SlideShare a Scribd company logo
1 of 13
AN ENCRYPTION SCHEME USING CHAOTIC MAP AND
GENETIC OPERATIONS FOR WIRELESS SENSOR NETWORKS
Presented by
IIS TECHNOLOGIES
No: 40, C-Block,First Floor,HIET Campus,
North Parade Road,St.Thomas Mount,
Chennai, Tamil Nadu 600016.
Landline:044 4263 7391,mob:9952077540.
Email:info@iistechnologies.in,
Web:www.iistechnologies.in
www.iistechnologies.in
Ph: 9952077540
Abstract
• A number of security mechanisms have been proposed for sensor networks to provide data confidentiality:
1) advanced encryption system;
2) KATAN;
3) LED;
4) TWINE.
• However, these schemes have drawbacks, including security vulnerabilities, need for hardware based
implementation, and higher computational complexity.
• To address these limitations, we propose a lightweight block cipher based on chaotic map and genetic
operations.
• The proposed cryptographic scheme employs elliptic curve points to verify the communicating nodes and as
one of the chaotic map parameters to generate the pseudorandom bit sequence.
• This sequence is used in XOR, mutation, and crossover operations in order to encrypt the data blocks.
www.iistechnologies.in
Ph: 9952077540
Existing System
• The Advanced Encryption System (AES) algorithm is a widely used block cipher based on a
substitution-permutation process and has a fixed block size of 128 bits.
• It operates on a 4×4 array of bytes and has a key size of 128, 192, or 256 bits. However, AES
running on 10, 12, and 14 rounds for 128, 192, and 256-bits key respectively is still found
vulnerable by the researchers.
• In addition to security issues, AES is mainly not suitable for WSNs due to the demand for more
hardware resources.
• KATAN and KTANTAN are two block ciphers proposed. Both ciphers use blocks of sizes 32, 48 or 64
bits under 80 bits key and iterate for 254 rounds.
• The main difference between KATAN and KTANTAN is the key scheduling scheme.
• The 80 bits key in KATAN is loaded into a register and is repeatedly clocked, whereas in KTANTAN
the key is fixed.
www.iistechnologies.in
Ph: 9952077540
Disadvantages
www.iistechnologies.in
Ph: 9952077540
• AES is not suitable for WSN
• KATAN and KTANTAN algorithms are more expensive
• Memory consumption
Proposed System
www.iistechnologies.in
Ph: 9952077540
• The proposed scheme includes a number of benefits:
i) it uses the discrete chaotic map, which supports a wider data range with low computational
cost. Most of the encryption schemes use fixed chaotic map parameters to generate the
random bit sequences, but our algorithm uses random values of ‘x’ and ‘y’ for every session
generated by elliptic curve operations;
ii) the proposed crypto-system makes different pseudorandom bit sequences for every session
and thus preserves independent behavioral characteristics of the algorithm;
iii) the scheme is more efficient compared to SkipJack, Advanced Encryption System (AES), LED,
TWINE, and Block Cipher based on Chaos (BCC) in terms of CPU consumption and encryption
time;
iv) the proposed encryption algorithm is suitable for both text and image encryption. From the
application point of view, it is desirable for the crypto-system to protect confidential
information not only in text form but also in image form. Image data differ from text due to
intrinsic features, such as strong correlation between adjacent pixels and high redundancy.
Advantages
• Reduce the memory consumption and energy consumption
• Proposed encryption algorithm is suitable for both text and image encryption
• Provide more security
www.iistechnologies.in
Ph: 9952077540
Block Diagram
www.iistechnologies.in
Ph: 9952077540
Chaotic map and genetic
operations
Use crypto-system
Supports wider data range
Discrete chaotic map
Used to both text and image data
encryption
Robust block cipher
Make pseudorandom sequence
Conclusion
www.iistechnologies.in
Ph: 9952077540
• This project presents a fast, provably secure and robust block cipher for WSN applications.
• The cryptographic scheme incorporates the benefits of elliptic curve operations, chaotic map and
genetic cryptography to provide data confidentiality. T
• he proposed encryption scheme randomly selects different secret keys (xi , yi ) rather than fixed
parameters for every session.
• This mechanism makes the crypto-system harder to break for adversaries. Another advantage of
the proposed cryptographic scheme is the ability to encrypt both text and image data.
• The scheme is thus more suitable for use in multimode sensors.
• Theoretical analyses and experimental results show that the proposed block cipher is provably
secure and is more resource efficient in terms of resource consumption.
Future Work
www.iistechnologies.in
Ph: 9952077540
• In our future work, we will implement the protocol for audio and video encryption.
• Moreover, we plan to implement it in large scale sensor networks to evaluate overall message
throughput and latency.
TOOLS AND SOFTWARE USED
Software
• Network simulator(NS2)
Language
• Object Oriented Tool Command Language(OTCL)
• C++
www.iistechnologies.in
Ph: 9952077540
References
• G. R. Sakthidharan and S. Chitra, “A survey on wireless sensor network: An application
perspective,” in Proc. ICCCI, Jan. 2012, pp. 1–5.
• M. Cazorla, K. Marquet, and M. Minier, “Survey and benchmark of lightweight block ciphers for
WSNs,” in Proc. Int. Conf. Secur. Cryptograph., Jul. 2013, pp. 543–548.
• C. Karlof, N. Sastry, and D. Wagner, “TinySec: A link layer security architecture for wireless sensor
networks,” in Proc. 2nd Int. Conf. SenSys, 2004, pp. 162–175.
• Intel Architecture Software Developer’s Manual, Intel Corporation, Santa Clara, CA, USA, 1997.
• E. Biham, A. Biryukov, and A. Shamir, “Cryptanalysis of skipjack reduced to 31 rounds using
impossible differentials,” J. Cryptol., vol. 18, no. 4, pp. 291–311, 2005.
www.iistechnologies.in
Ph: 9952077540
Services Offered
• Coding with Software’s
• Documents
• Video File
• Skype classes(Online Support)
• Team viewer Support(Online Support)
• Future Enhancement
• Paper writing
• Support For Inter-National Conference paper publication.
www.iistechnologies.in
Ph: 9952077540
Contact
IIS TECHNOLOGIES
No: 40, C-Block,First Floor,HIET Campus,
North Parade Road,St.Thomas Mount,
Chennai, Tamil Nadu 600016.
Landline:044 4263 7391,mob:9952077540.
Email:info@iistechnologies.in,
Web:www.iistechnologies.in
www.iistechnologies.in

