Encryption of sensor data using the Lorentz attractor in embedded systems

Akbota Kulzhanova, Sholpan Jomartova, Talgat Mazakov

Abstract


The increasing threat of cyber-attacks and the need to protect embedded system data require the development of energy-efficient cryptographic methods. The subject matter of this article is the development of an energy-efficient data encryption method for embedded systems using chaotic systems, specifically the Lorenz system. The goal of this study was to create a data encryption method for embedded systems with limited computing resources. The tasks included developing an algorithm based on the properties of the chaotic Lorenz system, implementing it on microcontrollers and programmable logic circuits, and testing its performance under near-real operational conditions. The methods used involved leveraging the high sensitivity of chaotic systems to initial conditions, implementing the encryption algorithm in hardware, and evaluating key performance indicators, such as speed, power consumption, memory usage, and resistance to cryptographic attacks. The results showed that the proposed algorithm reduces memory and energy consumption by 37% and 10%, respectively, compared to conventional methods, providing an encryption speed of 120 milliseconds per kilobyte of data. Tests have confirmed that even minimal changes in the initial parameters of a chaotic system led to a change of up to 90% of the bits in the encrypted data, which increases the algorithm’s robustness. The proposed method is compatible with various types of data and shows versatility for information protection. The algorithm has demonstrated efficiency in processing text arrays and sensory data, making it suitable for use in smart cities, medical devices, and industrial networks. The key entropy value was 7.95 bits per byte, indicating high encryption reliability. In conclusion, the results obtained prove that the proposed method is promising for use in conditions of limited resources and can be integrated with modern information security technologies.

Keywords


chaotic structures; information security methods; dynamic models; nonlinear cryptography; mathematical security framework; signal processing algorithms

Full Text:

PDF

References


Ahmadov, S. Data encryption as a method of protecting personal data in a cloud environment. Bulletin of Cherkasy State Technological University, 2024, vol. 29, no. 3, pp. 31–41. DOI: 10.62660/bcstu/3.2024.31.

Goworko, M., & Wytrębowicz, J. A secure communication system for constrained IoT devices – Experiences and recommendations. Sensors, 2021, vol. 21, no. 20, article no. 6906. DOI: 10.3390/s21206906.

Ali, H., Khan, M. S., Driss, M., Ahmad, J., Buchanan, W. J., & Pitropakis, N. CellSecure: Securing image data in industrial Internet-of-Things via cellular automata and chaos-based encryption. 2023. DOI: 10.48550/arXiv.2309.11476.

Bagirovs, E., Provodin, G., Sipola, T., & Hautamäki, J. Applications of post-quantum cryptography. Proceedings of the 23rd European Conference on Cyber Warfare and Security (ECCWS), Reading, UK, Academic Conferences International Limited, 2024, vol. 23, no. 1, pp. 1–9. DOI: 10.34190/eccws.23.1.2247.

Clemente-Lopez, D., Rangel-Magdaleno, J. D. J., & Muñoz-Pacheco, J. M. A lightweight chaos-based encryption scheme for IoT healthcare systems. Internet of Things, 2023, vol. 25, article no. 101032. DOI: 10.1016/j.iot.2023.101032.

Makhazhanova, U., Omurtayeva, A., Kerimkhulle, S., Tokhmetov, A., Adalbek, A., & Taberkhan, R. Assessment of Investment Attractiveness of Small Enterprises in Agriculture Based on Fuzzy Logic. Lecture Notes in Networks and Systems, 2024, vol. 935, pp. 411–419. Available at: https://link.springer.com/chapter/10.1007/978-3-031-54820-8_34 (accessed 12.03.2025)

Azieva, G., Kerimkhulle, S., Turusbekova, U., Alimagambetova, A., & Niyazbekova, S. Analysis of access to the electricity transmission network using information technologies in some countries. E3S Web of Conferences, 2021, vol. 258, article no. 11003. DOI: 10.1051/e3sconf/202125811003

Kravtsova, D., & Ziuhan, U. Search of optimum solutions for technical systems under conditions of uncertainty with computerization of calculations in a tablet processor. Mining Journal of Kryvyi Rih National University, 2024, vol. 58, no. 1, pp. 63–68. DOI: 10.31721/2306-5435-2024-1-112-63-68

Rokan, J., Majeed, G. H., & Farhan, A. Secure IoT system based on chaos-modified lightweight AES. In Proceedings of the 2019 International Conference on Advanced Science and Engineering (ICOASE), 2019, Zakho-Duhok, Iraq, IEEE, pp. 1–6. DOI: 10.1109/ICOASE.2019.8723807.

