Encryption of sensor data using the Lorentz attractor in embedded systems
Abstract
Keywords
Full Text:
PDFReferences
Ahmadov, S. Data encryption as a method of protecting personal data in a cloud environment. Bulletin of Cherkasy State Technological University, 2024, vol. 29, no. 3, pp. 31–41. DOI: 10.62660/bcstu/3.2024.31.
Goworko, M., & Wytrębowicz, J. A secure communication system for constrained IoT devices – Experiences and recommendations. Sensors, 2021, vol. 21, no. 20, article no. 6906. DOI: 10.3390/s21206906.
Ali, H., Khan, M. S., Driss, M., Ahmad, J., Buchanan, W. J., & Pitropakis, N. CellSecure: Securing image data in industrial Internet-of-Things via cellular automata and chaos-based encryption. 2023. DOI: 10.48550/arXiv.2309.11476.
Bagirovs, E., Provodin, G., Sipola, T., & Hautamäki, J. Applications of post-quantum cryptography. Proceedings of the 23rd European Conference on Cyber Warfare and Security (ECCWS), Reading, UK, Academic Conferences International Limited, 2024, vol. 23, no. 1, pp. 1–9. DOI: 10.34190/eccws.23.1.2247.
Clemente-Lopez, D., Rangel-Magdaleno, J. D. J., & Muñoz-Pacheco, J. M. A lightweight chaos-based encryption scheme for IoT healthcare systems. Internet of Things, 2023, vol. 25, article no. 101032. DOI: 10.1016/j.iot.2023.101032.
Makhazhanova, U., Omurtayeva, A., Kerimkhulle, S., Tokhmetov, A., Adalbek, A., & Taberkhan, R. Assessment of Investment Attractiveness of Small Enterprises in Agriculture Based on Fuzzy Logic. Lecture Notes in Networks and Systems, 2024, vol. 935, pp. 411–419. Available at: https://link.springer.com/chapter/10.1007/978-3-031-54820-8_34 (accessed 12.03.2025)
Azieva, G., Kerimkhulle, S., Turusbekova, U., Alimagambetova, A., & Niyazbekova, S. Analysis of access to the electricity transmission network using information technologies in some countries. E3S Web of Conferences, 2021, vol. 258, article no. 11003. DOI: 10.1051/e3sconf/202125811003
Kravtsova, D., & Ziuhan, U. Search of optimum solutions for technical systems under conditions of uncertainty with computerization of calculations in a tablet processor. Mining Journal of Kryvyi Rih National University, 2024, vol. 58, no. 1, pp. 63–68. DOI: 10.31721/2306-5435-2024-1-112-63-68
Rokan, J., Majeed, G. H., & Farhan, A. Secure IoT system based on chaos-modified lightweight AES. In Proceedings of the 2019 International Conference on Advanced Science and Engineering (ICOASE), 2019, Zakho-Duhok, Iraq, IEEE, pp. 1–6. DOI: 10.1109/ICOASE.2019.8723807.
Silva, C., Cunha, V. A., Barraca, J. P., & Aguiar, R. L. Analysis of the cryptographic algorithms in IoT communications. Information Systems Frontiers, 2023, vol. 26, no. 4, pp. 1243–1260. DOI: 10.1007/s10796-023-10383-9.
Gonzalez, R. C., & Nepomuceno, E. G. Image encryption based on flexible computing of chaotic systems, 2020. DOI: 10.48550/arXiv.2002.07722.
Peng, F., Zhang, X., Lin, Z.-X., & Long, M. A tunable selective encryption scheme for H.265/HEVC based on chroma IPM and coefficient scrambling. IEEE Transactions on Multimedia, 2020, vol. 22, no. 7, pp. 2765–2780. DOI: 10.1109/TCSVT.2019.2924910.
