• DocumentCode
    1757071
  • Title

    An Encryption Scheme Using Chaotic Map and Genetic Operations for Wireless Sensor Networks

  • Author

    BISWAS, KAMANASHIS ; Muthukkumarasamy, Vallipuram ; Singh, Kalvinder

  • Author_Institution
    Sch. of Inf. & Commun. Technol., Griffith Univ., Gold Coast, QLD, Australia
  • Volume
    15
  • Issue
    5
  • fYear
    2015
  • fDate
    42125
  • Firstpage
    2801
  • Lastpage
    2809
  • Abstract
    Over the past decade, the application domain of wireless sensor networks has expanded steadily, ranging from environmental management to industry control, and from structural health monitoring to strategic surveillance. With the proliferation of sensor networks at home, work place, and beyond, securing data in the network has become a challenge. A number of security mechanisms have been proposed for sensor networks to provide data confidentiality: 1) advanced encryption system; 2) KATAN; 3) LED; and 4) TWINE. However, these schemes have drawbacks, including security vulnerabilities, need for hardware-based implementation, and higher computational complexity. To address these limitations, we propose a lightweight block cipher based on chaotic map and genetic operations. The proposed cryptographic scheme employs elliptic curve points to verify the communicating nodes and as one of the chaotic map parameters to generate the pseudorandom bit sequence. This sequence is used in XOR, mutation, and crossover operations in order to encrypt the data blocks. The experimental results based on Mica2 sensor mote show that the proposed encryption scheme is nine times faster than the LED protocol and two times faster than the TWINE protocol. We have also performed a number of statistical tests and cryptanalytic attacks to evaluate the security strength of the algorithm and found the cipher provably secure.
  • Keywords
    chaotic communication; computational complexity; cryptographic protocols; public key cryptography; random sequences; security of data; statistical analysis; telecommunication security; wireless sensor networks; KATAN; LED protocol; Mica2 sensor mote; TWINE protocol; XOR; chaotic map parameters; computational complexity; cryptanalytic attacks; cryptographic scheme; data blocks; elliptic curve points; encryption scheme; encryption system; environmental management; genetic operations; industry control; lightweight block cipher; pseudorandom bit sequence; security mechanisms; security strength; statistical tests; strategic surveillance; structural health monitoring; wireless sensor networks; Ciphers; Elliptic curves; Encryption; Sensors; Wireless sensor networks; Chaotic map; Crossover; Data Encryption; Elliptic curve; Mutation; Pseudorandom bit sequence generator; Wireless Sensor Network; Wireless sensor network; chaotic map; crossover; data encryption; elliptic curve; mutation; pseudorandom bit sequence generator;
  • fLanguage
    English
  • Journal_Title
    Sensors Journal, IEEE
  • Publisher
    ieee
  • ISSN
    1530-437X
  • Type

    jour

  • DOI
    10.1109/JSEN.2014.2380816
  • Filename
    6985604