Secure communication using a chaos based signal encryption scheme

2001 ◽  
Vol 47 (4) ◽  
pp. 709-714 ◽  
Author(s):  
K. Murali ◽  
Haiyang Yu ◽  
V. Varadan ◽  
H. Leung

Internet of Thing (IoT) enhances the heterogeneous communication facility by providing Thing-to-Thing, Human-to-Thing, and Human-to-Human communication schemes. Various kind of threats and vulnerability cause sensor equipped IoT environment at a larger scale. So security and privacy are two important factors that must rely on IoT communication model. IoT network has some capability constraints that affect the deployment of realistic IoT application at a wider level like healthcare system and smart grid, smart city. One of the security concerns of the IoT network is the need of light-weighted encryption scheme. Elliptic Curve Cryptography (ECC) simulation with integrated encryption scheme is the most prominent solution for IoT devices to develop lightweight encryption technology. Here, Optimized Elliptic Curve Digital signature scheme is proposed to achieve secure communication between IoT sensor nodes. The results of optimized ECDSA algorithm are analyzed on Cooja simulator that is a IoT network simulator


The object of this paper is to develop a new cryptographic scheme involving finite state machine and Mersenne's recurrence matrix. The proposed algorithm is more secure cryptographic algorithm that solves many problems which are facing now days. For secure communication the designed encryption scheme involving finite state machine and recurrence matrix maintained the secrecy of the message


2001 ◽  
Vol 11 (12) ◽  
pp. 3107-3115 ◽  
Author(s):  
S. PAPADIMITRIOU ◽  
T. BOUNTIS ◽  
S. MAVROUDI ◽  
A. BEZERIANOS

We present a new probabilistic symmetric key encryption scheme based on the chaotic dynamics of properly designed chaotic systems. This technique exploits the concept of virtual attractors, which are not real attractors of the underlying chaotic dynamics but are created and maintained artificially. Each virtual attractor represents a symbol of the alphabet used to encode messages. The state space is partitioned over the virtual attractors creating clusters of states. The enciphering process randomizes over the set of states mapped to a virtual attractor in order to construct the ciphertext for the transmited symbol. The receiver can reconstruct perfectly this virtual state space, given the possession of the same chaotic system of difference equations with parameters tuned perfectly to those of the transmitter. Therefore, from the ciphertext chunk corresponding to a state, the virtual attractor can be derived from the details of the virtual state space. The knowledge of the virtual attractor leads to the recovery of the transmitted symbol. We demonstrate that the new algorithm is secure, reliable and very fast. It uses discrete time chaotic recurrent systems and is simple, flexible and modular. These systems can be constructed easily dynamically from an alphanumeric encryption key. The cryptographic security of the algorithm is evaluated with combinatorial arguments.


Sign in / Sign up

Export Citation Format

Share Document