Zhang, X., Yu, S., Chen, P., Lü, J., He, J., & Lin, Z. Design and ARM-embedded implementation of a chaotic secure communication scheme based on H.264 selective encryption. Nonlinear Dynamics, 2017, vol. 89, no. 3, pp. 1949–1965. DOI: 10.1007/s11071-017-3563-
Anandkumar, R., & Kalpana, R. Analyzing of chaos-based encryption with Lorenz and Henon map. In Proceedings of the 2018 2nd International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), 2018, Palladam, India, IEEE, pp. 204–208 DOI: 10.1109/I-SMAC.2018.8653652.
Smailov, N., Tsyporenko, V., Ualiyev, Z., Issova, A., Dosbayev, Z., Tashtay, Y., Zhekambayeva, M., Alimbekov, T., Kadyrova, R., & Sabibolda, A. Improving accuracy of the spectral-correlation direction finding and delay estimation using machine learning. Eastern European Journal of Enterprise Technologies, 2025, vol. 2, no. 5(134), pp. 15–24. DOI: 10.15587/1729-4061.2025.327021.
Hassan, M., & Kadhim, A. New image encryption based on pixel mixing and generating chaos system. Al-Qadisiyah Journal of Pure Science, 2021, vol. 25, no. 4, pp. 1–14. DOI: 10.29350/qjps.2020.25.4.1182.
Alahmadi, A. H. Chaos coordinated neural key synchronization for enhancing security of IoT. Complex & Intelligent Systems, 2022, vol. 8, no. 2, pp. 1619–1637. DOI: 10.1007/s40747-021-00616-2
Zou, C., Zhang, Q., Wei, X., & Liu, C. Image encryption based on improved Lorenz system. IEEE Access, 2020, vol. 8, pp. 75728–75740. DOI: 10.1109/ACCESS.2020.2988880.
Nesa, N., Ghosh, T., & Banerjee, I. Design of a chaos-based encryption scheme for sensor data using a novel logarithmic chaotic map. Journal of Information Security and Applications, 2019, vol. 47, pp. 320–328. DOI: 10.1016/j.jisa.2019.05.017.
Rahman, Z., Yi, X., Billah, M., Sumi, M., & Anwar, A. Enhancing AES using chaos and logistic map-based key generation technique for securing IoT-based smart home. Electronics, 2022, vol. 11, no. 7, article no. 1083. DOI: 10.3390/electronics11071083.
Vishwakarma, R., Monani, R., Rezaei, A., Sayadi, H., Aliasgari, M., & Hedayatipour, A. Attacks on continuous chaos communication and remedies for resource limited devices. 2023 24th International Symposium on Quality Electronic Design (ISQED), 2023, San Francisco, CA, USA, IEEE, pp. 1–8. DOI: 10.1109/ISQED57927.2023.10129355.
Matos Jr., Z. A., & Talirongan, H. Enhancing DES security: Integrating chaos theory with Lorenz attractor-based S-Box modifications. International Journal of Multidisciplinary Research and Publications, 2024, vol. 7, no. 5, pp. 129–134.
Raj, V., Janakiraman, S., Rajagopalan, S., & Rengarajan, A. Confused memory read attracts synthetic diffusion on the fly – A lightweight image encryption for IoT platform. In Shankar Sriram, V., Subramaniyaswamy, V., Sasikaladevi, N., Zhang, L., Batten, L., Li, G. (Eds.), Applications and Techniques in Information Security: Communications in Computer and Information Science, 2019, Singapore, Springer, pp. 62–73. DOI: 10.1007/978-981-15-0871-4_5.
Magara, T., & Zhou, Y. EMAKAS: An efficient three-factor mutual authentication and key-agreement scheme for IoT environment. Computer Science and Applications, 2024, vol. 3, article no. 100066. DOI: 10.1016/j.csa.2024.100066.
Yener, Ş. Ç., Mutlu, R., & Karakulak, E. Implementation of a microcontroller-based chaotic circuit of Lorenz equations. Balkan Journal of Electrical and Computer Engineering, 2020, vol. 8, no. 4, pp. 355–360. DOI: 10.17694/bajece.624645.
