Abstract
To lessen the strain on network nodes’ storage, a group encryption technique is used in this paper to propose a data security encryption algorithm for network communication messages based on multi-chaotic mapping. The ciphertext feedback method is employed, effectively safeguarding the system against selective plaintext attacks by linking the encryption key and the shift space of each round to the ciphertext in addition to the multi-chaos mapping. This encryption algorithm is further protected against exhaustive attacks by using plaintext disambiguation. Tests show that the suggested algorithm has quick encryption times, good security, and plaintext sensitivity.
References
C. Li, B. Feng, S. Li, J. Kurths, and G. Chen. Dynamic analysis of digital chaotic maps via state-mapping networks. IEEE Transactions on Circuits and Systems I: Regular Papers, 66(6):2322–2335, 2019.
C. Zhang, G. Shan, and B.H. Roh. Communication-efficient federated multi-domain learning for network anomaly detection. Digital Communications and Networks, 2024.
M. Khan and F. Masood. A novel chaotic image encryption technique based on multiple discrete dynamical maps. Multimedia Tools and Applications, 78:26203–26222, 2019.
K.A. Korba, D. Abed, and M. Fezari. Securing physical layer using new chaotic parametric maps. Multimedia Tools and Applications, 80(21-23):32595–32613, 2021.
K.S. Khalaf, M.A. Sharif, and M.S. Wahhab. Digital Communication Based on Image Security using Grasshopper Optimization and Chaotic Map. International Journal of Engineering, 35(10):1981–1988, 2022.
J. Cui, Y. Wang, J. Zhang, Y. Xu, and H. Zhong. Full session key agreement scheme based on chaotic map in vehicular ad hoc networks. IEEE Transactions on Vehicular Technology, 69(8):8914–8924, 2020.
Z. Zhang, C. Zhang, M. Li, and T. Xie. Target positioning based on particle centroid drift in large-scale WSNs. IEEE Access, 8:127709–127719, 2020.
M. Alawida, J.S. Teh, A. Mehmood, and A. Shoufan. A chaos-based block cypher based on an enhanced logistic map and simultaneous confusion-diffusion operations. Journal of King Saud University-Computer and Information Sciences, 34(10):8136–8151, 2022.
C. Cao, Y. Tang, D. Huang, W. Gan, C. Zhang, and J. Su. IIBE: An Improved Identity-Based Encryption Algorithm for WSN Security. Security and Communication Networks, 2021.
S. Zhu and C. Zhu. Plaintext-related image encryption algorithm based on block structure and five-dimensional chaotic map. IEEE Access, 7:147106–147118, 2019.
X. Luo, C. Zhang, and L. Bai. A fixed clustering protocol based on a random relay strategy for EHWSN. Digital Communications and Networks, 9(1):90–100, 2023.
S. Qiu, D. Wang, G. Xu, and S. Kumari. Practical and provably secure three-factor authentication protocol based on extended chaotic maps for mobile lightweight devices. IEEE Transactions on Dependable and Securlightweight, 19(2):1338–1351, 2020.
Y. Luo, J. Yu, W. Lai, and L. Liu. A novel chaotic image encryption algorithm based on improved baker and logistic maps. Multimedia Tools and Applications, 78:22023–22043, 2019.
C.K. Kumar and N. Ramachandran. Intrusion Detection Model Using Chaotic MAP for Network Coding Enabled Mobile Small Cells. Computers, Materials & Continua, 78(3), 2024.
S. Zhu and C. Zhu. A visual security multi-key selection image encryption algorithm based on new four-dimensional chaos and compressed sensing. Scientific Reports, 14(1):15496, 2024.
M. Alawida. Enhancing logistic chaotic map for improved cryptographic security in random number generation. Journal of Information Security and Applications, 80:103685, 2024.
R. Soni, M.K. Thukral, and N. Kanwar. A relative investigation of one-dimensional chaotic maps intended for lightweight cryptography in smart grids. e-Prime-Advances in Electrlightweightring, Electronics and Energy, 7:100421, 2024.

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
Copyright (c) 2025 Journal of Cyber Security and Mobility
