A Chaos Based Secure Communication Scheme for Hybrid Message Logging and Asynchronous Checkpointing for Mobile Computing

Robustness of cellular networks in case of handling faults still remains a daunting task. Mobile computing technology has rapidly become can indispensable mode in various e-commerce transactions along with voice and video communication. With these facilities comes the threat of security and integrity of information which are equally important to be tackled as the seamless transfer of data from remote locations to other remote or fixed locations and has currently drawn significant attention in the research community. The traditional ways of cryptography have been exhaustively explored during the past few decades. This chapter seeks ways to explore the implementation of a complex dynamic system in cryptographic application for another dynamic system. Mobile communications deals with a dynamic system characterized with intermittent disconnections. In the light of these facts, this work introduces fault tolerance technique with secure checkpointing and message logging while handling of mobile disconnections.We propose a secure communication technique and an efficient key management methodology for mobile computing environment based on the chaotic sequences generated by an optical chaos system with high fluctuating chaotic orbits. To the best of our knowledge, very little work has been done based on chaos cryptography in mobile computing. We propose a) A hybrid message logging and asynchronous checkpointing scheme at receiver’s end with an improved performance where messages exchanged by Mobile Hosts (MH) are logged at the stable base station b) The proposed message logging is made secure by introducing cryptography devised from a two-way coupled chaotic laser system derived from Maxwell Bloch’s equations. The entire process serves a dual purpose. Firstly, chaos synchronization would form a secure channel through which physical transfer of the private keys would be completely eliminated. Thereby, reducing the computational overhead incurred during the complex way of exchanging keys in Diffie Hellman Key Exchange (DHKE) protocol. Secondly,the inherent randomness and deterministic properties of chaotic system renders the scheme immune to major attacks. The entire scheme has been labeled as Chaos Key Exchange (CKE) method which uses the chaotic sequences generated by a synchronized chaotic laser system as the private keys to be used in cryptographic purpose. As a consequence, CKE forms as an efficient key management system used during encrypting messages involving voluminous data such as multimedia and images. The proposed logging process as well as the communication of messages has been made secure by applying CKE method.CKE has been demonstrated by encoding an image which is transmitted over a secure channel.The ergodicity of the chaotic system adds the necessary confusion and diffusion properties required for efficient cryptography.Simulation result highlight the merit of the scheme which precisely recovers the messages at the receiver section thereby proving the robustness of the scheme which is efficiently extended to achieve secure logging of the messages.

[1]  Carroll,et al.  Synchronization in chaotic systems. , 1990, Physical review letters.

[2]  Jong Kim,et al.  Secure checkpointing , 2003, J. Syst. Archit..

[3]  M. Hasler,et al.  Communication by chaotic signals : the inverse system approach , 1996 .

[4]  A. P. Misra,et al.  Synchronization of spatiotemporal semiconductor lasers and its application in color image encryption , 2011, 1102.2775.

[5]  Hong Zhou,et al.  Problems with the chaotic inverse system encryption approach , 1997 .

[6]  Guanrong Chen,et al.  Generating Hyperchaos via State Feedback Control , 2005, Int. J. Bifurc. Chaos.

[7]  Robert E. Strom,et al.  Optimistic recovery in distributed systems , 1985, TOCS.

[8]  L. Kocarev Chaos-based cryptography: a brief overview , 2001 .

[9]  Xiaofeng Liao,et al.  A novel method for designing S-boxes based on chaotic maps , 2005 .

[10]  Jin-Hee Cho,et al.  Performance optimization of region-based group key management in mobile ad hoc networks , 2008, Perform. Evaluation.

[11]  Leslie Lamport,et al.  Distributed snapshots: determining global states of distributed systems , 1985, TOCS.

[12]  Santo Banerjee,et al.  Chaos Synchronization and Cryptography for Secure Communications: Applications for Encryption , 2010 .

[13]  Santo Banerjee,et al.  Synchronization between two different time-delayed systems and image encryption , 2007 .