Bisenovna, K. A., Ashatuly, S. A., Beibutovna, L. Z., Yesilbayuly, K. S., Zagievna, A. A., Galymbekovna, M. Z., & Oralkhanuly, O. B. Improving the efficiency of food supplies for a trading company based on an artificial neural network. International Journal of Electrical and Computer Engineering, 2024, vol. 14, no. 4, pp. 4407–4417. DOI: 10.11591/ijece.v14i4.pp4407-4417
Kondratenko, Y. P., Encheva, S. B., & Sidenko, E. V. Synthesis of intelligent decision support systems for transport logistics. Proceedings of the 6th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, IDAACS'2011, 2011, vol. 2, pp. 642–646. DOI: 10.1109/IDAACS.2011.6072847.
Mentukh, N., & Shevchuk, O. Protection of information in electronic registers: Comparative and legal aspect. Law, Policy and Security, 2023, vol. 1, no. 1, pp. 4–17.
Emin, B., & Musayev, Z. Chaos-based image encryption in embedded systems using Lorenz-Rossler. Chaos Theory and Applications, 2023, vol. 5, no. 3, pp. 153–159. DOI: 10.51537/chaos.1246581.
Damaj, I., Zaher, A., & Lawand, W. Optimizing FPGA Implementation of high-precision chaotic systems: A case study with the Lorenz system. PLOS One, 2023, vol. 19, no. 4, article no. e0299021. DOI: 10.1371/JOURNAL.PONE.0299021.
Wu, S. A secure Real-Time IoT data stream based on improved compound coupled map lattices. Applied Sciences, 2022, vol. 12, no. 17, article no. 8489. DOI: 10.3390/app12178489.
Peter Saffold - Embedded System developer, 2019. Available at: https://peter.saffold.com/lorenz.html (accessed 27.03.2025)
Samiullah, M., Aslam, W., Mehmood, A., Ahmad, M. S., Ahmad, S., Al-Shayea, A. M., & Shafiq, M. Chaos-based cryptographic mechanism for smart healthcare IoT systems. Computers, Materials & Continua, 2022, vol. 71, no. 1, pp. 753–769. DOI: 10.32604/cmc.2022.020432.
Hwang, J., Kale, G., Patel, P. P., Vishwakarma, R., Aliasgari, M., Hedayatipour, A., Rezaei, A., & Sayadi, H. Machine learning in chaos-based encryption: Theory, implementations, and applications. IEEE Access, 2023, vol. 11, pp. 125749–125767. DOI: 10.1109/ACCESS.2023.3331320.
Beisenbi, M., Kaliyeva, S., Sagymbay, A., Abdugulova, Z., & Ostayeva, A. A new approach for synthesis of the control system by gradient-velocity method of Lyapunov vector functions. Journal of Theoretical and Applied Information Technology, 2021, vol. 99, no. 2, pp. 381–389. Available at: https://www.jatit.org/volumes/Vol99No2/11Vol99No2.pdf (accessed 27.02.2025)
Atamanyuk, I. P., & Kondratenko, Y. P. Computer's analysis method and reliability assessment of fault-tolerance operation of information systems. Ceur Workshop Proceedings, 2015, vol. 1356, pp. 507–522. Available at: https://ceur-ws.org/Vol-1356/paper_52.pdf (accessed 11.01.2025)
Alibraheemi, H. M. M., Al Ibraheemi, M. M. A., & Radhy, Z. H. Design and practical implementation of a stream cipher algorithm based on a Lorenz system. Mesopotamian Journal of Cybersecurity, 2024, vol. 4, no. 3, pp. 136–151. DOI: 10.58496/MJCS/2024/019.
Premkumar, R., Priya, C., Vengatesh Kumar, S., Vidhyalakshmi, M., & Saranya, S. Investigation on image encryption using chaos based techniques. International Journal for Modern Trends in Science and Technology, 2021, vol. 7, no. 5, pp. 147–154. DOI: 10.46501/IJMTST0705025.
