A Secure Real-Time IoT Data Stream Based on Improved Compound Coupled Map Lattices
Abstract
:1. Introduction
2. Background and Related Work
2.1. Stream Cipher
- Synchronous stream cipher: In the synchronous stream cipher, the stream of pseudo-random digits is generated independently. The sender and receiver must be exactly in step for decryption to be successful.
- Self-synchronizing stream cipher: The self-synchronization has the advantage that it can synchronize automatically after receiving some digits of the ciphertext. This makes the self-synchronizing system easier to restore if the digits are discarded or added to the message stream.
2.2. Chaos Theory
- Logistic Map
- Tent Map
2.3. Coupled Chaotic Map Lattices
3. The Proposed Chaotic Stream Cipher Based on Compound Coupled Map Lattices
3.1. The Weakness of the Original Coupled Chaotic Map Lattice
3.1.1. The Original CML Based on Logistic Map
3.1.2. The Original CML Based on Tent Map
3.2. The Improved Coupled Chaotic Map
3.2.1. The Improved CML Based on Logistic Map
3.2.2. The Improved CML Based on Tent Map
3.3. The Improved Compound Coupled Chaotic Map Lattice Combining Different Chaotic Maps
3.3.1. The Improved Compound CML Combining Both Logistic Map and Tent Map in a Single Stage
3.3.2. The Improved Compound CML Combining Logistic Map and Tent Map in an Alternate Stage
4. Experimental Results and Security Analysis
4.1. The Linear Complexity of the Proposed Chaotic Stream Cipher Based on Improved CML
4.2. Security Analysis
4.2.1. Brute-Force Attack
4.2.2. Chosen Ciphertext Attack
4.2.3. Guess-and-Determine Attack
4.2.4. Balance Performance Analysis
4.2.5. Differential Cryptanalysis
4.3. Statistical Random Number Tests
4.3.1. Random Test Results under FIPS PUB 140-1
4.3.2. Random Test Result under SP800-22
5. Conclusions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- Atzon, L.; Lera, A.; Morabito, G. The internet of thins: A survey. Comput. Netw. 2010, 54, 2787–2805. [Google Scholar]
- Borgia, E. The internet of things vision: Key future, applications and open issues. Comput. Commun. 2014, 54, 1–31. [Google Scholar] [CrossRef]
- Alligood, K.T.; Sauer, T.D.; Yorke, J.A. Chaos: An Introduction to Dynamical Systems; Springer: New York, NY, USA, 1996; pp. 105–147. [Google Scholar]
- Chen, L.-Z.; Weng, Y. A data encryption algorithm based on dual chaotic system. In Proceedings of the International Conference on Computer Application and System Modeling, Taiyuan, China, 22–24 October 2010; pp. 431–435. [Google Scholar]
- Pecora, L.M.; Carroll, T.L. Synchronized chaotic signals and systems. In Proceedings of the ICASSP-92: 1992 IEEE International Conference on Acoustics, Speech and Signal Processing, San Francisco, CA, USA, 23–26 March 1992; pp. 137–140. [Google Scholar]
- Wang, X.; Hou, Y.; Wang, S.; Li, R. A new image encryption algorithm based on CML and DNA sequence. IEEE Access 2018, 6, 62272–62285. [Google Scholar] [CrossRef]
- Wang, X.-Y.; Zhang, H.-L.; Bao, X.-M. Color image encryption scheme using CML and DNA sequence operations. Biosystems 2016, 144, 18–26. [Google Scholar] [CrossRef] [PubMed]
- Zhang, H.; CaiImage, R. Encryption algorithm based on bit-plane scrambling and multiple chaotic systems combination. In Proceedings of the 2010 International Conference on Intelligent Computing and Integrated Systems, Guilin, China, 22–24 October 2010; pp. 113–117. [Google Scholar]
