Skip to main content

A Chaotic Cryptographic Solution for Low-Range Wireless Communications in Industry 4.0

  • Conference paper
  • First Online:
New Knowledge in Information Systems and Technologies (WorldCIST'19 2019)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 931))

Included in the following conference series:

Abstract

Industry 4.0 refers the use of Cyber-Physical Systems as main technological component in industrial systems, but also in home and personal applications. Industrial systems tend to be critical, so privacy, trust and security are essential in this new revolutionary era. However, up to this moment, these deployments are most considered unsecure, especially when local-range communication technologies are employed. Very common systems such as the remote controls opening private areas in manufacturing companies are totally unprotected. Although this problem could be not prioritary in traditional production systems, in Industry 4.0 is critical, because of the great interdependency among components and the need of protecting the critical core managing the entire production system of a company. Therefore, in this paper it is proposed a lightweight cryptographic solution to protect low-range wireless communications. The proposed solution is based on chaotic masking technologies, which may be easily implemented in resource constraint embedded devices (as those employed in Industry 4.0). A real implementation of an infrared device including our solution is also described. An experimental validation is performed using the implemented real device.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Bordel, B., Alcarria, R., Robles, T., Martín, D.: Cyber–physical systems: extending pervasive sensing from control theory to the Internet of Things. Pervasive Mob. Comput. 40, 156–184 (2017)

    Article  Google Scholar 

  2. Lasi, H., Fettke, P., Kemper, H.G., Feld, T., Hoffmann, M.: Industry 4.0. Bus. Inform. Syst. Eng. 6(4), 239–242 (2014)

    Article  Google Scholar 

  3. Bordel Sánchez, B., Pérez Jiménez, M., Sánchez de Rivera, D.: Recognition of activities of daily living in Enhanced Living Environments. IT CoNvergence PRActice (INPRA) 4(4), 18–31 (2017)

    Google Scholar 

  4. Mareca, P., Bordel, B.: An intra-slice chaotic-based security solution for privacy preservation in future 5G systems. In: World Conference on Information Systems and Technologies, pp. 144–154. Springer, Cham, March 2018

    Google Scholar 

  5. Bordel, B., Alcarria, R., Robles, T., Martín, D.: Employing extrinsic motivation techniques and optional evaluation activities to promote student learning. In: 10th International Conference on Education and New Learning Technologies

    Google Scholar 

  6. Wang, L., Törngren, M., Onori, M.: Current status and advancement of cyber-physical systems in manufacturing. J. Manuf. Syst. 37, 517–527 (2015)

    Article  Google Scholar 

  7. Stock, T., Seliger, G.: Opportunities of sustainable manufacturing in industry 4.0. Procedia Cirp 40, 536–541 (2016)

    Article  Google Scholar 

  8. Lu, Y.: Industry 4.0: a survey on technologies, applications and open research issues. J. Ind. Inform. Integr. 6, 1–10 (2017)

    Google Scholar 

  9. Bordel, B., Alcarria, R., Sánchez-de-Rivera, D., Robles, T.: Protecting industry 4.0 systems against the malicious effects of cyber-physical attacks. In: International Conference on Ubiquitous Computing and Ambient Intelligence, pp. 161–171. Springer, Cham, November 2017

    Chapter  Google Scholar 

  10. Bordel, B., Alcarria, R., De Andrés, D.M., You, I.: Securing Internet-of-Things systems through implicit and explicit reputation models. IEEE Access 6, 47472–47488 (2018)

    Article  Google Scholar 

  11. Lanotte, R., Merro, M., Muradore, R., Viganò, L.: A formal approach to cyber-physical attacks. In: 2017 IEEE 30th Computer Security Foundations Symposium (CSF), pp. 436–450. IEEE, August 2017

    Google Scholar 

  12. Bordel, B., Alcarria, R., Robles, T., Sánchez-Picot, Á.: Stochastic and information theory techniques to reduce large datasets and detect cyberattacks in Ambient Intelligence Environments. IEEE Access 6, 34896–34910 (2018)

    Article  Google Scholar 

  13. Liao, Y., Deschamps, F., Loures, E.D.F.R., Ramos, L.F.P.: Past, present and future of Industry 4.0-a systematic literature review and research agenda proposal. Int. J. Prod. Res. 55(12), 3609–3629 (2017)

    Article  Google Scholar 

  14. Wells, L.J., Camelio, J.A., Williams, C.B., White, J.: Cyber-physical security challenges in manufacturing systems. Manuf. Lett. 2(2), 74–77 (2014)