More Related Content

Viewers also liked

Image encryption using chaotic sequence and its cryptanalysis
Image encryption using chaotic sequence and its cryptanalysisImage encryption using chaotic sequence and its cryptanalysis
Image encryption using chaotic sequence and its cryptanalysisIOSR Journals
 
М.Г.Гоман (2000) – Динамика нелинейных систем и хаос
М.Г.Гоман (2000) – Динамика нелинейных систем и хаосМ.Г.Гоман (2000) – Динамика нелинейных систем и хаос
М.Г.Гоман (2000) – Динамика нелинейных систем и хаосProject KRIT
 
Secured data hiding by using extended visual cryptography
Secured data hiding by using extended visual cryptographySecured data hiding by using extended visual cryptography
Secured data hiding by using extended visual cryptographyeSAT Journals
 
Image encryption and decryption using aes algorithm
Image encryption and decryption using aes algorithmImage encryption and decryption using aes algorithm
Image encryption and decryption using aes algorithmIAEME Publication
 
Next generation block ciphers
Next generation block ciphersNext generation block ciphers
Next generation block ciphersRoman Oliynykov
 
Encryption & Decryption of Sound in image format on Matlab
Encryption & Decryption of Sound in image format on MatlabEncryption & Decryption of Sound in image format on Matlab
Encryption & Decryption of Sound in image format on MatlabMuhammad Saif Ul Islam
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansionSreeda Perikamana
 
PHYSICAL MAPPING STRATEGIES IN GENOMICS
PHYSICAL MAPPING STRATEGIES IN GENOMICSPHYSICAL MAPPING STRATEGIES IN GENOMICS
PHYSICAL MAPPING STRATEGIES IN GENOMICSUsman Arshad
 
Regulation of gene expression saranya
Regulation of gene expression saranyaRegulation of gene expression saranya
Regulation of gene expression saranyaSaranya Sankar
 
Regulation of eukaryotic gene expression
Regulation of eukaryotic gene expressionRegulation of eukaryotic gene expression
Regulation of eukaryotic gene expressionMd Murad Khan
 