Silva, C., Cunha, V. A., Barraca, J. P., & Aguiar, R. L. Analysis of the cryptographic algorithms in IoT communications. Information Systems Frontiers, 2023, vol. 26, no. 4, pp. 1243–1260. DOI: 10.1007/s10796-023-10383-9.

Gonzalez, R. C., & Nepomuceno, E. G. Image encryption based on flexible computing of chaotic systems, 2020. DOI: 10.48550/arXiv.2002.07722.

Peng, F., Zhang, X., Lin, Z.-X., & Long, M. A tunable selective encryption scheme for H.265/HEVC based on chroma IPM and coefficient scrambling. IEEE Transactions on Multimedia, 2020, vol. 22, no. 7, pp. 2765–2780. DOI: 10.1109/TCSVT.2019.2924910.

Zhang, X., Yu, S., Chen, P., Lü, J., He, J., & Lin, Z. Design and ARM-embedded implementation of a chaotic secure communication scheme based on H.264 selective encryption. Nonlinear Dynamics, 2017, vol. 89, no. 3, pp. 1949–1965. DOI: 10.1007/s11071-017-3563-

Anandkumar, R., & Kalpana, R. Analyzing of chaos-based encryption with Lorenz and Henon map. In Proceedings of the 2018 2nd International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), 2018, Palladam, India, IEEE, pp. 204–208 DOI: 10.1109/I-SMAC.2018.8653652.

Smailov, N., Tsyporenko, V., Ualiyev, Z., Issova, A., Dosbayev, Z., Tashtay, Y., Zhekambayeva, M., Alimbekov, T., Kadyrova, R., & Sabibolda, A. Improving accuracy of the spectral-correlation direction finding and delay estimation using machine learning. Eastern European Journal of Enterprise Technologies, 2025, vol. 2, no. 5(134), pp. 15–24. DOI: 10.15587/1729-4061.2025.327021.

Hassan, M., & Kadhim, A. New image encryption based on pixel mixing and generating chaos system. Al-Qadisiyah Journal of Pure Science, 2021, vol. 25, no. 4, pp. 1–14. DOI: 10.29350/qjps.2020.25.4.1182.

Alahmadi, A. H. Chaos coordinated neural key synchronization for enhancing security of IoT. Complex & Intelligent Systems, 2022, vol. 8, no. 2, pp. 1619–1637. DOI: 10.1007/s40747-021-00616-2

Zou, C., Zhang, Q., Wei, X., & Liu, C. Image encryption based on improved Lorenz system. IEEE Access, 2020, vol. 8, pp. 75728–75740. DOI: 10.1109/ACCESS.2020.2988880.

Nesa, N., Ghosh, T., & Banerjee, I. Design of a chaos-based encryption scheme for sensor data using a novel logarithmic chaotic map. Journal of Information Security and Applications, 2019, vol. 47, pp. 320–328. DOI: 10.1016/j.jisa.2019.05.017.

Rahman, Z., Yi, X., Billah, M., Sumi, M., & Anwar, A. Enhancing AES using chaos and logistic map-based key generation technique for securing IoT-based smart home. Electronics, 2022, vol. 11, no. 7, article no. 1083. DOI: 10.3390/electronics11071083.

Vishwakarma, R., Monani, R., Rezaei, A., Sayadi, H., Aliasgari, M., & Hedayatipour, A. Attacks on continuous chaos communication and remedies for resource limited devices. 2023 24th International Symposium on Quality Electronic Design (ISQED), 2023, San Francisco, CA, USA, IEEE, pp. 1–8. DOI: 10.1109/ISQED57927.2023.10129355.

Matos Jr., Z. A., & Talirongan, H. Enhancing DES security: Integrating chaos theory with Lorenz attractor-based S-Box modifications. International Journal of Multidisciplinary Research and Publications, 2024, vol. 7, no. 5, pp. 129–134.

Raj, V., Janakiraman, S., Rajagopalan, S., & Rengarajan, A. Confused memory read attracts synthetic diffusion on the fly – A lightweight image encryption for IoT platform. In Shankar Sriram, V., Subramaniyaswamy, V., Sasikaladevi, N., Zhang, L., Batten, L., Li, G. (Eds.), Applications and Techniques in Information Security: Communications in Computer and Information Science, 2019, Singapore, Springer, pp. 62–73. DOI: 10.1007/978-981-15-0871-4_5.

