
positively impact the overall security and privacy of
IoT ecosystems.
5 Conclusion
This paper introduced a new approach to
cryptographic key generation for IoT devices by
integrating chaotic systems with neural networks.
Our method addresses the specific security needs of
resource-limited IoT devices while ensuring strong
and efficient key generation. The evaluation of our
chaotic neural key generation algorithm produced
promising outcomes. For example, with a 256-bit
key, we achieved a training accuracy of 92.56% and
a validation accuracy of 91%. Entropy analysis
showed high levels of randomness, with mean
entropy values ranging from 0.86 for 256-bit keys to
0.99 for 1024-bit keys. Correlation testing revealed
an average correlation of -0.005, demonstrating
strong statistical independence between key bits.
Additionally, our method passed all 15 Diehard
statistical tests, proving its ability to generate high-
quality random keys. These findings indicate that
our approach offers an effective solution for secure
key generation in IoT environments. Its balance
between security and efficiency makes it well-suited
for devices with limited computational resources.
References:
[1] A. Whitmore, A. Agarwal, and L. Da Xu, "The
Internet of Things—A survey of topics and
trends," Information Systems Frontiers, vol. 17,
no. 2, pp. 261-274, 2015.
[2] J. Lin, W. Yu, N. Zhang, X. Yang, H. Zhang,
and W. Zhao, "A Survey on Internet of Things:
Architecture, Enabling Technologies, Security
and Privacy, and Applications," IEEE Internet
of Things Journal, vol. 4, no. 5, pp. 1125-1142,
2017.
[3] M. Frustaci, P. Pace, G. Aloi, and G. Fortino,
"Evaluating Critical Security Issues of the IoT
World: Present and Future Challenges," IEEE
Internet of Things Journal, vol. 5, no. 4, pp.
2483-2495, 2018.
[4] S. Sicari, A. Rizzardi, L. A. Grieco, and A.
Coen-Porisini, "Security, privacy and trust in
Internet of Things: The road ahead," Computer
Networks, vol. 76, pp. 146-164, 2015.
[5] K. Sha, W. Wei, T. A. Yang, Z. Wang, and W.
Shi, "On security challenges and open issues in
Internet of Things," Future Generation
Computer Systems, vol. 83, pp. 326-337, 2018.
[6] L. Kocarev, "Chaos-based cryptography: a brief
overview," IEEE Circuits and Systems
Magazine, vol. 1, no. 3, pp. 6-21, 2001.
[7] G. Alvarez and S. Li, "Some basic cryptographic
requirements for chaos-based cryptosystems,"
International Journal of Bifurcation and Chaos,
vol. 16, no. 08, pp. 2129-2151, 2006.
[8] Y. LeCun, Y. Bengio, and G. Hinton, "Deep
learning," Nature, vol. 521, no. 7553, pp. 436-
444, 2015.
[9] W. Diffie and M. Hellman, "New directions in
cryptography," IEEE Transactions on
Information Theory, vol. 22, no. 6, pp. 644-
654, 1976.
[10] C. Li, F. Min, and C. Li, "Multiple coexisting
attractors of the Lorenz system," International
Journal of Bifurcation and Chaos, vol. 29, no.
3, 1950033, 2019.
[11] W. Wang, J. Chen, X. Wang, T. Huang, and L.
Wang, "Encryption Key Generation in IoT
Systems: Current Trends and Challenges,"
IEEE Internet of Things Journal, vol. 8, no. 9,
pp. 7212-7231, 2021.
[12] S. H. Strogatz, "Nonlinear Dynamics and
Chaos: With Applications to Physics, Biology,
Chemistry, and Engineering," CRC Press,
2018.
[13] E. N. Lorenz, "Deterministic Nonperiodic
Flow," Journal of the Atmospheric Sciences,
vol. 20, no. 2, pp. 130-141, 1963.
[14] L. Xiao, Y. Li, G. Han, G. Liu, and W. Zhuang,
"PHY-Layer Spoofing Detection With
Reinforcement Learning in Wireless
Networks," IEEE Transactions on Vehicular
Technology, vol. 65, no. 12, pp. 10037-10047,
2016.
[15] H. Wang, J. Zhao, Y. Zhang, and C. Luo,
"Lightweight Key Generation Scheme for
Edge-enabled IoT Based on CNN and PUF,"
IEEE Internet of Things Journal, vol. 8, no. 10,
pp. 8084-8094, 2021.
[16] Y. Choi, Y. Yeom, and J.-S. Kang. "Practical
Entropy Accumulation for Random Number
Generators with Image Sensor-Based Quantum
Noise Sources", Entropy, vol. 25, no. 7, p.
1056, Jul. 2023
[17] Zhu, H., Zhao, C., Zhang, X., & Yang, L . "A
novel iris and chaos-based random number
generator", Computers & Security, 36, 40-48,
2013.
[18] Axel Gebbert and Andreas Thor, "Usability
Issues of Dieharder for Empirical Testing of
Pseudorandom Number Generators." J. UCS
24(2), pp.130-157, 2018.
International Journal of Electrical Engineering and Computer Science
DOI: 10.37394/232027.2024.6.27
Zied Guitouni, Mohsen Machhout