Pseudo random data stream generation for data/images protection in ubiquitous computing environment

A data stream generated from hysteresis-based multi-scroll chaos is proposed in this paper. The mathematical model of the multi-scroll chaotic attractor is a continuous-time linear third-order system with a feedback of hysteresis-series. The pseudo random data stream is generated from the state values of the third-order systems at the instance of hysteresis switching. Thanks to the complicated dynamical behavior of the multi-scroll chaotic attractor, the resulted data stream demonstrates highly unpredictability which is ideal for security use. Due to the simplicity of system model, the data stream can be generated in resource limited environment, such as mobile computing environment and wireless sensors. The data stream generation has been implemented in mobile phones with J2ME. It has the potential to be used as one time pad key in protecting information in ubiquitous computing environment. The resulting cipher can achieve high security strength with low cost.

[1]  Xinghuo Yu,et al.  Generating 3-D multi-scroll chaotic attractors: A hysteresis series switching method , 2004, Autom..

[2]  Yang Xiao,et al.  Mobile Telemedicine: A Computing and Networking Perspective , 2008 .

[3]  Ali Grami,et al.  Future Trends in Mobile Commerce: Service Offerings, Technological Advances and Security Challenges , 2004, PST.

[4]  Klas Roggenkamp,et al.  Development modules to unleash the potential of Mobile Government , 2004 .

[5]  R. Istepanian,et al.  M-Health: Emerging Mobile Health Systems , 2006 .

[6]  H. Morikawa,et al.  Ubiquitous Structural Monitoring using Wireless Sensor Networks , 2006, 2006 International Symposium on Intelligent Signal Processing and Communications.

[7]  Wan-Young Chung,et al.  Query Based Duplex Vital Signal Monitoring System using Wireless Sensor Network for Ubiquitous Healthcare , 2007 .

[8]  Hyo-nam Lee,et al.  UMONS: Ubiquitous monitoring system in smart space , 2009, IEEE Transactions on Consumer Electronics.

[9]  Jamal Daafouz,et al.  A connection between chaotic and conventional cryptography , 2008, IEEE Transactions on Circuits and Systems I: Regular Papers.

[10]  Muttukrishnan Rajarajan,et al.  Device Data Protection in Mobile Healthcare Applications , 2008, eHealth.

[11]  A. Vinayagamoorthy,et al.  Mobile Banking –An Overview , 2012 .

[12]  Robert H. Deng,et al.  A novel privacy preserving authentication and access control scheme for pervasive computing environments , 2006, IEEE Transactions on Vehicular Technology.

[13]  Christopher Leckie,et al.  An Efficient Clustering Scheme to Exploit Hierarchical Data in Network Traffic Analysis , 2008, IEEE Transactions on Knowledge and Data Engineering.

[14]  W.D. Yu,et al.  A web-based wireless mobile system design of security and privacy framework for u-Healthcare , 2008, HealthCom 2008 - 10th International Conference on e-health Networking, Applications and Services.

[15]  Johan A. K. Suykens,et al.  True random bit generation from a double-scroll attractor , 2004, IEEE Transactions on Circuits and Systems I: Regular Papers.

[16]  Stephen T C Wong Research Paper: A Cryptologic Based Trust Center for Medical Images , 1996, J. Am. Medical Informatics Assoc..

[17]  Taesoo Lee,et al.  An Implementation of Wireless Medical Image Transmission System on Mobile Devices , 2008, Journal of Medical Systems.

[18]  Hiroyuki Morikawa,et al.  Actual Application of Ubiquitous Structural Monitoring System using Wireless Sensor Networks , 2008 .

[19]  Xinghuo Yu,et al.  On Multiscroll Chaotic Attractors in Hysteresis-Based Piecewise-Linear Systems , 2007, IEEE Transactions on Circuits and Systems II: Express Briefs.

[20]  Cornelius Herstatt,et al.  Customer on the Move: Strategic Implications of Mobile Banking for Banks and Financial Enterprises , 2006, The 8th IEEE International Conference on E-Commerce Technology and The 3rd IEEE International Conference on Enterprise Computing, E-Commerce, and E-Services (CEC/EEE'06).