Magara, T., & Zhou, Y. EMAKAS: An efficient three-factor mutual authentication and key-agreement scheme for IoT environment. Computer Science and Applications, 2024, vol. 3, article no. 100066. DOI: 10.1016/j.csa.2024.100066.

Yener, Ş. Ç., Mutlu, R., & Karakulak, E. Implementation of a microcontroller-based chaotic circuit of Lorenz equations. Balkan Journal of Electrical and Computer Engineering, 2020, vol. 8, no. 4, pp. 355–360. DOI: 10.17694/bajece.624645.

Bisenovna, K. A., Ashatuly, S. A., Beibutovna, L. Z., Yesilbayuly, K. S., Zagievna, A. A., Galymbekovna, M. Z., & Oralkhanuly, O. B. Improving the efficiency of food supplies for a trading company based on an artificial neural network. International Journal of Electrical and Computer Engineering, 2024, vol. 14, no. 4, pp. 4407–4417. DOI: 10.11591/ijece.v14i4.pp4407-4417

Kondratenko, Y. P., Encheva, S. B., & Sidenko, E. V. Synthesis of intelligent decision support systems for transport logistics. Proceedings of the 6th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, IDAACS'2011, 2011, vol. 2, pp. 642–646. DOI: 10.1109/IDAACS.2011.6072847.

Mentukh, N., & Shevchuk, O. Protection of information in electronic registers: Comparative and legal aspect. Law, Policy and Security, 2023, vol. 1, no. 1, pp. 4–17.

Emin, B., & Musayev, Z. Chaos-based image encryption in embedded systems using Lorenz-Rossler. Chaos Theory and Applications, 2023, vol. 5, no. 3, pp. 153–159. DOI: 10.51537/chaos.1246581.

Damaj, I., Zaher, A., & Lawand, W. Optimizing FPGA Implementation of high-precision chaotic systems: A case study with the Lorenz system. PLOS One, 2023, vol. 19, no. 4, article no. e0299021. DOI: 10.1371/JOURNAL.PONE.0299021.

Wu, S. A secure Real-Time IoT data stream based on improved compound coupled map lattices. Applied Sciences, 2022, vol. 12, no. 17, article no. 8489. DOI: 10.3390/app12178489.

Peter Saffold - Embedded System developer, 2019. Available at: https://peter.saffold.com/lorenz.html (accessed 27.03.2025)

Samiullah, M., Aslam, W., Mehmood, A., Ahmad, M. S., Ahmad, S., Al-Shayea, A. M., & Shafiq, M. Chaos-based cryptographic mechanism for smart healthcare IoT systems. Computers, Materials & Continua, 2022, vol. 71, no. 1, pp. 753–769. DOI: 10.32604/cmc.2022.020432.

Hwang, J., Kale, G., Patel, P. P., Vishwakarma, R., Aliasgari, M., Hedayatipour, A., Rezaei, A., & Sayadi, H. Machine learning in chaos-based encryption: Theory, implementations, and applications. IEEE Access, 2023, vol. 11, pp. 125749–125767. DOI: 10.1109/ACCESS.2023.3331320.

Beisenbi, M., Kaliyeva, S., Sagymbay, A., Abdugulova, Z., & Ostayeva, A. A new approach for synthesis of the control system by gradient-velocity method of Lyapunov vector functions. Journal of Theoretical and Applied Information Technology, 2021, vol. 99, no. 2, pp. 381–389. Available at: https://www.jatit.org/volumes/Vol99No2/11Vol99No2.pdf (accessed 27.02.2025)

Atamanyuk, I. P., & Kondratenko, Y. P. Computer's analysis method and reliability assessment of fault-tolerance operation of information systems. Ceur Workshop Proceedings, 2015, vol. 1356, pp. 507–522. Available at: https://ceur-ws.org/Vol-1356/paper_52.pdf (accessed 11.01.2025)

Alibraheemi, H. M. M., Al Ibraheemi, M. M. A., & Radhy, Z. H. Design and practical implementation of a stream cipher algorithm based on a Lorenz system. Mesopotamian Journal of Cybersecurity, 2024, vol. 4, no. 3, pp. 136–151. DOI: 10.58496/MJCS/2024/019.

