High Impact Factor : 4.396 icon | Submit Manuscript Online icon |

Wireless Sensor Networks Encryption Scheme using Chaotic Map and Genetic Operations


R. Sarathkumar Kithiyon , Chandy College of Engineering; C. Karuppasami, Chandy College of Engineering; S. Immanuel Prabaharan, Chandy College of Engineering; A. Samsu Nighar, Chandy College of Engineering


Wireless sensor network, pseudorandom bit sequence generator, data encryption, elliptic curve, chaotic map, mutation, crossover


Over the past decade, the application domain of wireless sensor networks has expanded steadily, ranging from environmental management to industry control, and from structural health monitoring to strategic surveillance. With the proliferation of sensor networks at home, work place, and beyond, securing data in the network has become a challenge. A number of security mechanisms have been proposed for sensor networks to provide data confidentiality: 1) advanced encryption system; 2) KATAN; 3) LED; and 4) TWINE. However, these schemes have drawbacks, including security vulnerabilities, need for hardware based implementation, and higher computational complexity. To address these limitations, we propose a lightweight block cipher based on chaotic map and genetic operations. The proposed cryptographic scheme employs elliptic curve points to verify the communicating nodes and as one of the chaotic map parameters to generate the pseudorandom bit sequence. This sequence is used in XOR, mutation, and crossover operations in order to encrypt the data blocks. The experimental results based on Mica2 sensor mote show that the proposed encryption scheme is nine times faster than the LED protocol and two times faster than the TWINE protocol. We have also performed a number of statistical tests and cryptanalytic attacks to evaluate the security strength of the algorithm and found the cipher provably secure.

Other Details

Paper ID: IJSRDV4I90493
Published in: Volume : 4, Issue : 9
Publication Date: 01/12/2016
Page(s): 730-737

Article Preview

Download Article