2021
DOI: 10.1007/978-3-030-91424-0_11
|View full text |Cite
|
Sign up to set email alerts
|

Chaos and Logistic Map Based Key Generation Technique for AES-Driven IoT Security

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
8
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
8
1

Relationship

1
8

Authors

Journals

citations
Cited by 10 publications
(8 citation statements)
references
References 32 publications
0
8
0
Order By: Relevance
“…Even if the protocol is known, if the key is not known, it cannot be interrupted and the communication is rendered undecipherable. This process has become an IoT security solution suitable for today's crypto technology [16].…”
Section: Data Encryptionmentioning
confidence: 99%
“…Even if the protocol is known, if the key is not known, it cannot be interrupted and the communication is rendered undecipherable. This process has become an IoT security solution suitable for today's crypto technology [16].…”
Section: Data Encryptionmentioning
confidence: 99%
“…In Rahman et al [13], a particular security technique was proposed to enhance security and preserve the integrity of much data transmitted within an IoT system. The authors suggest this technique be applied to an IoT cluster head.…”
Section: Introductionmentioning
confidence: 99%
“…As a result, utilizing standard AES for crucial and real-time data protection poses a risk to data integrity. So, in our previous work [5], we combined chaos with 3DKGM [6] to overcome the drawbacks of the conventional AES. As per the evaluation conducted, the proposed technique seems to have a convincing outcome to enhance IoT security.…”
Section: Introductionmentioning
confidence: 99%