Yeast Artificial Chromosome (YAC)
Yeast Artificial Chromosome (YAC)Yeast Artificial Chromosome (YAC)
Yeast Artificial Chromosome (YAC)Amna Jalil
 
Proteolysis, protein degradation and turnover
Proteolysis, protein degradation and turnoverProteolysis, protein degradation and turnover
Proteolysis, protein degradation and turnoveremicica
 
Yeast Artificial Chromosomes (YACs)
Yeast Artificial Chromosomes (YACs)Yeast Artificial Chromosomes (YACs)
Yeast Artificial Chromosomes (YACs)Amna Jalil
 
genome mapping
genome mappinggenome mapping
genome mappingSuresh San
 

Viewers also liked (20)

Image encryption using chaotic sequence and its cryptanalysis
Image encryption using chaotic sequence and its cryptanalysisImage encryption using chaotic sequence and its cryptanalysis
Image encryption using chaotic sequence and its cryptanalysis
 
Jammer
JammerJammer
Jammer
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Sacolloq
SacolloqSacolloq
Sacolloq
 
М.Г.Гоман (2000) – Динамика нелинейных систем и хаос
М.Г.Гоман (2000) – Динамика нелинейных систем и хаосМ.Г.Гоман (2000) – Динамика нелинейных систем и хаос
М.Г.Гоман (2000) – Динамика нелинейных систем и хаос
 
Secured data hiding by using extended visual cryptography
Secured data hiding by using extended visual cryptographySecured data hiding by using extended visual cryptography
Secured data hiding by using extended visual cryptography
 
Image encryption and decryption using aes algorithm
Image encryption and decryption using aes algorithmImage encryption and decryption using aes algorithm
Image encryption and decryption using aes algorithm
 
Next generation block ciphers
Next generation block ciphersNext generation block ciphers
Next generation block ciphers
 
Encryption & Decryption of Sound in image format on Matlab
Encryption & Decryption of Sound in image format on MatlabEncryption & Decryption of Sound in image format on Matlab
Encryption & Decryption of Sound in image format on Matlab
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansion
 
PHYSICAL MAPPING STRATEGIES IN GENOMICS
PHYSICAL MAPPING STRATEGIES IN GENOMICSPHYSICAL MAPPING STRATEGIES IN GENOMICS
PHYSICAL MAPPING STRATEGIES IN GENOMICS
 
Cryptography
CryptographyCryptography
Cryptography
 
Regulation of gene expression saranya
Regulation of gene expression saranyaRegulation of gene expression saranya
Regulation of gene expression saranya
 
Ubiquitin proteolytic system
Ubiquitin proteolytic systemUbiquitin proteolytic system
Ubiquitin proteolytic system
 
Regulation of eukaryotic gene expression
Regulation of eukaryotic gene expressionRegulation of eukaryotic gene expression
Regulation of eukaryotic gene expression
 
Yeast Artificial Chromosome (YAC)
Yeast Artificial Chromosome (YAC)Yeast Artificial Chromosome (YAC)
Yeast Artificial Chromosome (YAC)
 
Proteolysis, protein degradation and turnover
Proteolysis, protein degradation and turnoverProteolysis, protein degradation and turnover
Proteolysis, protein degradation and turnover
 
Yeast Artificial Chromosomes (YACs)
Yeast Artificial Chromosomes (YACs)Yeast Artificial Chromosomes (YACs)
Yeast Artificial Chromosomes (YACs)
 
Genetic engineering and recombinant DNA technology
Genetic engineering and recombinant DNA  technologyGenetic engineering and recombinant DNA  technology
Genetic engineering and recombinant DNA technology
 
genome mapping
genome mappinggenome mapping
genome mapping
 

More from IISTech2015

A virtual synchronous machine implementation for distributed control of power...
A virtual synchronous machine implementation for distributed control of power...A virtual synchronous machine implementation for distributed control of power...
A virtual synchronous machine implementation for distributed control of power...IISTech2015
 
Versatile control of unidirectional ac–dc boost converters for power quality ...
Versatile control of unidirectional ac–dc boost converters for power quality ...Versatile control of unidirectional ac–dc boost converters for power quality ...
Versatile control of unidirectional ac–dc boost converters for power quality ...IISTech2015
 
