Javascript must be enabled to continue!
A lightweight efficient chaos‐based cryptosystem for constrained‐node networks
View through CrossRef
SummaryInterconnected sensor and actuator objects creating Constrained‐Node Networks (CNN) are among the most prominent technologies of the Internet of things. Deployed to monitor our lives, surroundings, and critical infrastructure, CNN communications must be strongly secured in order to prevent devastating unauthorized access to critical information. This, however, faces severe challenges imposed by CNN constraints in terms of energy, memory, and computational power. To address such conflicting requirements, this paper presents a chaos‐based efficient lightweight secure communication system for CNNs. The proposed cryptosystem performs optimized confusion‐diffusion operations at the byte level allowing it to be fully implemented on an 8‐bit microcontroller. Obtained results from extensive experiments at both statistical and implementation levels confirm the robustness of the proposed cryptosystem against a multitude of attacks. Additionally, the evaluated encryption/decryption speeds along with the low memory and energy consumption grant the proposed cryptosystem attractive lightweight aspects enabling its deployment in very constrained CNN applications having soft real‐time requirements.
Title: A lightweight efficient chaos‐based cryptosystem for constrained‐node networks
Description:
SummaryInterconnected sensor and actuator objects creating Constrained‐Node Networks (CNN) are among the most prominent technologies of the Internet of things.
Deployed to monitor our lives, surroundings, and critical infrastructure, CNN communications must be strongly secured in order to prevent devastating unauthorized access to critical information.
This, however, faces severe challenges imposed by CNN constraints in terms of energy, memory, and computational power.
To address such conflicting requirements, this paper presents a chaos‐based efficient lightweight secure communication system for CNNs.
The proposed cryptosystem performs optimized confusion‐diffusion operations at the byte level allowing it to be fully implemented on an 8‐bit microcontroller.
Obtained results from extensive experiments at both statistical and implementation levels confirm the robustness of the proposed cryptosystem against a multitude of attacks.
Additionally, the evaluated encryption/decryption speeds along with the low memory and energy consumption grant the proposed cryptosystem attractive lightweight aspects enabling its deployment in very constrained CNN applications having soft real‐time requirements.
Related Results
Composite Discrete Logarithm Problem and a Reconstituted ElGamal Cryptosystem Based on the Problem
Composite Discrete Logarithm Problem and a Reconstituted ElGamal Cryptosystem Based on the Problem
In this chapter, the authors have defined a new ElGamal cryptosystem by using the power Fibonacci sequence module m. Then they have defined a new sequence module m and the other El...
P152 CLINICAL PREDICTIVE MODEL OF LYMPH NODE METASTASIS AT RIGHT RECURRENT LARYNGEAL NERVE ZONE IN ESOPHAGEAL SQUAMOUS CELL CARCINOMA
P152 CLINICAL PREDICTIVE MODEL OF LYMPH NODE METASTASIS AT RIGHT RECURRENT LARYNGEAL NERVE ZONE IN ESOPHAGEAL SQUAMOUS CELL CARCINOMA
Abstract
Aim
The aim of this study is to establish a clinical predictive standard for lymph node metastasis at this location by ...
MENELUSURI TEORI CHAOS DALAM HUKUM MELALUI PARADIGMA CRITICAL THEORY
MENELUSURI TEORI CHAOS DALAM HUKUM MELALUI PARADIGMA CRITICAL THEORY
<p align="center"><strong>Abstract</strong></p><p><em>The paper will study a dialectic domain of chaos theory of Charles Sampford’s law by using...
Predictors of False-Negative Axillary FNA Among Breast Cancer Patients: A Cross-Sectional Study
Predictors of False-Negative Axillary FNA Among Breast Cancer Patients: A Cross-Sectional Study
Abstract
Introduction
Fine-needle aspiration (FNA) is commonly used to investigate lymphadenopathy of suspected metastatic origin. The current study aims to find the association be...
Navigation on Temporal Networks
Navigation on Temporal Networks
Abstract
Temporal networks, whose network topology changes over time, are used to represent, e.g., opportunistic mobile networks, vehicle networks, and social contact netwo...
A New Version of Distributional Chaos, Distributional Chaos in a Sequence, and Other Concepts of Chaos
A New Version of Distributional Chaos, Distributional Chaos in a Sequence, and Other Concepts of Chaos
In this paper, we investigate the relations between distributional chaos in a sequence and distributional chaos ([Formula: see text]-chaos, R–T chaos, DC3, respectively). Firstly, ...
The Symmetry of Chaos
The Symmetry of Chaos
Abstract
There is a tremendous fascination with chaos and fractals, about which picture books can be found on coffee tables everywhere. Chaos and fractals represent ...
Differentiating the lymph node metastasis of breast cancer through dynamic contrast-enhanced magnetic resonance imaging
Differentiating the lymph node metastasis of breast cancer through dynamic contrast-enhanced magnetic resonance imaging
Objective: Lymph node metastasis is an important trait of breast cancer, and tumors with different lymph node statuses require various clinical treatments. This study was designed ...