    Article  Google Scholar 

  15. Banerjee, A., Venkatasubramanian, K.K., Mukherjee, T., Gupta, S.K.: Ensuring safety, security, and sustainability of mission-critical cyber-physical systems. Proc. IEEE 100(1), 283–299 (2012)

    Article  Google Scholar 

  16. Hahn, A., Ashok, A., Sridhar, S., Govindarasu, M.: Cyber-physical security testbeds: Architecture, application, and evaluation for smart grid. IEEE Trans. Smart Grid 4(2), 847–855 (2013)

    Article  Google Scholar 

  17. Ning, H., Liu, H.: Cyber-physical-social based security architecture for future internet of things. Adv. Internet Things 2(01), 1 (2012)

    Article  Google Scholar 

  18. Pasqualetti, F., Dörfler, F., Bullo, F.: Attack detection and identification in cyber-physical systems. IEEE Trans. Autom. Control 58(11), 2715–2729 (2013)

    Article  MathSciNet  Google Scholar 

  19. Bordel, B., Orúe, A.B., Alcarria, R., Sánchez-de-Rivera, D.: An intra-slice security solution for emerging 5G networks based on pseudo-random number generators. IEEE Access 6, 16149–16164 (2018)

    Article  Google Scholar 

  20. Vaidya, P.G., Angadi, S.: Decoding chaotic cryptography without access to the superkey. Chaos, Solitons Fractals 17(2), 379–386 (2003)

    Article  MathSciNet  Google Scholar 

  21. Wong, K.W., Ho, S.W., Yung, C.K.: A chaotic cryptography scheme for generating short ciphertext. Phys. Lett. A 310(1), 67–73 (2003)

    Article  MathSciNet  Google Scholar 

  22. Li, S., Li, Q., Li, W., Mou, X., Cai, Y.: Statistical properties of digital piecewise linear chaotic maps and their roles in cryptography and pseudo-random coding. In: IMA International Conference on Cryptography and Coding, pp. 205–221. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  23. Pareek, N.K., Patidar, V., Sud, K.K.: Cryptography using multiple one-dimensional chaotic maps. Commun. Nonlinear Sci. Numer. Simul. 10(7), 715–723 (2005)

    Article  MathSciNet  Google Scholar 

  24. Pareek, N.K., Patidar, V., Sud, K.K.: Discrete chaotic cryptography using external key. Phys. Lett. A 309(1), 75–82 (2003)

    Article  MathSciNet  Google Scholar 

  25. Amigó, J.M., Kocarev, L., Szczepanski, J.: Theory and practice of chaotic cryptography. Phys. Lett. A 366(3), 211–216 (2007)

    Article  Google Scholar 

  26. Cuomo, K.M., Oppenheim, A.V., Strogatz, S.H.: Synchronization of Lorenz-based chaotic circuits with applications to communications. IEEE Trans. Circuits Syst. II Analog Digital Signal Proc. 40(10), 626–633 (1993)

    Article  Google Scholar 

  27. Kocarev, L., Halle, K., Eckert, K., Chua, L.: Experimental demonstration of secure communications via chaotic synchronization. Int. J. Bifurcat. Chaos 2, 709–713 (1992)

    Article  Google Scholar 

  28. Mareca, P., Bordel, B.: Robust hardware-supported chaotic cryptosystems for streaming commutations among reduced computing power nodes. Analog Integrated Circuits and Signal Processing, pp. 1–16

    Google Scholar 

  29. Liu, T., Yang, C.: Signal alignment for multicarrier code division multiple user two-way relay systems. IEEE Trans. Wireless Commun. 10(11), 3700–3710 (2011)

    Article  Google Scholar 

  30. Atabakzadeh, M.H.: Synchronization-Like Behaviors of Dynamical Systems with Non Negative Lyapunov Exponents. Appl. Math. Sci. 6(23), 1113–1120 (2012)

    MathSciNet  MATH  Google Scholar 

Download references

Acknowledgments

Borja Bordel has received funding from the Ministry of Economy and Competitiveness through SEMOLA project (TEC2015-68284-R).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Borja Bordel .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Mareca, P., Bordel, B. (2019). A Chaotic Cryptographic Solution for Low-Range Wireless Communications in Industry 4.0. In: Rocha, Á., Adeli, H., Reis, L., Costanzo, S. (eds) New Knowledge in Information Systems and Technologies. WorldCIST'19 2019. Advances in Intelligent Systems and Computing, vol 931. Springer, Cham. https://doi.org/10.1007/978-3-030-16184-2_14

Download citation

Publish with us

Policies and ethics