About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Quality, Reliability, Security and Robustness in Heterogeneous Systems. 17th EAI International Conference, QShine 2021, Virtual Event, November 29–30, 2021, Proceedings

Research Article

Chaos and Logistic Map Based Key Generation Technique for AES-Driven IoT Security

Download(Requires a free EAI acccount)
4 downloads
Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-030-91424-0_11,
        author={Ziaur Rahman and Xun Yi and Ibrahim Khalil and Mousumi Sumi},
        title={Chaos and Logistic Map Based Key Generation Technique for AES-Driven IoT Security},
        proceedings={Quality, Reliability, Security and Robustness in Heterogeneous Systems. 17th EAI International Conference, QShine 2021, Virtual Event, November 29--30, 2021, Proceedings},
        proceedings_a={QSHINE},
        year={2021},
        month={11},
        keywords={Internet of Things AES modification Key generation matrix Logistic map},
        doi={10.1007/978-3-030-91424-0_11}
    }
    
  • Ziaur Rahman
    Xun Yi
    Ibrahim Khalil
    Mousumi Sumi
    Year: 2021
    Chaos and Logistic Map Based Key Generation Technique for AES-Driven IoT Security
    QSHINE
    Springer
    DOI: 10.1007/978-3-030-91424-0_11
Ziaur Rahman1,*, Xun Yi1, Ibrahim Khalil1, Mousumi Sumi2
  • 1: RMIT University, Melbourne
  • 2: DSI Ltd.
*Contact email: rahman.ziaur@rmit.edu.au

Abstract

Several efforts has been seen claiming the lightweight block ciphers as a necessarily suitable substitute in securing the Internet of Things. Currently, it has been able to envisage as a pervasive frame of reference almost all across the privacy preserving of smart and sensor oriented appliances. Different approaches are likely to be inefficient, bringing desired degree of security considering the easiness and surely the process of simplicity but security. Strengthening the well-known symmetric key and block dependent algorithm using either chaos motivated logistic map or elliptic curve has shown a far reaching potentials to be a discretion in secure real-time communication. The popular feature of logistic maps, such as the un-foreseeability and randomness often expected to be used in dynamic key-propagation in sync with chaos and scheduling technique towards data integrity. As a bit alternation in keys, able to come up with oversize deviation, also would have consequence to leverage data confidentiality. Henceforth it may have proximity to time consumption, which may lead to a challenge to make sure instant data exchange between participating node entities. In consideration of delay latency required to both secure encryption and decryption, the proposed approach suggests a modification on the key-origination matrix along with S-box. It has plausibly been taken us to this point that the time required proportionate to the plain-text sent while the plain-text disproportionate to the probability happening a letter on the message made. In line with that the effort so far sought how apparent chaos escalates the desired key-initiation before message transmission.

Keywords
Internet of Things AES modification Key generation matrix Logistic map
Published
2021-11-17
Appears in
SpringerLink
http://dx.doi.org/10.1007/978-3-030-91424-0_11
Copyright © 2021–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL