Fractional chaos based-cryptosystem for generating encryption keys in Ad Hoc networks

被引:35
作者
Montero-Canela, Rolando [1 ]
Zambrano-Serrano, Ernesto [2 ]
Tamariz-Flores, Edna I. [1 ]
Munoz-Pacheco, Jesus M. [2 ]
Torrealba-Melendez, Richard [2 ]
机构
[1] Autonomous Univ Puebla, Fac Comp Sci, Puebla, Pue, Mexico
[2] Autonomous Univ Puebla, Fac Elect Sci, Puebla, Pue, Mexico
关键词
Cryptosystem; Fractional-order chaotic system; Cipher; Ad Hoc network; IoT; Secure communications; Encryption; WIRELESS SENSOR NETWORKS; ROUTING PROTOCOL; SECURITY; SCHEME; PRIVACY; SYNCHRONIZATION; ALGORITHM; SYSTEM; AUTHENTICATION; ARCHITECTURES;
D O I
10.1016/j.adhoc.2019.102005
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Ad Hoc networks are considered essential elements of the Internet of Things (IoT), which is a technological trend for innovative future applications. Since in IoT systems the devices are mostly connected among them, the data exchange is a vital activity in the network. In this kind of networks, not only nonsensitive data exchange is performed, but also sensitive data (digital signatures, login credentials, account numbers, personal images, and so on) are shared. Therefore, new appropriate approaches to encrypt the secret information are highly required. This paper presents an experimental setup of a fractional-chaos based-cryptosystem for ad hoc networks under the IEEE 802.15.4 standard. The proposed cryptosystem is composed of a novel chaotic pairing approach between the coordinator node and end-devices nodes to sending data into the network. More specifically, the RF-data of the IEEE 802.15.4 frame is encrypted using a fractional-order encryption key and four iterative steps. It is worth to note that the chaotic key is based on a fractional-order chaotic system, which is derived from the fractional calculus theory. Fractional-order chaotic dynamics are demonstrated using the Lyapunov method and equilibria stability. Next, the experimental validation of the cryptosystem is shown sending an encrypted image between ARM digital platforms and wireless Xbee modules. Several security analyses indicate the proposed encryption scheme has suitable statistical properties, sizeable keyspace, and high sensitivity providing secure communications. (C) 2019 Elsevier B.V. All rights reserved.
引用
收藏
页数:21
相关论文
共 104 条
[61]   Designing S-boxes based on 3-D four-wing autonomous chaotic system [J].
Liu, Guangjie ;
Yang, Weiwei ;
Liu, Weiwei ;
Dai, Yuewei .
NONLINEAR DYNAMICS, 2015, 82 (04) :1867-1877
[62]   Cooperative Privacy Preservation for Wearable Devices in Hybrid Computing-Based Smart Health [J].
Liu, Hong ;
Yao, Xuanxia ;
Yang, Tao ;
Ning, Huansheng .
IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (02) :1352-1362
[63]  
Lowe Gavin, 1996, TOOLS ALGORITHMS CON
[64]  
LUO M, 2017, INT J COMMUN SYST, V30
[65]   A symmetrical image encryption scheme in wavelet and time domain [J].
Luo, Yuling ;
Du, Minghui ;
Liu, Junxiu .
COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2015, 20 (02) :447-460
[66]   On perspective of security and privacy-preserving solutions in the internet of things [J].
Malina, Lukas ;
Hajny, Jan ;
Fujdiak, Radek ;
Hosek, Jiri .
COMPUTER NETWORKS, 2016, 102 :83-95
[67]   Efficient DCT-based secret key generation for the Internet of Things [J].
Margelis, George ;
Fafoutis, Xenofon ;
Oikonomou, George ;
Piechocki, Robert ;
Tryfonas, Theo ;
Thomas, Paul .
AD HOC NETWORKS, 2019, 92
[68]  
Mathuria A. M., 1995, Australian Computer Science Communications, V17, P370
[69]   Apparatus: A framework for security analysis in internet of things systems [J].
Mavropoulos, Orestis ;
Mouratidis, Haralambos ;
Fish, Andrew ;
Panaousis, Emmanouil .
AD HOC NETWORKS, 2019, 92
[70]   HIP security architecture for the IP-based Internet of Things [J].
Meca, Francisco Vidal ;
Ziegeldorf, Jan Henrik ;
Sanchez, Pedro Moreno ;
Morchon, Oscar Garcia ;
Kumar, Sandeep S. ;
Keoh, Sye Loong .
2013 IEEE 27TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (WAINA), 2013, :1331-1336