Novel modular multiple input bidirectional dc–dc power converter (mipc) for h...
Novel modular multiple input bidirectional dc–dc power converter (mipc) for h...Novel modular multiple input bidirectional dc–dc power converter (mipc) for h...
Novel modular multiple input bidirectional dc–dc power converter (mipc) for h...IISTech2015
 
A bidirectional llc resonant converter with automatic forward and backward mo...
A bidirectional llc resonant converter with automatic forward and backward mo...A bidirectional llc resonant converter with automatic forward and backward mo...
A bidirectional llc resonant converter with automatic forward and backward mo...IISTech2015
 
Optimal configuration of network coding in ad hoc networks
Optimal configuration of network coding in ad hoc networksOptimal configuration of network coding in ad hoc networks
Optimal configuration of network coding in ad hoc networksIISTech2015
 
Vanet modeling and clustering design under practical traffic, channel and mob...
Vanet modeling and clustering design under practical traffic, channel and mob...Vanet modeling and clustering design under practical traffic, channel and mob...
Vanet modeling and clustering design under practical traffic, channel and mob...IISTech2015
 
Real time path planning based on hybrid vanet enhanced transportation system
Real time path planning based on hybrid vanet enhanced transportation systemReal time path planning based on hybrid vanet enhanced transportation system
Real time path planning based on hybrid vanet enhanced transportation systemIISTech2015
 
Defending against collaborative attacks by malicious nodes in manets a cooper...
Defending against collaborative attacks by malicious nodes in manets a cooper...Defending against collaborative attacks by malicious nodes in manets a cooper...
Defending against collaborative attacks by malicious nodes in manets a cooper...IISTech2015
 
Cooperative load balancing and dynamic channel allocation for cluster based m...
Cooperative load balancing and dynamic channel allocation for cluster based m...Cooperative load balancing and dynamic channel allocation for cluster based m...
Cooperative load balancing and dynamic channel allocation for cluster based m...IISTech2015
 
An efficient distributed trust model for wireless sensor networks
An efficient distributed trust model for wireless sensor networksAn efficient distributed trust model for wireless sensor networks
An efficient distributed trust model for wireless sensor networksIISTech2015
 
2015-2016 IEEE Project Titles
2015-2016 IEEE Project Titles2015-2016 IEEE Project Titles
2015-2016 IEEE Project TitlesIISTech2015
 
Architecture of fpga embedded multiprocessor programmable controller
Architecture of fpga embedded multiprocessor programmable controllerArchitecture of fpga embedded multiprocessor programmable controller
Architecture of fpga embedded multiprocessor programmable controllerIISTech2015
 
The Delta Configured Modular Multilevel Converter
The Delta Configured Modular Multilevel ConverterThe Delta Configured Modular Multilevel Converter
The Delta Configured Modular Multilevel ConverterIISTech2015
 
Modular Cascaded H-Bridge Multilevel PV Inverter with Distributed MPPT for Gr...
Modular Cascaded H-Bridge Multilevel PV Inverter with Distributed MPPT for Gr...Modular Cascaded H-Bridge Multilevel PV Inverter with Distributed MPPT for Gr...
Modular Cascaded H-Bridge Multilevel PV Inverter with Distributed MPPT for Gr...IISTech2015
 
Input-Series–Output-Parallel-Connected Buck Rectifiers for High-Voltage Appli...
Input-Series–Output-Parallel-Connected Buck Rectifiers for High-Voltage Appli...Input-Series–Output-Parallel-Connected Buck Rectifiers for High-Voltage Appli...
Input-Series–Output-Parallel-Connected Buck Rectifiers for High-Voltage Appli...IISTech2015
 
Bridgeless PFC-Modified SEPIC Rectifier With Extended Gain for Universal Inpu...
Bridgeless PFC-Modified SEPIC Rectifier With Extended Gain for Universal Inpu...Bridgeless PFC-Modified SEPIC Rectifier With Extended Gain for Universal Inpu...
Bridgeless PFC-Modified SEPIC Rectifier With Extended Gain for Universal Inpu...IISTech2015
 
