Skip to main content

Research of Lightweight Encryption Algorithm Based on AES and Chaotic Sequences for Narrow-Band Internet of Things

  • Conference paper
  • First Online:
Machine Learning and Intelligent Communications (MLICOM 2019)

Abstract

Narrow-Band Internet of Things (NB-IoT), as a new LPWAN technology, has been applied in many fields, such as smart meter, smart parking, and so on. However, the security issues have become an important factor restricting rapid development of NB-IoT. A lightweight encryption algorithm based on AES and chaotic sequences (LCHAOSAES) is proposed to solve the data security in NB-IoT applications. Firstly, by reducing the number of AES (Advanced Encryption Standard) rounds and combining the three steps of ‘SubBytes’, ‘ShiftRows’ and ‘MixColumns’, time efficiency of LCHAOSAES is improved. Secondly, in order to make LCHAOSAES more secure, Logistic and Tent chaotic systems are adopted to generate dynamic keys for encryption. Finally, the remaining plaintext is encrypted by the keys, which are generated by Logistic and Tent chaotic systems, so that the length of the plaintext is equal to ciphertext. Theoretical analysis and field experiments performed in NB-IoT scenarios highlight significant performance when compared with, for instance, AES_128, LAES.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. 3GPP Revised Work Item: Narrowband IoT (NB-IoT), 3GPP RP-152284. 3GPP (2015)

    Google Scholar 

  2. Ericsson, Nokia, ZTE, NTT DOCOMO Inc: 3GPP RP-161248, Introduction of NB-IoT in 36.331. 3GPP TSG-RAN Meeting#72, Busan, South Korea, June 2016

    Google Scholar 

  3. 3GPP TR 23.720: Study on architecture enhancements for Cellular Internet of Things (Release 13). 3GPP (2016)

    Google Scholar 

  4. Ratasuk, R., Vejlgaard, B., Mangalvedhe, N., et al.: NB-IoT system for M2M communication. In: IEEE Wireless Communications and Networking Conference Workshops (WCNCW), pp. 1–5. IEEE, Doha (2016)

    Google Scholar 

  5. Lee, J., Kapitanova, K., Son, S.H.: The price of security in wireless sensor networks. Comput. Netw. 54(17), 2967–2978 (2010)

    Article  Google Scholar 

  6. Ben Othman, S., Trad, A., Youssef, H.: Performance evaluation of encryption algorithm for wireless sensor networks. In: International Conference on Information Technology & E-services, pp. 1–8. IEEE, Sousse (2012)

    Google Scholar 

  7. Chen, Q., Chen, Q., Min, Y., et al.: Design of encryption algorithm of data security for Wireless Sensor Network. In: International Conference on Electrical & Control Engineering, pp. 2983–2986. IEEE, Yichang (2011)

    Google Scholar 

  8. Msolli, A., Helali, A., Maaref, H.: Image encryption with the AES algorithm in wireless sensor network. In: International Conference on Advanced Technologies for Signal and Image Processing (ATSIP), pp. 41–45. IEEE, Monastir (2016)

    Google Scholar 

  9. Panda, M.: Data security in wireless sensor networks via AES algorithm. In: International Conference on Intelligent Systems & Control, pp. 1–5. IEEE, Coimbatore (2015)

    Google Scholar 

  10. Yao, Z., Ling, Y.E.: Encryption algorithms for wireless sensor networks based on AES. Comput. Eng. Des. 36(3), 619–623 (2015)

    Google Scholar 

  11. Wei, G., Zhang, H.: The light-weight optimization of AES algorithm and its application in radio frequency identification tag. J. Wuhan Univ. 58(6), 471–476 (2012)

    Google Scholar 

  12. Xi, Z., Li, L., Shi, G., Wang, S.: A comparative study of encryption algorithms in wireless sensor network. In: Zeng, Q.-A. (ed.) Wireless Communications, Networking and Applications. LNEE, vol. 348, pp. 1087–1097. Springer, New Delhi (2016). https://doi.org/10.1007/978-81-322-2580-5_99

    Chapter  Google Scholar 

  13. Osvik, D.A., Bos, J.W., Stefan, D., et al.: Fast software AES encryption. In: Hong, S., Iwata, T. (eds.) FSE 2010. LNCS, vol. 6147, pp. 75–93. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-13858-4_5

    Chapter  Google Scholar 

  14. Babu, T.R., Murthy, K.V.V.S., Sunil, G.: Implementation of AES algorithm on ARM. In: Proceedings of the ICWET 2011 International Conference & Workshop on Emerging Trends in Technology, pp. 1211–1213. ACM, Mumbai (2011)

    Google Scholar 

  15. Ahmed, W., Mahmood, H., Siddique, U.: The efficient implementation of S8 AES algorithm. Lect. Notes Eng. Comput. Sci. 2191(1), 334–339 (2011)

    Google Scholar 

  16. Barnes, A., Fernando, R., Mettananda, K., et al.: Improving the throughput of the AES algorithm with multicore processors. In: International Conference on Industrial and Information Systems (ICIIS), pp. 1–6. IEEE, Chennai (2012)

    Google Scholar 

  17. Wong, M.M., Wong, M.L.D.: New lightweight AES S-box using LFSR. In: International Symposium on Intelligent Signal Processing & Communication Systems, pp. 115–120. IEEE, Kuching (2015)

    Google Scholar 

  18. Hong, C., Yi, C.: Research on AES algorithm based on CHAOS. J. Beijing Technol. Bus. Univ. 27(5), 57–60 (2009)

    Google Scholar 

  19. Chen, D., Qing, D., Wang, D.: AES key expansion algorithm based on 2D logistic mapping. In: Fifth International Workshop on Chaos-fractals Theories & Applications, pp. 207–211. IEEE, Dalian (2012)

    Google Scholar 

  20. Wang, Y., Wang, J.: A new image encryption algorithm based on compound chaotic sequence. In: International Conference on Measurement, pp. 962–966. IEEE, Harbin (2012)

    Google Scholar 

  21. Muhaya, B.F.T.: Chaotic and AES cryptosystem for satellite imagery. Telecommun. Syst. 52(2), 573–581 (2013)

    Google Scholar 

  22. He, C.G., Bao, S.D.: An encryption algorithm based on chaotic system for 3G security authentication. In: Youth Conference on Information, Computing and Telecommunications, pp. 351–354. IEEE, Beijing (2011)

    Google Scholar 

  23. Pradhan, C., Bisoi, A.K.: Chaotic variations of AES algorithm. Int. J. Chaos Control Model. Simul. 2(2), 19–25 (2013)

    Article  Google Scholar 

Download references

Acknowledgements

This work is supported in part by National Natural Science Foundation of China under Grant No. 61672370, 61672369 and 61872257, Natural Science Research Foundation of Jiangsu Higher Education Institutions under Grant No. 17KJB520037 and 17KJB520035, and CERNET Innovation Project under Grant No. NGII20170311.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lianmin Shi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Shi, L., Wang, Y., Jia, R., Peng, T., Jiang, J., Zhu, S. (2019). Research of Lightweight Encryption Algorithm Based on AES and Chaotic Sequences for Narrow-Band Internet of Things. In: Zhai, X., Chen, B., Zhu, K. (eds) Machine Learning and Intelligent Communications. MLICOM 2019. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 294. Springer, Cham. https://doi.org/10.1007/978-3-030-32388-2_23

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-32388-2_23

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-32387-5

  • Online ISBN: 978-3-030-32388-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics