scispace - formally typeset
Search or ask a question
Proceedings ArticleDOI

Secure communication using TPC and chaotic encryption

01 Dec 2015-pp 615-620
TL;DR: A new technique for robust and secure wireless transmission of image combining Turbo Product Code (TPC) with chaotic encryption is proposed and it shows that TPC and chaotic combination gives secure transmission with acceptable data rate.
Abstract: Compression, encryption, encoding and modulation at the transmitter side and reverse process at the receiver side are the major processes in any wireless communication system All these steps were carried out separately before But, in 1978 R J McEliece had proposed the concept of combining security and channel encoding techniques together Many schemes are proposed by different researchers for this combine approach Sharing the information securely, but at the same time maintaining acceptable bit error rate in such combine system is difficult In this paper, a new technique for robust and secure wireless transmission of image combining Turbo Product Code (TPC) with chaotic encryption is proposed Logistic map is used for chaotic encryption and TPC for channel encoding Simulation results for this combined system are analyzed and it shows that TPC and chaotic combination gives secure transmission with acceptable data rate
Citations
More filters
Journal ArticleDOI
TL;DR: In this paper, an improved energy-efficient, secure, and privacy-preserving communication protocol for the SHSs is proposed and message authentication codes are incorporated to guarantee data integrity and authenticity.
Abstract: The development of the Internet of Things has made extraordinary progress in recent years in both academic and industrial fields There are quite a few smart home systems (SHSs) that have been developed by major companies to achieve home automation However, the nature of smart homes inevitably raises security and privacy concerns In this paper, we propose an improved energy-efficient, secure, and privacy-preserving communication protocol for the SHSs In our proposed scheme, data transmissions within the SHS are secured by a symmetric encryption scheme with secret keys being generated by chaotic systems Meanwhile, we incorporate message authentication codes to our scheme to guarantee data integrity and authenticity We also provide detailed security analysis and performance evaluation in comparison with our previous work in terms of computational complexity, memory cost, and communication overhead

210 citations


Cites background from "Secure communication using TPC and ..."

  • ...Logistic map is one of the most frequently used chaotic map for its simplicity [40], [42]....

    [...]

Proceedings ArticleDOI
01 Oct 2016
TL;DR: This paper analyzes the differences of security and privacy issues that lie in the smart home systems, smart grid, and wireless sensor networks and proposes their own solutions that achieves privacy preservation during the communications between end sensors and appliances and the controller.
Abstract: Internet of things is the trending direction when it comes to designing smart living environment. One of the popular applications of Internet of things is the smart home system. A smart home system usually consists of various types of connected sensors, actuators, appliances and a controller. The controller analyzes the data reported by the sensors and sends out messages to electric appliances and other sensors to ask them to behave accordingly. There are a lot of smart home designs proposed in the literature to make the systems smarter and more comfortable. However, little work has considered the security and privacy issues in smart home systems. In this paper, we analyze the differences of security and privacy issues that lie in the smart home systems, smart grid, and wireless sensor networks. Further, we propose our own solutions that achieves privacy preservation during the communications between end sensors and appliances and the controller.

124 citations


Cites background from "Secure communication using TPC and ..."

  • ...Logistic map is one of the most frequently used chaotic map for its simplicity [40], [42]....

    [...]

Journal Article
TL;DR: Theoretical bounds on the performance of the HD cipher in terms of security and error correction are derived and it is shown that the proposed HD cipher provides security equivalent to Rijndael cipher against linear and differential cryptanalysis.
Abstract: In this paper we combine the error correction and encryption functionality into one block cipher, which we call High Diffusion (HD) cipher. The error correcting property of this cipher is due to the novel error correction code which we call High Diffusion code used in its diffusion layer. Theoretical bounds on the performance of the HD cipher in terms of security and error correction are derived. We show that the proposed HD cipher provides security equivalent to Rijndael cipher against linear and differential cryptanalysis. Experiments based on a four round HD cipher reveal that traditional concatenated systems using the Rijndael cipher followed by Reed Solomon codes require 89% more expansion to match the performance of HD cipher.

37 citations

Journal ArticleDOI
TL;DR: This paper proposes a communication protocol involving only the symmetric key-based scheme, which provides ultra-lightweight yet effective encryptions to protect the data transmissions and semantically model such protocol and analyze the security properties.
Abstract: While Internet-of-Things (IoT) significantly facilitates the convenience of people's daily life, the lack of security practice raises the risk of privacy-sensitive user data leakage. Securing data transmission among IoT devices is therefore a critical capability of IoT environments such as Intelligent Connected Vehicles, Smart Home, Intelligent City and so forth. However, cryptographic communication scheme is challenged by the limited resource of low-cost IoT devices, even negligible extra CPU usage of battery-powered sensors would result in dramatical decrease of the battery life. In this paper, to minimize the resource consumption, we propose a communication protocol involving only the symmetric key-based scheme, which provides ultra-lightweight yet effective encryptions to protect the data transmissions. Symmetric keys generated in this protocol are delegated based on a chaotic system, i.e., Logistic Map, to resist against the key reset and device capture attacks. We semantically model such protocol and analyze the security properties. Moreover, the resource consumption is also evaluated to guarantee runtime efficacy.

36 citations

Book ChapterDOI
01 Jan 2021
TL;DR: In this article, the design and analysis of a secure and reliable communication system accomplished using logistic map-based chaotic encryption and turbo product codes is presented. But the system is simulated using MATLAB and it is shown that the use of encryption for secure communication does not degrade the system performance.
Abstract: Errors in a transmitted message is unavoidable since noise is inevitable in any communication channel. For reliable transmission of messages, the bit error rate has to be kept at an acceptable rate by the use of proper error control coding schemes. To ensure that the transmission is also secure, data encryption is used as an integral part of the system. This paper deals with the design and analysis of a secure and reliable communication system accomplished using logistic map-based chaotic encryption and turbo product codes. The system is simulated using MATLAB and it is shown that the use of encryption for secure communication does not degrade the system performance. The hardware design of the decoder is also done and verified in Verilog using the same set of vectors as obtained from the system simulation. BER performance was analyzed in all the different scenarios and the correctness of the design was established.

4 citations

References
More filters
Proceedings ArticleDOI
10 Nov 2011
TL;DR: A novel scheme XTR — NR Signature algorithm is theoretically proposed, expecting that it will improve the current security level, fastest speed and provide reliable message recovery at receiver end with respect to key generation, encryption decryption, signing and verification and small key size for SMS application in any kind of mobile device.
Abstract: SMS has a variety of advantages and disadvantages for M-Commerce purpose. The advantages are easy to use, common messaging tool among consumers, works across all wireless operators, affordable for mobile users, no specific software required for installation, allows banks and financial institutions to provide real-time information to consumers & employees, stored messages can be accessed without a network connection. Most important disadvantage of SMS so it does not offer a secure environment for confidential data during transmission and there is no standard procedure to certify the SMS sender. There is a need for an end to end SMS Encryption with errorless message transmission in order to provide a secure with error free data transmission for communication. These two factors are important for SMS. Till now there is no such scheme that provides complete solutions. The transmission of an SMS in GSM network is not secure at all. Therefore it is desirable to fully secure with errorless SMS for business purposes. Both these two issues are researched and dealt separately with sufficient literature available. However these solutions were dealt separately till now. In this paper, we have analyzed about Joint Channel Coding and Cryptography (JCCC), Soft Input Decryption (SID). We theoretically proposed a novel scheme XTR — NR Signature algorithm in this paper. We are expecting that it will improve the current security level, fastest speed and provide reliable message recovery at receiver end with respect to key generation, encryption decryption, signing and verification and small key size for SMS application in any kind of mobile device.

6 citations

Journal Article
TL;DR: A joint encryption-channel coding scheme is developed, based on concatenated turbo codes for more efficient and secure transmission of LEO satellite data.

5 citations

Journal ArticleDOI
TL;DR: This paper introduces an efficient approach of increasing coding gain at the receiver end and uses the advanced encryption standard (AES) cryptographic algorithm as a primary part of channel coding process.
Abstract: A key benefit of channel coding is the ability to protect data against channel impairments. Essentially, the channel coder adds redundancy bits that provide a way to correct corrupted data. Encryption is another way of protecting data against channel impairments and unintended interception or forging. This paper introduces an efficient approach of increasing coding gain at the receiver end. The implemented approach uses the advanced encryption standard (AES) cryptographic algorithm as a primary part of channel coding process. The simulation result of this implemented approach is evaluated in the presence of additive white Gaussian noise (AWGN).

4 citations


"Secure communication using TPC and ..." refers background in this paper

  • ...Mahmoud, Zekry, Hafez and Elgarf had proposed a system of improved channel coding using AES cipher, where security as well as channel coding is achieved [9]....

    [...]

Proceedings ArticleDOI
01 Nov 2013
TL;DR: TPC and advanced encryption standard (AES), is combined together for getting better bit error rate (BER) and promising results are obtained for BER with less complexity.
Abstract: Any communication system will be having an encryption, error correcting block and decryption, decoding block at the transmitter and receiver side respectively But, combining encryption and encoding, is what is the focus in research now a days Multimedia wireless applications are very popular, mainly due to high data rates Majority of encrypted transmission schemes do not consider well the effect of bit errors occurred during transmission and are considered a problem that can be handled by an efficient coding scheme and a proper encryption technique In this paper turbo product code (TPC) and advanced encryption standard (AES), is combined together for getting better bit error rate (BER) TPC used for encoding is an effective technique with reasonable decoding complexity Original information is encoded, encrypted and sent over an AWGN channel using BPSK modulation Promising results are obtained for BER with less complexity So, a wireless data transmission scheme that combines encryption and encoding technique into one processing step can be used for various applications

4 citations