Chaos and Logistic Map based Key Generation Technique for AES-driven IoT Security
Several efforts have been seen claiming the lightweight block ciphers as a
necessarily suitable substitute in securing the Internet of Things. Currently,
it has been able to envisage as a pervasive frame of reference almost all
across the privacy preserving of smart and sensor-oriented appliances.
Different approaches are likely to be inefficient, bringing desired degree of
security considering the easiness and surely the process of simplicity but
security. Strengthening the well-known symmetric key and block dependent
algorithm using either chaos motivated logistic map or elliptic curve has shown
a far-reaching potential to be a discretion in secure real-time communication.
The popular feature of logistic maps, such as the un-foreseeability and
randomness often expected to be used in dynamic key-propagation in sync with
chaos and scheduling technique towards data integrity. As a bit alternation in
keys, able to come up with oversize deviation, also would have consequence to
leverage data confidentiality. Henceforth it may have proximity to time
consumption, which may lead to a challenge to make sure instant data exchange
between participating node entities. In consideration of delay latency required
to both secure encryption and decryption, the proposed approach suggests a
modification on the key-origination matrix along with S-box. It has plausibly
been taken us to this point that the time required proportionate to the
plain-text sent while the plain-text disproportionate to the probability
happening a letter on the message made. In line with that the effort so far
sought how apparent chaos escalates the desired key-initiation before message
transmission.
Authors
Ziaur Rahman, Xun Yi, Ibrahim Khalil, Mousumi Sumi