- Kunihiko, K. Coupled Map Lattice. Chaos, Order, and Patterns; Springer: New York, NY, USA, 1991; pp. 237–247. [Google Scholar]
- Lin, J.; Xicai, S. A new stream cipher based on coupled map lattices map. In 2009 WRI World Congress on Computer Science and Information Engineering; IEEE: Piscataway, NJ, USA, 2009; Volume 1. [Google Scholar]
- Liu, J.-D.; Yang, K.; Wang, S.-H. Coupled chaotic tent map lattices system with uniform distribution. In Proceedings of the 2010 2nd International Conference on E-Business and Information System Security, Wuhan, China, 22–23 May 2010; pp. 1–5. [Google Scholar]
- Yin, R.; Yuan, J.; Yang, Q.; Shan, X.; Wang, X. Discretization of coupled map lattices for a stream cipher. Tsinghua Sci. Technol. 2011, 19, 241–246. [Google Scholar] [CrossRef]
- Arroyo, D.; Rhouma, R.; Alvarez, G.; Li, S.; Fernandez, V. On the security of a new image encryption scheme based on chaotic map lattices. Chaos Interdiscipl. J. Nonlinear Sci. 2008, 18, 033112. [Google Scholar] [CrossRef] [PubMed]
- Lian, S. Effcient image or video encryption based on spatiotemporal chaos system. Chaos Solitons Fractals 2009, 40, 25092519. [Google Scholar] [CrossRef]
- Lian, S.; Sun, J.; Wang, Z. A block cipher based on a suitable use of the chaotic standard map. Chaos Solitons Fractals 2005, 26, 117–129. [Google Scholar] [CrossRef]
- Huang, R.; Han, F.; Liao, X.; Wang, Z.; Dong, A. A novel intermittent jumping coupled map lattice based on multiple chaotic maps. Appl. Sci. 2021, 11, 3797. [Google Scholar] [CrossRef]
- Zhang, Y.Q.; Wang, X.Y. A new image encryption algorithm based on non-adjacent coupled map lattices. Appl. Soft Comput. 2015, 26, 10–20. [Google Scholar] [CrossRef]
- Zhang, H.; Wang, X.; Xie, H.; Wang, C.; Wang, X. An Efficient and Secure Image Encryption Algorithm Based on Non-Adjacent Coupled Maps. IEEE Access 2020, 8, 122104–122120. [Google Scholar] [CrossRef]
- Zhang, Y.Q.; Wang, X.Y. A symmetric image encryption algorithm based on mixed linear-nonlinear coupled map lattice. Inf. Sci. 2014, 273, 329–351. [Google Scholar] [CrossRef]
- Wang, X.; Yang, J. A privacy image encryption algorithm based on piecewise coupled map lattice with multi dynamic coupling coefficient. Inf. Sci. 2021, 569, 217–240. [Google Scholar] [CrossRef]
- FIPS, P. 140-1; Security Requirements for Cryptographic Modules. National Institute of Standards and Technology: Gaithersburg, MD, USA, 1994; pp. 140–141.
- National Institute of Standard Technology. Announcing the Advanced Encryption Standard (AES); Federal Information Processing Standards Publication 197; National Institute of Standard Technology: Gaithersburg, MD, USA, 2001.
- Rukhin, A.; Soto, J.; Nechvatal, J.; Smid, M.; Barker, E.; Leigh, S.; Levenson, M.; Vangel, M.; Banks, D.; Heckert, A.; et al. Special Publication 800-22 Revision 1: A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2008. [Google Scholar]
- Schneier, B. Applied Cryptography, 2nd ed.; John Wiley and Sons: New York, NY, USA, 1996. [Google Scholar]
- Wang, S.; Hu, G.; Zhou, H. A One-Way Coupled Chaotic Map Lattice Based Self-Synchronizing Stream Cipher. Commun. Nonlinear Sci. Numer. Simul. 2014, 19, 905–913. [Google Scholar] [CrossRef]
- Nagashima, H.; Baba, Y. Intoduction to Chaos, Physics and Mathematics of Chaotic Phenomena; CRC Press: Boca Raton, FL, USA, 1998. [Google Scholar]
