Secure Chaotic Map Based Block Cryptosystem with Application to Camera Sensor Networks

Recently, Wang et al. presented an efficient logistic map based block encryption system. The encryption system employs feedback ciphertext to achieve plaintext dependence of sub-keys. Unfortunately, we discovered that their scheme is unable to withstand key stream attack. To improve its security, this paper proposes a novel chaotic map based block cryptosystem. At the same time, a secure architecture for camera sensor network is constructed. The network comprises a set of inexpensive camera sensors to capture the images, a sink node equipped with sufficient computation and storage capabilities and a data processing server. The transmission security between the sink node and the server is gained by utilizing the improved cipher. Both theoretical analysis and simulation results indicate that the improved algorithm can overcome the flaws and maintain all the merits of the original cryptosystem. In addition, computational costs and efficiency of the proposed scheme are encouraging for the practical implementation in the real environment as well as camera sensor network.

[1]  Muhammad Khurram Khan,et al.  Chaos and NDFT-based spread spectrum concealing of fingerprint-biometric data into audio signals , 2010, Digit. Signal Process..

[2]  Kwok-Wo Wong,et al.  A combined chaotic cryptographic and hashing scheme , 2003 .

[3]  Tao Xiang,et al.  Cryptanalysis of a chaos block cipher for wireless sensor network , 2011 .

[4]  Rhouma Rhouma,et al.  Cryptanalysis of a spatiotemporal chaotic image/video cryptosystem , 2008 .

[5]  Bruce Schneier,et al.  Applied cryptography : protocols, algorithms, and source codein C , 1996 .

[6]  Tamar Frankel [The theory and the practice...]. , 2001, Tijdschrift voor diergeneeskunde.

[7]  P. García,et al.  Communication through chaotic map systems , 2002 .

[8]  X. Liao,et al.  Cryptanalysis and improvement on a block cryptosystem based on iteration a chaotic map , 2007 .

[9]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[10]  Douglas R. Stinson,et al.  Cryptography: Theory and Practice , 1995 .

[11]  Bernard P. Zajac Applied cryptography: Protocols, algorithms, and source code in C , 1994 .

[12]  Gonzalo Alvarez,et al.  Cryptanalysis of two chaotic encryption schemes based on circular bit shift and XOR operations , 2006, nlin/0611017.

[13]  Rekha Jain,et al.  Wireless Sensor Network -A Survey , 2013 .

[14]  Muhammad Khurram Khan,et al.  Cryptanalysis and Security Improvements of ‘Two-Factor User Authentication in Wireless Sensor Networks’ , 2010, Sensors.

[15]  M. Baptista Cryptography with chaos , 1998 .

[16]  X. Liao,et al.  A novel block cryptosystem based on iterating a chaotic map , 2006 .

[17]  K. Wong,et al.  A Modified Chaotic Cryptographic Method , 2001, Communications and Multimedia Security.