A New Encryption Algorithm based on Chaotic Map for Wireless Sensor Network

A new and secure chaos-based block cipher for image encryption in wireless sensor networks is proposed. The security analysis and the performances of the proposed algorithm have been investigated. The statistical analysis includes the histograms and correlation coefficients of adjacent pixels. In the differential analysis, the authors use the Number of Pixels Change Rate (NPCR) and the Unified Changing Average (UACI) measures to demonstrate the security against differential attacks. Key sensitivity analysis and key space analysis show that the proposed cipher is secure and resistant to brute force attack. The authors demonstrate that the performance of the cipher exceeds the studied encryption algorithms as well as AES (Advanced Encryption Standard). An implementation on a real wireless sensor network testbed is realized, and the energy consumption is investigated.

[1]  Vinod Patidar,et al.  A robust and secure chaotic standard map based pseudorandom permutation-substitution scheme for image encryption , 2011 .

[2]  Saleh Mesbah,et al.  Efficiency and Security of Some Image Encryption Algorithms , 2008 .

[3]  Gonzalo Álvarez,et al.  Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems , 2003, Int. J. Bifurc. Chaos.

[4]  Mario Di Francesco,et al.  Energy conservation in wireless sensor networks: A survey , 2009, Ad Hoc Networks.

[5]  Shuai Chen,et al.  Chaos block cipher for wireless sensor network , 2008, Science in China Series F: Information Sciences.

[6]  Shujun Li,et al.  Analyses and New Designs of Digital Chaotic Ciphers , 2003 .

[7]  Tao Xiang,et al.  A novel symmetrical cryptosystem based on discretized two-dimensional chaotic map , 2007 .

[8]  Sang Tao,et al.  Perturbance-based algorithm to expand cycle length of chaotic key stream , 1998 .

[9]  Ronald L. Rivest,et al.  The RC5 Encryption Algorithm , 1994, FSE.

[10]  Ismail Mansour,et al.  Evaluation of a Fast Symmetric Cryptographic Algorithm Based on the Chaos Theory for Wireless Sensor Networks , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.

[11]  Mingyan Yu,et al.  A Robust High-Speed Chaos-Based Truly Random Number Generator for Embedded Cryptosystems , 2006, 2006 49th IEEE International Midwest Symposium on Circuits and Systems.

[12]  Vinod Patidar,et al.  Discrete chaotic cryptography using external key , 2003 .

[13]  D. A. Knapp,et al.  Gamma-ray identification of nuclear weapon materials , 1997 .

[14]  Carroll,et al.  Synchronization in chaotic systems. , 1990, Physical review letters.

[15]  Paul Feautrier,et al.  eSimu: a Fast and Accurate Energy Consumption Simulator for Real Embedded System , 2007, 2007 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks.

[16]  Weili Wu,et al.  A Robust on-Demand Path-Key Establishment Framework via Random Key Predistribution for Wireless Sensor Networks , 2006, EURASIP J. Wirel. Commun. Netw..

[17]  Berk Sunar,et al.  Energy Comparison of AES and SHA-1 for Ubiquitous Computing , 2006, EUC Workshops.

[18]  Mário Serafim Nunes,et al.  Enhanced Chaotic Stream Cipher for WSNs , 2010, 2010 International Conference on Availability, Reliability and Security.

[19]  Borko Furht,et al.  Short Paper: Enhanced 1-D Chaotic Key-Based Algorithm for Image Encryption , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).

[20]  Darko Kirovski,et al.  Multimedia Security Handbook , 2004 .

[21]  Ying Liu,et al.  A chaos-based secure cluster protocol for wireless sensor networks , 2008, Kybernetika.

[22]  Mário Serafim Nunes,et al.  LoBa128, a Lorenz-based PRNG for wireless sensor networks , 2009 .

[23]  Shiguo Lian,et al.  A block cipher based on chaotic neural networks , 2009, Neurocomputing.

[24]  Tao Xiang,et al.  Cryptanalysis of a chaos block cipher for wireless sensor network , 2011 .

[25]  Jiun-In Guo,et al.  A new chaotic key-based design for image encryption and decryption , 2000, 2000 IEEE International Symposium on Circuits and Systems. Emerging Technologies for the 21st Century. Proceedings (IEEE Cat No.00CH36353).

[26]  Safwan El Assad,et al.  An efficient and secure SPN cryptosystem based on chaotic control parameters , 2011, 2011 International Conference for Internet Technology and Secured Transactions.

[27]  K. Aihara,et al.  Cryptosystems with discretized chaotic maps , 2002 .

[28]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[29]  Abdennaceur Kachouri,et al.  A new design of dynamic S-Box based on two chaotic maps , 2010, ACS/IEEE International Conference on Computer Systems and Applications - AICCSA 2010.

[30]  L. Kocarev,et al.  Chaos and cryptography: block encryption ciphers based on chaotic maps , 2001 .

[31]  Gonzalo Alvarez,et al.  Chaotic cryptosystems , 1999, Proceedings IEEE 33rd Annual 1999 International Carnahan Conference on Security Technology (Cat. No.99CH36303).