An Encryption Scheme Using Chaotic Map and Genetic Operations for Wireless Sensor Networks


Over the past decade, the application domain of wireless sensor networks has expanded steadily, ranging from environmental management to industry control, and from structural health monitoring to strategic surveillance. With the proliferation of sensor networks at home, work place, and beyond, securing information in the network has become a challenge. A number of security mechanisms are proposed for sensor networks to produce data confidentiality: 1) advanced encryption system; a pair of) KATAN; three) LED; and 4) TWINE. But, these schemes have drawbacks, including security vulnerabilities, would like for hardware-based implementation, and better computational complexity. To address these limitations, we tend to propose a lightweight block cipher based mostly on chaotic map and genetic operations. The proposed cryptographic theme employs elliptic curve points to verify the communicating nodes and together of the chaotic map parameters to get the pseudorandom bit sequence. This sequence is used in XOR, mutation, and crossover operations in order to encrypt the data blocks. The experimental results based on Mica2 sensor mote show that the proposed encryption theme is 9 times faster than the LED protocol and 2 times faster than the TWINE protocol. We have a tendency to have additionally performed a number of statistical tests and cryptanalytic attacks to judge the safety strength of the algorithm and located the cipher provably secure.

Did you like this research project?

To get this research project Guidelines, Training and Code... Click Here

PROJECT TITLE : ESVSSE Enabling Efficient, Secure, Verifiable Searchable Symmetric Encryption ABSTRACT: It is believed that symmetric searchable encryption, also known as SSE, will solve the problem of privacy in data outsourcing
PROJECT TITLE : Forward Secure Public Key Encryption with Keyword Search for Outsourced Cloud Storage ABSTRACT: Cloud storage has become a primary industry in remote data management services, but it also attracts security concerns.
PROJECT TITLE : Dual-Server Public-Key Authenticated Encryption With Keyword Search ABSTRACT: When using cloud storage, one of the most difficult problems to solve is how to search for sensitive data in a way that is both efficient
PROJECT TITLE : Comparison Of AES 128, 192 And 256 Bit Algorithm For Encryption And Description File ABSTRACT: Humans now rely on technology and communication to complete a variety of tasks swiftly, correctly, and efficiently.
PROJECT TITLE : Cryptanalysis of An Identity-Based Encryption Scheme with Equality Test and Improvement ABSTRACT: For several years, cloud computing privacy has been a source of concern. One of the major concepts in this area

Ready to Complete Your Academic MTech Project Work In Affordable Price ?

Project Enquiry