[14]  N. Asokan,et al.  Anonymity in a Mobile Computing Environment , 1994, 1994 First Workshop on Mobile Computing Systems and Applications.

[15]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[16]  Heon Young Yeom,et al.  An Efficient Optimistic Message Logging Scheme for Recoverable Mobile Computing Systems , 2002, IEEE Trans. Mob. Comput..

[17]  Willy Zwaenepoel,et al.  The performance of consistent checkpointing , 1992, [1992] Proceedings 11th Symposium on Reliable Distributed Systems.

[18]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[19]  Bharat K. Bhargava,et al.  Vulnerabilities and Threats in Distributed Systems , 2004, ICDCIT.

[20]  Bharat K. Bhargava,et al.  Fraud Formalization and Detection , 2003, DaWaK.

[21]  Gonzalo Alvarez,et al.  Chaotic cryptosystems , 1999, Proceedings IEEE 33rd Annual 1999 International Carnahan Conference on Security Technology (Cat. No.99CH36303).

[22]  B. R. Badrinath,et al.  Checkpointing distributed applications on mobile computers , 1994, Proceedings of 3rd International Conference on Parallel and Distributed Information Systems.

[23]  Mukesh Singhal,et al.  On the impossibility of min-process non-blocking checkpointing and an efficient checkpointing algorithm for mobile computing systems , 1998, Proceedings. 1998 International Conference on Parallel Processing (Cat. No.98EX205).

[24]  P. Holmes,et al.  Nonlinear Oscillations, Dynamical Systems, and Bifurcations of Vector Fields , 1983, Applied Mathematical Sciences.

[25]  Leon O. Chua,et al.  Spread spectrum Communication through modulation of Chaos in Chua's Circuit , 1993, Chua's Circuit.

[26]  Iwao Sasase,et al.  A Secret Key Cryptosystem by Iterating a Chaotic Map , 1991, EUROCRYPT.

[27]  Peter Jorgensen,et al.  Applied cryptography: Protocols, algorithm, and source code in C: By Bruce Schneier. New York: John Wiley, 1993. 618 p. $44.95 (paper). ISBN 0-471-59756-2 , 1996 .

[28]  Leon O. Chua,et al.  Spread Spectrum Communication Through Modulation of Chaos , 1993 .

[29]  Bruce Schneier,et al.  Applied cryptography : protocols, algorithms, and source codein C , 1996 .

[30]  Mario Gerla,et al.  Vehicular networks and the future of the mobile internet , 2011, Comput. Networks.

[31]  Lorenzo Alvisi,et al.  Nonblocking and orphan-free message logging protocols , 1992, FTCS-23 The Twenty-Third International Symposium on Fault-Tolerant Computing.

[32]  Michael Peter Kennedy,et al.  Chaos shift keying : modulation and demodulation of a chaotic carrier using self-sychronizing chua"s circuits , 1993 .

[33]  Salman A. Khan,et al.  Design and analysis of a fault tolerant hybrid mobile scheme , 2007, Inf. Sci..

[34]  Wolfgang Kinzel,et al.  Public-channel cryptography using chaos synchronization. , 2005, Physical review. E, Statistical, nonlinear, and soft matter physics.

[35]  Santo Banerjee,et al.  Cooperating Swarms: A Paradigm for Collective Intelligence and its Application in Finance , 2010 .

[36]  Santo Banerjee,et al.  Chaos Synchronization with Genetic Engineering Algorithm for Secure Communications , 2011 .

[37]  Indrajit Ray,et al.  A Secure Checkpointing Protocol for Survivable Server Design , 2004, ICDCIT.

[38]  Paz Morillo,et al.  Cryptographic techniques for mobile ad-hoc networks , 2007, Comput. Networks.

[39]  Bharat K. Bhargava,et al.  Independent checkpointing and concurrent rollback for recovery in distributed systems-an optimistic approach , 1988, Proceedings [1988] Seventh Symposium on Reliable Distributed Systems.

[40]  A. Roy Chowdhury,et al.  Chaotic aspects of lasers with host-induced nonlinearity and its control , 2001 .