Analysis of Dual-Carrier Modulator for Bidirectional Non inverting Buck–Boost...
Analysis of Dual-Carrier Modulator for Bidirectional Non inverting Buck–Boost...Analysis of Dual-Carrier Modulator for Bidirectional Non inverting Buck–Boost...
Analysis of Dual-Carrier Modulator for Bidirectional Non inverting Buck–Boost...IISTech2015
 
Analysis and impacts of implementing
Analysis and impacts of implementing    Analysis and impacts of implementing
Analysis and impacts of implementing IISTech2015
 
A novel drive method for high speed brushless
A novel drive method for high speed brushless  A novel drive method for high speed brushless
A novel drive method for high speed brushless IISTech2015
 
A Multi-Input Bridgeless Resonant AC-DC Converter for Electromagnetic Energy ...
A Multi-Input Bridgeless Resonant AC-DC Converter for Electromagnetic Energy ...A Multi-Input Bridgeless Resonant AC-DC Converter for Electromagnetic Energy ...
A Multi-Input Bridgeless Resonant AC-DC Converter for Electromagnetic Energy ...IISTech2015
 

More from IISTech2015 (20)

A virtual synchronous machine implementation for distributed control of power...
A virtual synchronous machine implementation for distributed control of power...A virtual synchronous machine implementation for distributed control of power...
A virtual synchronous machine implementation for distributed control of power...
 
Versatile control of unidirectional ac–dc boost converters for power quality ...
Versatile control of unidirectional ac–dc boost converters for power quality ...Versatile control of unidirectional ac–dc boost converters for power quality ...
Versatile control of unidirectional ac–dc boost converters for power quality ...
 
Novel modular multiple input bidirectional dc–dc power converter (mipc) for h...
Novel modular multiple input bidirectional dc–dc power converter (mipc) for h...Novel modular multiple input bidirectional dc–dc power converter (mipc) for h...
Novel modular multiple input bidirectional dc–dc power converter (mipc) for h...
 
A bidirectional llc resonant converter with automatic forward and backward mo...
A bidirectional llc resonant converter with automatic forward and backward mo...A bidirectional llc resonant converter with automatic forward and backward mo...
A bidirectional llc resonant converter with automatic forward and backward mo...
 
Optimal configuration of network coding in ad hoc networks
Optimal configuration of network coding in ad hoc networksOptimal configuration of network coding in ad hoc networks
Optimal configuration of network coding in ad hoc networks
 
Vanet modeling and clustering design under practical traffic, channel and mob...
Vanet modeling and clustering design under practical traffic, channel and mob...Vanet modeling and clustering design under practical traffic, channel and mob...
Vanet modeling and clustering design under practical traffic, channel and mob...
 
Real time path planning based on hybrid vanet enhanced transportation system
Real time path planning based on hybrid vanet enhanced transportation systemReal time path planning based on hybrid vanet enhanced transportation system
Real time path planning based on hybrid vanet enhanced transportation system
 
Defending against collaborative attacks by malicious nodes in manets a cooper...
Defending against collaborative attacks by malicious nodes in manets a cooper...Defending against collaborative attacks by malicious nodes in manets a cooper...
Defending against collaborative attacks by malicious nodes in manets a cooper...
 
Cooperative load balancing and dynamic channel allocation for cluster based m...
Cooperative load balancing and dynamic channel allocation for cluster based m...Cooperative load balancing and dynamic channel allocation for cluster based m...
Cooperative load balancing and dynamic channel allocation for cluster based m...
 
An efficient distributed trust model for wireless sensor networks
An efficient distributed trust model for wireless sensor networksAn efficient distributed trust model for wireless sensor networks
An efficient distributed trust model for wireless sensor networks
 
2015-2016 IEEE Project Titles
2015-2016 IEEE Project Titles2015-2016 IEEE Project Titles
2015-2016 IEEE Project Titles
 
Architecture of fpga embedded multiprocessor programmable controller
Architecture of fpga embedded multiprocessor programmable controllerArchitecture of fpga embedded multiprocessor programmable controller
Architecture of fpga embedded multiprocessor programmable controller
 
The Delta Configured Modular Multilevel Converter
The Delta Configured Modular Multilevel ConverterThe Delta Configured Modular Multilevel Converter
The Delta Configured Modular Multilevel Converter
 
Modular Cascaded H-Bridge Multilevel PV Inverter with Distributed MPPT for Gr...
Modular Cascaded H-Bridge Multilevel PV Inverter with Distributed MPPT for Gr...Modular Cascaded H-Bridge Multilevel PV Inverter with Distributed MPPT for Gr...
Modular Cascaded H-Bridge Multilevel PV Inverter with Distributed MPPT for Gr...
 