Al-Maadeed, T. A., Hussain, I., Anees, A., & Mustafa, M. T. A image encryption algorithm based on chaotic Lorenz system and novel primitive polynomial S-boxes. Multimedia Tools and Applications, 2021, vol. 80, no. 16, pp. 24801–24822. DOI: 10.1007/s11042-021-10695-5.
Kondratenko, Y. P., & Kondratenko, N. Y. Soft computing analytic models for increasing the efficiency of fuzzy information processing in decision support systems. In Hudson R. (Eds.), Decision-Making: Processes, Behavioral Influences and Role in Business Management, 2015, Hauppauge, Nova Science Publishers, pp. 41–77.
Savka, M. Analysis of the key models, methods, and means of data collection in the Internet of Things. Technologies and Engineering, 2025, vol. 26, no. 2, pp. 66–78. DOI: 10.30857/2786-5371.2025.2.6.
Myronets, I., & Ponomarenko, V. Automated system of software protection for Android operation system. Bulletin of Cherkasy State Technological University, 2020, vol. 25, no. 1, pp. 43–49. DOI: 10.24025/2306-4412.1.2020.185308.
He, D., Yang, X., Zhou, B., Wu, Y., Cheng, Y., & Guizani, N. Password enhancement based on semantic transformation. IEEE Network, 2020, vol. 34, no 1, pp. 116–121. DOI: 10.1109/MNET.2019.1900033.
Gong, Y., Chang, X., Mišić, J., Mišić, V. B., Wang, J., & Zhu, H. Practical solutions in fully homomorphic encryption: a survey analyzing existing acceleration methods. Cybersecurity, 2024, vol. 7, article no. 5. DOI: 10.1186/s42400-023-00187-4.
Golovko, G., & Kalynovych, M. Specifics of implementation of the asymmetric encryption algorithm on elliptic curves. Control, Navigation and Communication Systems, 2023, vol. 1, no. 66, pp. 84–90. DOI: 10.26906/SUNZ.2023.1.084.
El Hanouti, I., El Fadili, H., & Zenkouar, K. Cryptanalysis of a chaos-based fast image encryption algorithm for embedded systems. Multimedia Tools and Applications, 2021, vol. 80, no. 9, pp. 13801–13820. DOI: 10.1007/s11042-020-10289-7.
Kiran, H. E., Akgul, A., Yildiz, O., & Deniz, E. Lightweight encryption mechanism with discrete-time chaotic maps for Internet of Robotic Things. Integration, 2023, vol. 93, article no. 102047. DOI: 10.1016/j.vlsi.2023.06.001
Gilmolk, A. M. N., & Aref, M. R. Lightweight image encryption using a novel chaotic technique for the safe internet of things. International Journal of Computational Intelligence Systems, 2024, vol. 17., no. 1, article no. 146. DOI: 10.1007/s44196-024-00535-3
Tolba, Z. Cryptanalysis and improvement of multimodal data encryption by machine-learning-based system. ArXiv, 2024, article no. 2402.15779. DOI: 10.48550/arXiv.2402.15779.
Destek, M. A., Hossain, M. R., Manga, M., & Destek, G. Can digital government reduce the resource dependency? Evidence from method of moments quantile technique. Resources Policy, 2024, vol. 99, article no. 105426. DOI: 10.1016/j.resourpol.2024.105426.
Varanitskyi, D., Rozkolodko, O., Liuta, M., Zakharova, M., & Hotunov, V. Analysis of data protection mechanisms in cloud environments. Technologies and Engineering, 2024, vol. 25, no. 1, pp. 9–16. DOI: 10.30857/2786-5371.2024.1.1.
Khan, K. A., Subhan, M., Tiwari, S., Anser, M. K., & Destek, M. A. Impacts of natural resources and technological innovation on SDG achievement of OECD countries: How does democracy and globalization behave? Technology in Society, 2025, vol. 81, article no. 102778. DOI: 10.1016/j.techsoc.2024.102778.
DOI: https://doi.org/10.32620/reks.2025.2.14
Refbacks
- There are currently no refbacks.