Implementation of Lightweight Crypto Processor Using Logistic Map for Wireless Sensor Network

Use of a suitable cryptographic algorithm for wireless sensor networks is important due to the limitations of energy, computation capability and storage resources of the sensor nodes. Among two basic types of cryptographic techniques, namely asymmetric and symmetric key cryptography, symmetric cryptography technique is considered to be efficient over other in terms of computation cost. In symmetric key encryption, the secret key is known prior to encryption and decryption process. Therefore, in a wireless sensor network where keys are pre-distributed with Key Pre-distribution Schemes (KPS), can be used by both sides, i.e. sender and receiver nodes. In this paper, we will discuss symmetric key encryption techniques that can be efficiently used in wireless sensor network and explain the design possibilities and computation cost of using symmetric key cryptographic method. We have discussed the design of a crypto processor using a well-known chaotic map called Logistic map. Also, we have performed some experiments on the crypto processor and the results were stated.

[1]  Trang Hoang,et al.  An Efficient FPGA Implementation of the Advanced Encryption Standard Algorithm , 2012, 2012 IEEE RIVF International Conference on Computing & Communication Technologies, Research, Innovation, and Vision for the Future.

[2]  Geoff Boeing,et al.  Visual Analysis of Nonlinear Dynamical Systems: Chaos, Fractals, Self-Similarity and the Limits of Prediction , 2016, Syst..

[3]  Robert M. May,et al.  Simple mathematical models with very complicated dynamics , 1976, Nature.

[4]  Choong Seon Hong,et al.  Security in wireless sensor networks: issues and challenges , 2006, 2006 8th International Conference Advanced Communication Technology.

[5]  Shigeo Sato,et al.  Integrated Circuits of Map Chaos Generators , 1999 .

[6]  Zulfikar Zulfikar Novel Area Optimization in FPGA Implementation Using Efficient VHDL Code , 2012 .

[7]  Pawel Dabal,et al.  A chaos-based pseudo-random bit generator implemented in FPGA device , 2011, 14th IEEE International Symposium on Design and Diagnostics of Electronic Circuits and Systems.

[8]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[9]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[10]  Weisong Shi,et al.  Wireless Sensor Network Security: A Survey , 2006 .

[11]  Z Zulfikar FPGA Implementation of Uniform Random Number based on Residue Method , 2014 .

[12]  Vipul Gupta,et al.  Energy analysis of public-key cryptography for wireless sensor networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications.

[13]  S. K. Park,et al.  Random number generators: good ones are hard to find , 1988, CACM.

[14]  Manuel Blum,et al.  A Simple Unpredictable Pseudo-Random Number Generator , 1986, SIAM J. Comput..

[15]  Gene Tsudik,et al.  Security and privacy in emerging wireless networks [Invited Paper] , 2010, IEEE Wireless Communications.

[16]  Helmut Knebl,et al.  Symmetric-Key Encryption , 2007 .