Input-Series–Output-Parallel-Connected Buck Rectifiers for High-Voltage Appli...
Input-Series–Output-Parallel-Connected Buck Rectifiers for High-Voltage Appli...Input-Series–Output-Parallel-Connected Buck Rectifiers for High-Voltage Appli...
Input-Series–Output-Parallel-Connected Buck Rectifiers for High-Voltage Appli...
 
Bridgeless PFC-Modified SEPIC Rectifier With Extended Gain for Universal Inpu...
Bridgeless PFC-Modified SEPIC Rectifier With Extended Gain for Universal Inpu...Bridgeless PFC-Modified SEPIC Rectifier With Extended Gain for Universal Inpu...
Bridgeless PFC-Modified SEPIC Rectifier With Extended Gain for Universal Inpu...
 
Analysis of Dual-Carrier Modulator for Bidirectional Non inverting Buck–Boost...
Analysis of Dual-Carrier Modulator for Bidirectional Non inverting Buck–Boost...Analysis of Dual-Carrier Modulator for Bidirectional Non inverting Buck–Boost...
Analysis of Dual-Carrier Modulator for Bidirectional Non inverting Buck–Boost...
 
Analysis and impacts of implementing
Analysis and impacts of implementing    Analysis and impacts of implementing
Analysis and impacts of implementing
 
A novel drive method for high speed brushless
A novel drive method for high speed brushless  A novel drive method for high speed brushless
A novel drive method for high speed brushless
 
A Multi-Input Bridgeless Resonant AC-DC Converter for Electromagnetic Energy ...
A Multi-Input Bridgeless Resonant AC-DC Converter for Electromagnetic Energy ...A Multi-Input Bridgeless Resonant AC-DC Converter for Electromagnetic Energy ...
A Multi-Input Bridgeless Resonant AC-DC Converter for Electromagnetic Energy ...
 

An encryption scheme using chaotic map and genetic operations for wireless sensor networks