- Mao, Y.; Chen, X. An Encryption algorithm of chaos based on sine square mapping. In Proceedings of the Computational Intelligence and Design (ISCID), Fourth International Symposium, Hangzhou, China, 28–30 October 2011; Volume 1, pp. 131–134. [Google Scholar]
- Collett, P.; Eckmann, J.-P. Iterated Maps on the Interval as Dynamical Systems; Birkhauser: Basel, Switzerland, 1980. [Google Scholar]
- Alvarez, G.; Li, S. Some basic cryptographic requirements for chaos-based cryptosystems. Int. J. Bifurc. Chaos 2006, 16, 2129–2151. [Google Scholar] [CrossRef]
- Zhou, Y.; Bao, L.; Chen, C.P. Image encryption using a new parametric switching chaotic system. Signal Process. 2013, 93, 3039–3052. [Google Scholar] [CrossRef]
- Lorenz, E.N. Deterministic non-periodic flow. J. Atmos. Sci. 1963, 20, 130–141. [Google Scholar] [CrossRef]
- Rivest, R.L. Cryptology. In Handbook of Theoretical Computer Science; van Leeuwen, J., Ed.; Elsevier: Amsterdam, The Netherlands, 1990; Volume 1. [Google Scholar]
- Hawkes, P.; Rose, G.G. Guess-and-determine attacks on SNOW. In International Workshop on Selected Areas in Cryptography; Springer: Berlin/Heidelberg, Germany, 2002. [Google Scholar]
Scheme | Length of the Sequence | Number of 0 | Number of 1 | Disequilibrium Degree (%) |
---|---|---|---|---|
(a) | 10,000 | 4517 | 5483 | 9.66 |
50,000 | 22,509 | 27,491 | 9.64 | |
100,000 | 45,085 | 54,915 | 9.83 | |
(b) | 10,000 | 10,000 | 0 | 100 |
50,000 | 50,000 | 0 | 100 | |
100,000 | 100,000 | 0 | 100 | |
(c) | 10,000 | 4797 | 5203 | 4.06 |
50,000 | 23,845 | 26,155 | 4.62 | |
100,000 | 47,843 | 52,157 | 4.31 | |
(d) | 10,000 | 4754 | 5246 | 4.92 |
50,000 | 23,795 | 26,205 | 4.82 | |
100,000 | 47,549 | 52,451 | 4.90 | |
(e) | 10,000 | 4847 | 5153 | 3.06 |
50,000 | 24,245 | 25,755 | 3.02 | |
100,000 | 48,507 | 51,493 | 2.99 | |
(f) | 10,000 | 4851 | 5149 | 2.98 |
50,000 | 24,263 | 25,737 | 2.95 | |
100,000 | 28,559 | 51,441 | 2.88 |
The Proposed Chaotic Stream Cipher | kdr |
---|---|
The original CML based on logistic map | 16.49% |
The original CML based on tent map | 4.27% |
The improved CML based on logistic map | 46.97% |
The improved CML based on tent map | 46.23% |
The compound CML combining both logistic map and tent map in a single stage | 48.68% |
The compound CML combining logistic map and tent map in an alternate stage | 48.82% |
Pass Rate under 20,000 Bits/Sample | ||||
---|---|---|---|---|
Scheme | Monobit Test | Poker Test | Runs Test | Long Run Test |
(a) | 100% | 100% | 100% | 100% |
(b) | 100% | 100% | 100% | 100% |
(c) | 100% | 100% | 100% | 100% |
(d) | 100% | 100% | 100% | 100% |
(a) Improved Four Stage CML Based on Logistic Map | ||
Statistical Tests | p Value | Pass Rate Under 107 Bits/Sample |
Frequency | 0.015521 | 95% |
Block Frequency | 0.182061 | 95% |
Runs | 0.604356 | 99% |
Longest Runs of Ones | 0.123875 | 98% |
Rank | 0.621752 | 97% |
Discrete Fourier Transform | 0.654347 | 96% |
Non-overlapping Templates Matching | 0.410517 | 95% |
Overlapping Templates Matching | 0.570552 | 97% |
Universal Statistical | 0.383693 | 98% |
Linear Complexity | 0.394963 | 97% |
Serial | 0.751610 | 97% |
Approximate Entropy | 0.428403 | 96% |
Cumulative Sums | 0.021606 | 95% |
Random Excursions | 0.458795 | 95% |
Random Excursions Variant | 0.302402 | 95% |
(b) Improved Four Stage CML Based on Tent Map | ||
Statistical Tests | p Value | Pass Rate Under 107 Bits/Sample |
Frequency | 0.026589 | 95% |
Block Frequency | 0.457855 | 96% |
Runs | 0.564585 | 97% |
