DocumentCode :
1757071
Title :
An Encryption Scheme Using Chaotic Map and Genetic Operations for Wireless Sensor Networks
Author :
BISWAS, KAMANASHIS ; Muthukkumarasamy, Vallipuram ; Singh, Kalvinder
Author_Institution :
Sch. of Inf. & Commun. Technol., Griffith Univ., Gold Coast, QLD, Australia
Volume :
15
Issue :
5
fYear :
2015
fDate :
42125
Firstpage :
2801
Lastpage :
2809
Abstract :
Over the past decade, the application domain of wireless sensor networks has expanded steadily, ranging from environmental management to industry control, and from structural health monitoring to strategic surveillance. With the proliferation of sensor networks at home, work place, and beyond, securing data in the network has become a challenge. A number of security mechanisms have been proposed for sensor networks to provide data confidentiality: 1) advanced encryption system; 2) KATAN; 3) LED; and 4) TWINE. However, these schemes have drawbacks, including security vulnerabilities, need for hardware-based implementation, and higher computational complexity. To address these limitations, we propose a lightweight block cipher based on chaotic map and genetic operations. The proposed cryptographic scheme employs elliptic curve points to verify the communicating nodes and as one of the chaotic map parameters to generate the pseudorandom bit sequence. This sequence is used in XOR, mutation, and crossover operations in order to encrypt the data blocks. The experimental results based on Mica2 sensor mote show that the proposed encryption scheme is nine times faster than the LED protocol and two times faster than the TWINE protocol. We have also performed a number of statistical tests and cryptanalytic attacks to evaluate the security strength of the algorithm and found the cipher provably secure.
Keywords :
chaotic communication; computational complexity; cryptographic protocols; public key cryptography; random sequences; security of data; statistical analysis; telecommunication security; wireless sensor networks; KATAN; LED protocol; Mica2 sensor mote; TWINE protocol; XOR; chaotic map parameters; computational complexity; cryptanalytic attacks; cryptographic scheme; data blocks; elliptic curve points; encryption scheme; encryption system; environmental management; genetic operations; industry control; lightweight block cipher; pseudorandom bit sequence; security mechanisms; security strength; statistical tests; strategic surveillance; structural health monitoring; wireless sensor networks; Ciphers; Elliptic curves; Encryption; Sensors; Wireless sensor networks; Chaotic map; Crossover; Data Encryption; Elliptic curve; Mutation; Pseudorandom bit sequence generator; Wireless Sensor Network; Wireless sensor network; chaotic map; crossover; data encryption; elliptic curve; mutation; pseudorandom bit sequence generator;
fLanguage :
English
Journal_Title :
Sensors Journal, IEEE
Publisher :
ieee
ISSN :
1530-437X
Type :
jour
DOI :
10.1109/JSEN.2014.2380816
Filename :
6985604
Link To Document :
بازگشت