Cryptology ePrint Archive: Report 2022/410

Enhancing AES Using Chaos and Logistic Map-Based Key Generation Technique for Securing IoT-Based Smart Home

Ziaur Rahman and Xun Yi and Mustain Billah and Mousumi Sumi and Adnan Anwar

Abstract: The Internet of Things (IoT) has brought new ways for humans and machines to communicate with each other over the internet. Though sensor-driven devices have largely eased our everyday lives, most IoT infrastructures have been suffering from security challenges. Since the emergence of IoT, lightweight block ciphers have been a better option for intelligent and sensor-based applications. When public-key infrastructure dominates worldwide, the symmetric key encipherment such as Advanced Encryption Standard (AES) shows immense prospects to sit with the smart home IoT appliances. As investigated, chaos motivated logistic map shows enormous potential to secure IoT aligned real-time data communication. The unpredictability and randomness features of the logistic map in sync with chaos-based scheduling techniques can pave the way to build a particular dynamic key propagation technique for data confidentiality, availability and integrity. After being motivated by the security prospects of AES and chaos cryptography, the paper illustrates a key scheduling technique using a 3-dimensional S-box (substitution-box). The logistic map algorithm has been incorporated to enhance security. The proposed approach has applicability for lightweight IoT devices such as smart home appliances. The work determines how seeming chaos accelerates the desired key-initiation before message transmission. The proposed model is evaluated based on the key generation delay required for the smart-home sensor devices.

Category / Keywords: cryptographic protocols / Internet of Things; chaos cryptography; AES modification; key generation matrix; logistic map

Original Publication (with minor differences): MDPI Electronics

Date: received 30 Mar 2022

Contact author: zia at iut-dhaka edu

Available format(s): PDF | BibTeX Citation

Version: 20220331:073235 (All versions of this report)

Short URL:

[ Cryptology ePrint archive ]