Premkumar, R., Priya, C., Vengatesh Kumar, S., Vidhyalakshmi, M., & Saranya, S. Investigation on image encryption using chaos based techniques. International Journal for Modern Trends in Science and Technology, 2021, vol. 7, no. 5, pp. 147–154. DOI: 10.46501/IJMTST0705025.

Al-Maadeed, T. A., Hussain, I., Anees, A., & Mustafa, M. T. A image encryption algorithm based on chaotic Lorenz system and novel primitive polynomial S-boxes. Multimedia Tools and Applications, 2021, vol. 80, no. 16, pp. 24801–24822. DOI: 10.1007/s11042-021-10695-5.

Kondratenko, Y. P., & Kondratenko, N. Y. Soft computing analytic models for increasing the efficiency of fuzzy information processing in decision support systems. In Hudson R. (Eds.), Decision-Making: Processes, Behavioral Influences and Role in Business Management, 2015, Hauppauge, Nova Science Publishers, pp. 41–77.

Savka, M. Analysis of the key models, methods, and means of data collection in the Internet of Things. Technologies and Engineering, 2025, vol. 26, no. 2, pp. 66–78. DOI: 10.30857/2786-5371.2025.2.6.

Myronets, I., & Ponomarenko, V. Automated system of software protection for Android operation system. Bulletin of Cherkasy State Technological University, 2020, vol. 25, no. 1, pp. 43–49. DOI: 10.24025/2306-4412.1.2020.185308.

He, D., Yang, X., Zhou, B., Wu, Y., Cheng, Y., & Guizani, N. Password enhancement based on semantic transformation. IEEE Network, 2020, vol. 34, no 1, pp. 116–121. DOI: 10.1109/MNET.2019.1900033.

Gong, Y., Chang, X., Mišić, J., Mišić, V. B., Wang, J., & Zhu, H. Practical solutions in fully homomorphic encryption: a survey analyzing existing acceleration methods. Cybersecurity, 2024, vol. 7, article no. 5. DOI: 10.1186/s42400-023-00187-4.

Golovko, G., & Kalynovych, M. Specifics of implementation of the asymmetric encryption algorithm on elliptic curves. Control, Navigation and Communication Systems, 2023, vol. 1, no. 66, pp. 84–90. DOI: 10.26906/SUNZ.2023.1.084.

El Hanouti, I., El Fadili, H., & Zenkouar, K. Cryptanalysis of a chaos-based fast image encryption algorithm for embedded systems. Multimedia Tools and Applications, 2021, vol. 80, no. 9, pp. 13801–13820. DOI: 10.1007/s11042-020-10289-7.

Kiran, H. E., Akgul, A., Yildiz, O., & Deniz, E. Lightweight encryption mechanism with discrete-time chaotic maps for Internet of Robotic Things. Integration, 2023, vol. 93, article no. 102047. DOI: 10.1016/j.vlsi.2023.06.001

Gilmolk, A. M. N., & Aref, M. R. Lightweight image encryption using a novel chaotic technique for the safe internet of things. International Journal of Computational Intelligence Systems, 2024, vol. 17., no. 1, article no. 146. DOI: 10.1007/s44196-024-00535-3

Tolba, Z. Cryptanalysis and improvement of multimodal data encryption by machine-learning-based system. ArXiv, 2024, article no. 2402.15779. DOI: 10.48550/arXiv.2402.15779.

Destek, M. A., Hossain, M. R., Manga, M., & Destek, G. Can digital government reduce the resource dependency? Evidence from method of moments quantile technique. Resources Policy, 2024, vol. 99, article no. 105426. DOI: 10.1016/j.resourpol.2024.105426.

Varanitskyi, D., Rozkolodko, O., Liuta, M., Zakharova, M., & Hotunov, V. Analysis of data protection mechanisms in cloud environments. Technologies and Engineering, 2024, vol. 25, no. 1, pp. 9–16. DOI: 10.30857/2786-5371.2024.1.1.

Khan, K. A., Subhan, M., Tiwari, S., Anser, M. K., & Destek, M. A. Impacts of natural resources and technological innovation on SDG achievement of OECD countries: How does democracy and globalization behave? Technology in Society, 2025, vol. 81, article no. 102778. DOI: 10.1016/j.techsoc.2024.102778.




DOI: https://doi.org/10.32620/reks.2025.2.14

Refbacks

  • There are currently no refbacks.