Abstract
Aiming at a large number of Sensor Nodes is restricted by hardware resources about the application of Internet of Things so that the AES and CMAC algorithm of LoRaWAN protocol cannot run normally. A novel lightweight block cipher algorithm is proposed with the purpose of overcoming the disadvantage, which combines Logistic chaotic mapping with Arnold transformation. The cipher algorithm considers that two important factors, namely hardware resources consumption and security. It is compatible with LoRaWAN protocol and suitable for limited hardware resources of sensor nodes.
This work is partially supported by Natural Science Foundation of China (No. 61471158).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Chen, T.M., Jiang, R.R.: New hybrid stream cipher based on chaos and neural networks. J. Acta. Phys. Sin. 4(62), 040301 (2013)
Muhammad, S., Furqan, Z., Guha, R.: Wireless sensor network security: a secure sink node architecture. In: Performance Computing and Communications Conference, Phoenix, USA, pp. 371–376 (2005)
Shahare, P., Chavhan, N.: An approach to secure sink node’s location privacy in wireless sensor networks. In: International Conference on Communication Systems and Network Technologies, Washington, USA, pp. 748–751 (2014)
Chen, S., Zhong, X.X., Wu, Z.Z.: Chaos block cipher for wireless sensor network. J. Sci. China. Ser. F-Inf. Sci 51(8), 1055–1063 (2008)
The LoRaWAN Topology Structure [EB/OL]. https://www.lora-alliance.org
Choy, J.: Cryptographic properties and application of a generalized unbalanced Feistel network structure. J. Crypt. Commun. 3(3), 141–164 (2011)
Coron, J., Holenstein, T., Kunzler, R., et al.: How to build an ideal cipher: the indifferentiability of the Feistel construction. J. Cryptology 29(1), 61–114 (2016)
Li, Q., Liao, X., Qu, G.Q., et al.: Adaptive steganography algorithm in digital image based on Arnold transform. J. Commun. 37(6), 192–198 (2016)
Li, Y.J., Zhang, R.Z., Ge, J.H., et al.: Periods of the 3-arnold transformation and its application in image encryption. J. Univ. Electr. Sci. Technol. China 44(2), 289–294 (2015)
Du, B.X., Ding, Q., Geng, X.L.: Generation and realization of digital chaotic key sequence based on K-L transform. In: Chaos-Fractals Theories and Application, Hangzhou, China, pp. 385–389 (2011)
Rogelio, H.B., Roxana, R.R.: Cycle detection for secure chaos-based encryption. J. Commun. Nonlinear Sci. Numer. Simul. 16(8), 3203–3211 (2011)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG
About this paper
Cite this paper
Fan, C., Ding, Q. (2018). Designing a Lightweight Cipher Algorithm Based on Chaos Theory and LoRaWAN. In: Pan, JS., Wu, TY., Zhao, Y., Jain, L. (eds) Advances in Smart Vehicular Technology, Transportation, Communication and Applications. VTCA 2017. Smart Innovation, Systems and Technologies, vol 86. Springer, Cham. https://doi.org/10.1007/978-3-319-70730-3_41
Download citation
DOI: https://doi.org/10.1007/978-3-319-70730-3_41
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-70729-7
Online ISBN: 978-3-319-70730-3
eBook Packages: EngineeringEngineering (R0)