Longest Runs of Ones | 0.495722 | 95% |
Rank | 0.465132 | 96% |
Discrete Fourier Transform | 0.734127 | 96% |
Non-Overlapping Templates Matching | 0.695132 | 96% |
Overlapping Templates Matching | 0.896535 | 95% |
Universal Statistical | 0.648275 | 97% |
Linear Complexity | 0.574414 | 99% |
Serial | 0.894725 | 98% |
Approximate Entropy | 0.245157 | 98% |
Cumulative Sums | 0.445712 | 95% |
Random Excursions | 0.729454 | 95% |
Random Excursions Variant | 0.655182 | 95% |
(c) Improved Compound CML, Combining both the Logistic Map and Tent Map in a Single Stage | ||
Statistical Tests | p Value | Pass Rate Under 107 Bits/Sample |
Frequency | 0.524101 | 97% |
Block Frequency | 0.801100 | 98% |
Runs | 0.721200 | 98% |
Longest Runs of Ones | 0.520152 | 98% |
Rank | 0.624262 | 99% |
Discrete Fourier Transform | 0.524242 | 99% |
Non-Overlapping Templates Matching | 0.626452 | 97% |
Overlapping Templates Matching | 0.641242 | 99% |
Universal Statistical | 0.742565 | 99% |
Linear Complexity | 0.805249 | 99% |
Serial | 0.712120 | 98% |
Approximate Entropy | 0.645206 | 99% |
Cumulative Sums | 0.601125 | 97% |
Random Excursions | 0.754527 | 97% |
Random Excursions Variant | 0.742442 | 97% |
(d) Improved Compound CML, Combining the Logistic Map and Tent Map in an Alternate Stage | ||
Statistical Tests | p Value | Pass Rate Under 107 Bits/Sample |
Frequency | 0.576401 | 97% |
Block Frequency | 0.845340 | 99% |
Runs | 0.7453410 | 98% |
Longest Runs of Ones | 0.512152 | 98% |
Rank | 0.643612 | 99% |
Discrete Fourier Transform | 0.594534 | 99% |
Non-Overlapping Templates Matching | 0.645241 | 97% |
Overlapping Templates Matching | 0.642042 | 99% |
Universal Statistical | 0.792425 | 100% |
Linear Complexity | 0.804529 | 99% |
Serial | 0.701683 | 99% |
Approximate Entropy | 0.694206 | 100% |
Cumulative Sums | 0.674515 | 97% |
Random Excursions | 0.758657 | 97% |
Random Excursions Variant | 0.764522 | 97% |
Scheme | Methodology | Application |
Ours | Original and counter | Stream cipher |
Zhang et al. [18] | Non-adjacent CML | Image encryption |
Wang et al. [7] | CML and DNA sequence | Image encryption |
Huang et al. [16] | Intermittent jumping CML | Image encryption |
Zhang et al. [17] | Non-adjacent CML | Image encryption |
Wang et al. [20] | Tent-multi dynamic piecewise CML | Image encryption |
Lin et al. [10] | CML and algebraic computation | Stream cipher |
Yin et al. [12] | CML and discretized map | Stream cipher |
Liu et al. [11] | CML, tent chaos and sine function | Stream cipher |
Wang et al. [25] | One-way CML and nonlinear transformation | Stream cipher |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the author. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Wu, S.-T. A Secure Real-Time IoT Data Stream Based on Improved Compound Coupled Map Lattices. Appl. Sci. 2022, 12, 8489. https://doi.org/10.3390/app12178489
Wu S-T. A Secure Real-Time IoT Data Stream Based on Improved Compound Coupled Map Lattices. Applied Sciences. 2022; 12(17):8489. https://doi.org/10.3390/app12178489
Chicago/Turabian StyleWu, Shyi-Tsong. 2022. "A Secure Real-Time IoT Data Stream Based on Improved Compound Coupled Map Lattices" Applied Sciences 12, no. 17: 8489. https://doi.org/10.3390/app12178489
APA StyleWu, S. -T. (2022). A Secure Real-Time IoT Data Stream Based on Improved Compound Coupled Map Lattices. Applied Sciences, 12(17), 8489. https://doi.org/10.3390/app12178489