[HTML][HTML] Enhancing AES using chaos and logistic map-based key generation technique for securing IoT-based smart home

Z Rahman, X Yi, M Billah, M Sumi, A Anwar - Electronics, 2022 - mdpi.com
The Internet of Things (IoT) has brought new ways for humans and machines to
communicate with each other over the internet. Though sensor-driven devices have largely …

An efficient and reliable chaos-based iot security core for udp/ip wireless communication

B Ilyas, SM Raouf, S Abdelkader, T Camel… - IEEE …, 2022 - ieeexplore.ieee.org
The ultimate focus of this paper is to provide a hyperchaos-based reconfigurable platform for
the real-time securing of communicating embedded systems interconnected in networks …

Novel hybrid chaotic map-based secure data transmission between smart meter and HAN devices

L Goel, H Chawla, M Dua, S Dua, D Dhingra - Smart Science, 2024 - Taylor & Francis
Home area network (HAN) devices send the electricity consumption and other important
data to the smart meter that must remain confidential from other devices. This paper …

Provably-secure led block cipher diffusion and confusion based on chaotic maps

HM Al-Saadi, I Alshawi - Informatica, 2023 - informatica.si
Lightweight cryptography algorithms have concentrated on key generation's randomness,
unpredictable nature, and complexity to improve the resistance of ciphers. Therefore, the key …

[PDF][PDF] Efficient and secure hybrid chaotic key generation for light encryption device block cipher

HM Al-Saadi, IS Alshawi - Indonesian Journal of Electrical …, 2023 - academia.edu
Lightweight cryptographic algorithms must develop to ensure the confidentiality and integrity
of the data in resource-constrained devices. Keys are vital to every cryptography algorithm …

[HTML][HTML] Generation Initial Key of the AES Algorithm based on Randomized and Chaotic System

RM Al-Amri, DN Hamood… - Al-Salam Journal for …, 2023 - journal.alsalam.edu.iq
Abstract information security is a critical concern and a top priority for many communications
networks. Cryptography is a suitable method of data security that can be used to maintain …

Labview and embedded system based new iot solution for industrial applications

G Sungur, B Boru - Academic Platform Journal of Engineering and …, 2022 - dergipark.org.tr
The Internet of Things (IoT) is becoming increasingly popular around the world. Efficiency in
terms of time and cost is ensured in all sectors, thanks to the internet of things technology. A …

[PDF][PDF] Securing Game Code using AES and Logistic Map

SE Harfoush - 2023 - researchgate.net
The thesis paper presents a comprehensive investigation into securing game code by
utilizing the advanced encryption standard (AES) and logistic map. The primary aim of this …

[PDF][PDF] Security of IoT: Sine Logistic Map, S-box, and Tan-Bessel Function

HM Zakaria - 2022 - researchgate.net
Abstract Internet of Things (IoT) is currently and widely adopted by many organizations to
allow for a remote, easy transmission of all types of data and information between …

[PDF][PDF] Steganography Based on Chaotic System for Random LSB Positions

RM Al-Amri, DN Hamood, AK Farhan - Wasit Journal of Computer and …, 2022 - iasj.net
The objective of hiding text in an image is hiding text without raising suspicions that the
image contains a hidden message or text, which leads to protecting and maintaining text …