Abstract
Narrow-Band Internet of Things (NB-IoT), as a new LPWAN technology, has been applied in many fields, such as smart meter, smart parking, and so on. However, the security issues have become an important factor restricting rapid development of NB-IoT. A lightweight encryption algorithm based on AES and chaotic sequences (LCHAOSAES) is proposed to solve the data security in NB-IoT applications. Firstly, by reducing the number of AES (Advanced Encryption Standard) rounds and combining the three steps of ‘SubBytes’, ‘ShiftRows’ and ‘MixColumns’, time efficiency of LCHAOSAES is improved. Secondly, in order to make LCHAOSAES more secure, Logistic and Tent chaotic systems are adopted to generate dynamic keys for encryption. Finally, the remaining plaintext is encrypted by the keys, which are generated by Logistic and Tent chaotic systems, so that the length of the plaintext is equal to ciphertext. Theoretical analysis and field experiments performed in NB-IoT scenarios highlight significant performance when compared with, for instance, AES_128, LAES.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
3GPP Revised Work Item: Narrowband IoT (NB-IoT), 3GPP RP-152284. 3GPP (2015)
Ericsson, Nokia, ZTE, NTT DOCOMO Inc: 3GPP RP-161248, Introduction of NB-IoT in 36.331. 3GPP TSG-RAN Meeting#72, Busan, South Korea, June 2016
3GPP TR 23.720: Study on architecture enhancements for Cellular Internet of Things (Release 13). 3GPP (2016)
Ratasuk, R., Vejlgaard, B., Mangalvedhe, N., et al.: NB-IoT system for M2M communication. In: IEEE Wireless Communications and Networking Conference Workshops (WCNCW), pp. 1–5. IEEE, Doha (2016)
Lee, J., Kapitanova, K., Son, S.H.: The price of security in wireless sensor networks. Comput. Netw. 54(17), 2967–2978 (2010)
Ben Othman, S., Trad, A., Youssef, H.: Performance evaluation of encryption algorithm for wireless sensor networks. In: International Conference on Information Technology & E-services, pp. 1–8. IEEE, Sousse (2012)
Chen, Q., Chen, Q., Min, Y., et al.: Design of encryption algorithm of data security for Wireless Sensor Network. In: International Conference on Electrical & Control Engineering, pp. 2983–2986. IEEE, Yichang (2011)
Msolli, A., Helali, A., Maaref, H.: Image encryption with the AES algorithm in wireless sensor network. In: International Conference on Advanced Technologies for Signal and Image Processing (ATSIP), pp. 41–45. IEEE, Monastir (2016)
Panda, M.: Data security in wireless sensor networks via AES algorithm. In: International Conference on Intelligent Systems & Control, pp. 1–5. IEEE, Coimbatore (2015)
Yao, Z., Ling, Y.E.: Encryption algorithms for wireless sensor networks based on AES. Comput. Eng. Des. 36(3), 619–623 (2015)
Wei, G., Zhang, H.: The light-weight optimization of AES algorithm and its application in radio frequency identification tag. J. Wuhan Univ. 58(6), 471–476 (2012)
Xi, Z., Li, L., Shi, G., Wang, S.: A comparative study of encryption algorithms in wireless sensor network. In: Zeng, Q.-A. (ed.) Wireless Communications, Networking and Applications. LNEE, vol. 348, pp. 1087–1097. Springer, New Delhi (2016). https://doi.org/10.1007/978-81-322-2580-5_99
Osvik, D.A., Bos, J.W., Stefan, D., et al.: Fast software AES encryption. In: Hong, S., Iwata, T. (eds.) FSE 2010. LNCS, vol. 6147, pp. 75–93. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-13858-4_5
Babu, T.R., Murthy, K.V.V.S., Sunil, G.: Implementation of AES algorithm on ARM. In: Proceedings of the ICWET 2011 International Conference & Workshop on Emerging Trends in Technology, pp. 1211–1213. ACM, Mumbai (2011)
Ahmed, W., Mahmood, H., Siddique, U.: The efficient implementation of S8 AES algorithm. Lect. Notes Eng. Comput. Sci. 2191(1), 334–339 (2011)
Barnes, A., Fernando, R., Mettananda, K., et al.: Improving the throughput of the AES algorithm with multicore processors. In: International Conference on Industrial and Information Systems (ICIIS), pp. 1–6. IEEE, Chennai (2012)
Wong, M.M., Wong, M.L.D.: New lightweight AES S-box using LFSR. In: International Symposium on Intelligent Signal Processing & Communication Systems, pp. 115–120. IEEE, Kuching (2015)
Hong, C., Yi, C.: Research on AES algorithm based on CHAOS. J. Beijing Technol. Bus. Univ. 27(5), 57–60 (2009)
Chen, D., Qing, D., Wang, D.: AES key expansion algorithm based on 2D logistic mapping. In: Fifth International Workshop on Chaos-fractals Theories & Applications, pp. 207–211. IEEE, Dalian (2012)
Wang, Y., Wang, J.: A new image encryption algorithm based on compound chaotic sequence. In: International Conference on Measurement, pp. 962–966. IEEE, Harbin (2012)
Muhaya, B.F.T.: Chaotic and AES cryptosystem for satellite imagery. Telecommun. Syst. 52(2), 573–581 (2013)
He, C.G., Bao, S.D.: An encryption algorithm based on chaotic system for 3G security authentication. In: Youth Conference on Information, Computing and Telecommunications, pp. 351–354. IEEE, Beijing (2011)
Pradhan, C., Bisoi, A.K.: Chaotic variations of AES algorithm. Int. J. Chaos Control Model. Simul. 2(2), 19–25 (2013)
Acknowledgements
This work is supported in part by National Natural Science Foundation of China under Grant No. 61672370, 61672369 and 61872257, Natural Science Research Foundation of Jiangsu Higher Education Institutions under Grant No. 17KJB520037 and 17KJB520035, and CERNET Innovation Project under Grant No. NGII20170311.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Shi, L., Wang, Y., Jia, R., Peng, T., Jiang, J., Zhu, S. (2019). Research of Lightweight Encryption Algorithm Based on AES and Chaotic Sequences for Narrow-Band Internet of Things. In: Zhai, X., Chen, B., Zhu, K. (eds) Machine Learning and Intelligent Communications. MLICOM 2019. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 294. Springer, Cham. https://doi.org/10.1007/978-3-030-32388-2_23
Download citation
DOI: https://doi.org/10.1007/978-3-030-32388-2_23
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-32387-5
Online ISBN: 978-3-030-32388-2
eBook Packages: Computer ScienceComputer Science (R0)