• myGriffith
    • Staff portal
    • Contact Us⌄
      • Future student enquiries 1800 677 728
      • Current student enquiries 1800 154 055
      • International enquiries +61 7 3735 6425
      • General enquiries 07 3735 7111
      • Online enquiries
      • Staff phonebook
    View Item 
    •   Home
    • Griffith Research Online
    • Journal articles
    • View Item
    • Home
    • Griffith Research Online
    • Journal articles
    • View Item
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Browse

  • All of Griffith Research Online
    • Communities & Collections
    • Authors
    • By Issue Date
    • Titles
  • This Collection
    • Authors
    • By Issue Date
    • Titles
  • Statistics

  • Most Popular Items
  • Statistics by Country
  • Most Popular Authors
  • Support

  • Contact us
  • FAQs
  • Admin login

  • Login
  • An Encryption Scheme Using Chaotic Map and Genetic Operations for Wireless Sensor Networks

    Author(s)
    Biswas, Kamanashis
    Muthukkumarasamy, Vallipuram
    Singh, Kalvinder
    Griffith University Author(s)
    Muthukkumarasamy, Vallipuram
    Year published
    2015
    Metadata
    Show full item record
    Abstract
    Over the past decade, the application domain of wireless sensor networks has expanded steadily, ranging from environmental management to industry control, from structural health monitoring to strategic surveillance. With the proliferation of sensor networks at home, work place, and beyond, securing data in the network has become a challenge. A number of security mechanisms have been proposed for sensor networks to provide data confidentiality: AES, KATAN, LED, and TWINE. However, these schemes have drawbacks, including security vulnerabilities, need for hardware based implementation, and higher computational complexity. To ...
    View more >
    Over the past decade, the application domain of wireless sensor networks has expanded steadily, ranging from environmental management to industry control, from structural health monitoring to strategic surveillance. With the proliferation of sensor networks at home, work place, and beyond, securing data in the network has become a challenge. A number of security mechanisms have been proposed for sensor networks to provide data confidentiality: AES, KATAN, LED, and TWINE. However, these schemes have drawbacks, including security vulnerabilities, need for hardware based implementation, and higher computational complexity. To address these limitations, we propose a lightweight block cipher based on chaotic map and genetic operations. The proposed cryptographic scheme employs elliptic curve points to verify the communicating nodes and as one of the chaotic map parameters to generate the pseudorandom bit sequence. This sequence is used in XOR, mutation and crossover operations in order to encrypt the data blocks. The experimental results based on Mica2 sensor mote show that the proposed encryption scheme is nine times faster than the LED protocol and two times faster than the TWINE protocol. We have also performed a number of statistical tests and cryptanalytic attacks to evaluate the security strength of the algorithm and found the cipher provably secure.
    View less >
    Journal Title
    IEEE Sensors Journal
    DOI
    https://doi.org/10.1109/JSEN.2014.2380816
    Subject
    Atomic, molecular and optical physics
    Mechanical engineering
    Network engineering
    Publication URI
    http://hdl.handle.net/10072/67245
    Collection
    • Journal articles

    Footer

    Disclaimer

    • Privacy policy
    • Copyright matters
    • CRICOS Provider - 00233E
    • TEQSA: PRV12076

    Tagline

    • Gold Coast
    • Logan
    • Brisbane - Queensland, Australia
    First Peoples of Australia
    • Aboriginal
    • Torres Strait Islander