  • 1. AN ENCRYPTION SCHEME USING CHAOTIC MAP AND GENETIC OPERATIONS FOR WIRELESS SENSOR NETWORKS Presented by IIS TECHNOLOGIES No: 40, C-Block,First Floor,HIET Campus, North Parade Road,St.Thomas Mount, Chennai, Tamil Nadu 600016. Landline:044 4263 7391,mob:9952077540. Email:info@iistechnologies.in, Web:www.iistechnologies.in www.iistechnologies.in Ph: 9952077540
  • 2. Abstract • A number of security mechanisms have been proposed for sensor networks to provide data confidentiality: 1) advanced encryption system; 2) KATAN; 3) LED; 4) TWINE. • However, these schemes have drawbacks, including security vulnerabilities, need for hardware based implementation, and higher computational complexity. • To address these limitations, we propose a lightweight block cipher based on chaotic map and genetic operations. • The proposed cryptographic scheme employs elliptic curve points to verify the communicating nodes and as one of the chaotic map parameters to generate the pseudorandom bit sequence. • This sequence is used in XOR, mutation, and crossover operations in order to encrypt the data blocks. www.iistechnologies.in Ph: 9952077540
  • 3. Existing System • The Advanced Encryption System (AES) algorithm is a widely used block cipher based on a substitution-permutation process and has a fixed block size of 128 bits. • It operates on a 4×4 array of bytes and has a key size of 128, 192, or 256 bits. However, AES running on 10, 12, and 14 rounds for 128, 192, and 256-bits key respectively is still found vulnerable by the researchers. • In addition to security issues, AES is mainly not suitable for WSNs due to the demand for more hardware resources. • KATAN and KTANTAN are two block ciphers proposed. Both ciphers use blocks of sizes 32, 48 or 64 bits under 80 bits key and iterate for 254 rounds. • The main difference between KATAN and KTANTAN is the key scheduling scheme. • The 80 bits key in KATAN is loaded into a register and is repeatedly clocked, whereas in KTANTAN the key is fixed. www.iistechnologies.in Ph: 9952077540
  • 4. Disadvantages www.iistechnologies.in Ph: 9952077540 • AES is not suitable for WSN • KATAN and KTANTAN algorithms are more expensive • Memory consumption
  • 5. Proposed System www.iistechnologies.in Ph: 9952077540 • The proposed scheme includes a number of benefits: i) it uses the discrete chaotic map, which supports a wider data range with low computational cost. Most of the encryption schemes use fixed chaotic map parameters to generate the random bit sequences, but our algorithm uses random values of ‘x’ and ‘y’ for every session generated by elliptic curve operations; ii) the proposed crypto-system makes different pseudorandom bit sequences for every session and thus preserves independent behavioral characteristics of the algorithm; iii) the scheme is more efficient compared to SkipJack, Advanced Encryption System (AES), LED, TWINE, and Block Cipher based on Chaos (BCC) in terms of CPU consumption and encryption time; iv) the proposed encryption algorithm is suitable for both text and image encryption. From the application point of view, it is desirable for the crypto-system to protect confidential information not only in text form but also in image form. Image data differ from text due to intrinsic features, such as strong correlation between adjacent pixels and high redundancy.
  • 6. Advantages • Reduce the memory consumption and energy consumption • Proposed encryption algorithm is suitable for both text and image encryption • Provide more security www.iistechnologies.in Ph: 9952077540
  • 7. Block Diagram www.iistechnologies.in Ph: 9952077540 Chaotic map and genetic operations Use crypto-system Supports wider data range Discrete chaotic map Used to both text and image data encryption Robust block cipher Make pseudorandom sequence
  • 8. Conclusion www.iistechnologies.in Ph: 9952077540 • This project presents a fast, provably secure and robust block cipher for WSN applications. • The cryptographic scheme incorporates the benefits of elliptic curve operations, chaotic map and genetic cryptography to provide data confidentiality. T • he proposed encryption scheme randomly selects different secret keys (xi , yi ) rather than fixed parameters for every session. • This mechanism makes the crypto-system harder to break for adversaries. Another advantage of the proposed cryptographic scheme is the ability to encrypt both text and image data. • The scheme is thus more suitable for use in multimode sensors. • Theoretical analyses and experimental results show that the proposed block cipher is provably secure and is more resource efficient in terms of resource consumption.
  • 9. Future Work www.iistechnologies.in Ph: 9952077540 • In our future work, we will implement the protocol for audio and video encryption. • Moreover, we plan to implement it in large scale sensor networks to evaluate overall message throughput and latency.
  • 10. TOOLS AND SOFTWARE USED Software • Network simulator(NS2) Language • Object Oriented Tool Command Language(OTCL) • C++ www.iistechnologies.in Ph: 9952077540
  • 11. References • G. R. Sakthidharan and S. Chitra, “A survey on wireless sensor network: An application perspective,” in Proc. ICCCI, Jan. 2012, pp. 1–5. • M. Cazorla, K. Marquet, and M. Minier, “Survey and benchmark of lightweight block ciphers for WSNs,” in Proc. Int. Conf. Secur. Cryptograph., Jul. 2013, pp. 543–548. • C. Karlof, N. Sastry, and D. Wagner, “TinySec: A link layer security architecture for wireless sensor networks,” in Proc. 2nd Int. Conf. SenSys, 2004, pp. 162–175. • Intel Architecture Software Developer’s Manual, Intel Corporation, Santa Clara, CA, USA, 1997. • E. Biham, A. Biryukov, and A. Shamir, “Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials,” J. Cryptol., vol. 18, no. 4, pp. 291–311, 2005. www.iistechnologies.in Ph: 9952077540
  • 12. Services Offered • Coding with Software’s • Documents • Video File • Skype classes(Online Support) • Team viewer Support(Online Support) • Future Enhancement • Paper writing • Support For Inter-National Conference paper publication. www.iistechnologies.in Ph: 9952077540
  • 13. Contact IIS TECHNOLOGIES No: 40, C-Block,First Floor,HIET Campus, North Parade Road,St.Thomas Mount, Chennai, Tamil Nadu 600016. Landline:044 4263 7391,mob:9952077540. Email:info@iistechnologies.in, Web:www.iistechnologies.in www.iistechnologies.in