LWLCM: A novel lightweight stream cipher using logistic chaos function and multiplexer for IoT communications
Shahnwaz Afzal,
Mohammad Ubaidullah Bokhari,
Mahfooz Alam,
Mohd Shahid Husain,
Mohammad Zunnun Khan and
Zubair Ashraf
PLOS ONE, 2025, vol. 20, issue 9, 1-38
Abstract:
The Internet of Things (IoT) includes vehicles, homes, and integrated sensors and many interconnected physical devices that gather and share data to interact with their environment. Data moving across multiple levels is vulnerable to various security threats, including leaks and unauthorized access. IoT faces significant challenges in balancing strict security with optimal performance metrics such as energy efficiency, throughput, and memory. We present a novel lightweight stream cipher designed to secure IoT communication and address these challenges. The proposed architecture features four main components: a logistic round module that produces 32-bit chaotic outputs; two 80-bit shift registers, LFSR and NLFSR, for key expansion; and multiplexer units to enhance confusion and diffusion. This model improves the randomness and robustness of the keystream, strengthening the cipher against cryptanalytic attacks. An ablation research is performed by methodically eliminating the chaotic map, NLFSR, and multiplexer components to assess their individual effects on encryption/decryption duration, throughput, entropy, and avalanche analysis. Experimental results demonstrate that each component significantly improves the cipher’s overall performance and security, hence confirming the architecture’s design and also demonstrate that the proposed cipher exceeds the performance of current algorithms, including Grain-128 and RSA-1024, in terms of encryption/decryption time, throughput, and energy efficiency, while maintaining comparable statistical randomness to AES and Trivium. This method achieves an average Shannon entropy of 7.9996, and successfully passing all 15 NIST statistical randomness tests. A subsequent study analyzing the avalanche effect and correlation coefficients reinforces the strength of the encryption. The proposed encryption method, designed for resource-constrained environments, provides efficient and robust cryptographic security to protect IoT data effectively.
Date: 2025
References: Add references at CitEc
Citations:
Downloads: (external link)
https://journals.plos.org/plosone/article?id=10.1371/journal.pone.0330976 (text/html)
https://journals.plos.org/plosone/article/file?id= ... 30976&type=printable (application/pdf)
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:plo:pone00:0330976
DOI: 10.1371/journal.pone.0330976
Access Statistics for this article
More articles in PLOS ONE from Public Library of Science
Bibliographic data for series maintained by plosone ().