
Banafa A., 2017, IEEE INTERNET THINGS
[5]   Midori: A Block Cipher for Low Energy [J].
Banik, Subhadeep ;
Bogdanov, Andrey ;
Isobe, Takanori ;
Shibutani, Kyoji ;
Hiwatari, Harunaga ;
Akishita, Toru ;
Regazzoni, Francesco .
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2015, PT II, 2015, 9453 :411-436
[6]   An image encryption scheme based on a new hybrid chaotic map and optimized substitution box [J].
Ben Farah, M. A. ;
Farah, A. ;
Farah, T. .
NONLINEAR DYNAMICS, 2020, 99 (04) :3041-3064
[7]  
Blondeau C, 2014, LECT NOTES COMPUT SC, V8441, P165, DOI 10.1007/978-3-642-55220-5_10
[8]  
Bogdanov A, 2007, LECT NOTES COMPUT SC, V4727, P450
[9]  
Borghoff J, 2012, LECT NOTES COMPUT SC, V7658, P208, DOI 10.1007/978-3-642-34961-4_14
[10]   A novel approach for strong S-Box generation algorithm design based on chaotic scaled Zhongtang system [J].
Cavusoglu, Unal ;
Zengin, Ahmet ;
Pehlivan, Ihsan ;
Kacar, Sezgin .
NONLINEAR DYNAMICS, 2017, 87 (02) :1081-1094