Implementing a Symmetric Lightweight Cryptosystem in Highly Constrained IoT Devices by Using a Chaotic S-Box

被引:49
作者
Alshammari, Badr M. [1 ]
Guesmi, Ramzi [2 ,3 ]
Guesmi, Tawfik [1 ]
Alsaif, Haitham [1 ]
Alzamil, Ahmed [1 ]
机构
[1] Univ Hail, Coll Engn, Hail 81481, Saudi Arabia
[2] Univ Jendouba, ISLAI Beja, Beja 9000, Tunisia
[3] Sfax Univ, Natl Engn Sch Sfax, Lab Elect & Informat Technol, Sfax 3038, Tunisia
来源
SYMMETRY-BASEL | 2021年 / 13卷 / 01期
关键词
Internet of Things; lightweight cryptography; chaos; Boolean function; S-box; Hilbert curve; AES; wireless sensor;
D O I
10.3390/sym13010129
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
In the Internet of Things (IoT), a lot of constrained devices are interconnected. The data collected from those devices can be the target of cyberattacks. In this paper, a lightweight cryptosystem that can be efficiently implemented in highly constrained IOT devices is proposed. The algorithm is mainly based on Advanced Encryption Standard (AES) and a new chaotic S-box. Since its adoption by the IEEE 802.15.4 protocol, AES in embedded platforms have been increasingly used. The main cryptographic properties of the generated S-box have been validated. The randomness of the generated S-box has been confirmed by the NIST tests. Experimental results and security analysis demonstrated that the cryptosystem can, on the one hand, reach good encryption results and respects the limitation of the sensor's resources, on the other hand. So the proposed solution could be reliably applied in image encryption and secure communication between networked smart objects.
引用
收藏
页码:1 / 20
页数:20
相关论文
共 70 条
  • [1] Abomhara M., 2015, J CYBER SECUR MOBIL, V4, P65
  • [2] Design of a strong S-box based on a matrix approach
    Aboytes-Gonzalez, J. A.
    Murguia, J. S.
    Mejia-Carlos, M.
    Gonzalez-Aguilar, H.
    Ramirez-Torres, M. T.
    [J]. NONLINEAR DYNAMICS, 2018, 94 (03) : 2003 - 2012
  • [3] [Anonymous], 1890, Math. Ann.
  • [4] [Anonymous], 2011, How the next evolution of the internet is changing everything
  • [5] Efficient and simple method for designing chaotic S-boxes
    Asim, Muhammad
    Jeoti, Varun
    [J]. ETRI JOURNAL, 2008, 30 (01) : 170 - 172
  • [6] Banafa A., 2017, IEEE INTERNET THINGS
  • [7] Midori: A Block Cipher for Low Energy
    Banik, Subhadeep
    Bogdanov, Andrey
    Isobe, Takanori
    Shibutani, Kyoji
    Hiwatari, Harunaga
    Akishita, Toru
    Regazzoni, Francesco
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2015, PT II, 2015, 9453 : 411 - 436
  • [8] Bassham III L. E., 2010, A statistical test suite for random and pseudorandom number generators for cryptographic applicationsvol, DOI [10.6028/NIST.SP.800-22r1a, DOI 10.6028/NIST.SP.800-22R1A]
  • [9] An image encryption scheme based on a new hybrid chaotic map and optimized substitution box
    Ben Farah, M. A.
    Farah, A.
    Farah, T.
    [J]. NONLINEAR DYNAMICS, 2020, 99 (04) : 3041 - 3064
  • [10] Blondeau C, 2014, LECT NOTES COMPUT SC, V8441, P165, DOI 10.1007/978-3-642-55220-5_10