Chaos and Logistic Map based Key Generation Technique for AES-driven IoT Security.
Ziaur RahmanXun YiIbrahim KhalilMousumi Akter SumiPublished in: CoRR (2021)
Keyphrases
- encryption algorithm
- security problems
- encryption algorithms
- data driven
- security analysis
- key management
- security requirements
- security issues
- cryptographic algorithms
- advanced encryption standard
- security systems
- management system
- intrusion detection
- encryption decryption
- secret key
- information security
- maximum a posteriori
- security level
- data encryption
- pseudorandom
- logistic regression
- high security
- security policies
- network security
- cloud computing
- neural network
- access control
- rfid systems
- security protocols
- encryption scheme
- block cipher
- authentication scheme
- big data
- statistical databases