LoBa128, a Lorenz-based PRNG for wireless sensor networks

In this paper we focus on the development of a pseudo-random number generator (PRNG) to be used as a key generator for a symmetrical encryption system in a one-time-pad like environment, particularly useful for WSN. Our PRNG is based on the Lorenz chaotic system through a new approach of applicability of chaotic systems to cryptography, that we named 'modular-chaos'. We evaluate our proposal using both analytical and experimental techniques that lead us to an efficient and robust solution against statistical attacks and present strong random properties. Our approach solves the problem of short-cycle length of discrete chaotic systems.

[1]  John M. Carroll,et al.  Chaos in Cryptography: the Escape from the Strange Attractor , 1992, Cryptologia.

[2]  Robert A. J. Matthews,et al.  On the Derivation of a "Chaotic" Encryption Algorithm , 1989, Cryptologia.

[3]  Maxim Raya,et al.  The security of vehicular ad hoc networks , 2005, SASN '05.

[4]  Ta-lun Yang,et al.  Breaking chaotic switching using generalized synchronization: examples , 1998 .

[5]  Qurban A. Memon Synchronized chaos for network security , 2003, Comput. Commun..

[6]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[7]  Anastasios Bezerianos,et al.  Secure Communication with Chaotic Systems of Difference Equations , 1997, IEEE Trans. Computers.

[8]  Mohamed Eltoweissy,et al.  Dynamic key management in sensor networks , 2006, IEEE Communications Magazine.

[9]  Xuanqin Mou,et al.  Pseudo-random Bit Generator Based on Couple Chaotic Systems and Its Applications in Stream-Cipher Cryptography , 2001, INDOCRYPT.

[10]  Miguel Romera,et al.  Cryptanalyzing a discrete-time chaos synchronization secure communication system , 2003, nlin/0311046.

[11]  Pérez,et al.  Extracting messages masked by chaos. , 1995, Physical review letters.

[12]  Zbigniew Kotulski,et al.  Discrete chaotic cryptography , 1997 .

[13]  Carroll,et al.  Synchronization in chaotic systems. , 1990, Physical review letters.

[14]  David A. Wagner,et al.  Security in wireless sensor networks , 2004, SASN '04.

[15]  Mieczyslaw Jessa,et al.  Data encryption algorithms using one-dimensional chaotic maps , 2000, 2000 IEEE International Symposium on Circuits and Systems. Emerging Technologies for the 21st Century. Proceedings (IEEE Cat No.00CH36353).

[16]  S. Shankar Sastry,et al.  Distributed Environmental Monitoring Using Random Sensor Networks , 2003, IPSN.

[17]  Richard Beckwith,et al.  Report from the field: results from an agricultural wireless sensor network , 2004, 29th Annual IEEE International Conference on Local Computer Networks.

[18]  Sang Tao,et al.  Perturbance-based algorithm to expand cycle length of chaotic key stream , 1998 .

[19]  W. Schwarz,et al.  Chaos and cryptography , 2001 .

[20]  R.M.S. Silva,et al.  Applicability Drawbacks of Probabilistic Key Management Schemes for Real World Applications of Wireless Sensor Networks , 2007, 2007 Third International Conference on Wireless and Mobile Communications (ICWMC'07).

[21]  H. Feistel Cryptography and Computer Privacy , 1973 .

[22]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[23]  Gang Hu,et al.  Chaos-based secure communications in a large community. , 2002, Physical review. E, Statistical, nonlinear, and soft matter physics.

[24]  William M. Daley,et al.  Security Requirements for Cryptographic Modules , 1999 .

[25]  L. Kocarev,et al.  Pseudorandom bits generated by chaotic maps , 2003 .

[26]  Daniel D. Wheeler,et al.  Supercomputer Investigations of a Chaotic Encryption Algorithm , 1991, Cryptologia.

[27]  Simon Heron,et al.  Encryption: Advanced Encryption Standard (AES) , 2009 .