Table of Contents Author Guidelines Submit a Manuscript
International Journal of Antennas and Propagation
Volume 2015 (2015), Article ID 315721, 10 pages
http://dx.doi.org/10.1155/2015/315721
Research Article

Chaotic Stream Cipher-Based Secure Data Communications over Intelligent Transportation Network

China University of Geosciences, Wuhan 430074, China

Received 26 June 2014; Revised 23 October 2014; Accepted 3 November 2014

Academic Editor: Stephen Wang

Copyright © 2015 Wei Zhang et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Abstract

Intelligent transportation systems (ITS) are advanced applications in which the transportation industry is adapted to the information technology revolution. As an important development direction of ITS, the electronic toll collection (ETC) subsystem, which enables an efficient and speedy toll collection, has gained widespread popularity in the world. In an ETC system, toll transaction data are transmitted over intelligent transportation networks, which is vulnerable to eavesdropping, interfering, and tampering attacks. To address the above security problems, we proposed a chaotic stream cipher-based cryptographic scheme to realise secure data communications over wireless sensor network (WSN), which is a part of ITS. The proposed cryptographic scheme allowed ITS to achieve key negotiation and data encryption between sensor nodes in the WSN, whileas reduced computational costs and power consumption. Security analysis and experimental results showed that the proposed scheme could protect data transmission between wireless sensor nodes from being attacked, and significantly reduced the communication overhead for the whole system compared to the existing ECC_AES scheme, thus satisfying the real-time data transmission requirement of ITS.

1. Introduction

Intelligent transportation systems (ITS) provide real-time, accurate, effective, and comprehensive transportation management services by integrating advanced communications, sensing, automation, and information processing technologies into transportation infrastructure and vehicles [1]. Users of ITS including motorists, commercial operators, and public transport customers, who rely on ITS to make travel decisions, are informed based on such factors as traffic conditions, road maintenance or construction work, and weather conditions that could potentially impact travel time and safety. Policy makers and road or highway operators also utilize the information from ITS in the management and future planning of the road networks.

Intelligent transport systems vary in technologies applied and mainly comprise seven subsystems: electronic toll collection system (ETC), advanced transport information service (ATIS), advanced transportation management system (ATMS), advanced public transportation system (APTS), advanced vehicle control system (AVCS), freight management system (FMS), and emergence rescue system (ERS), in which ETC has already become an important development direction of ITS [2].

Electronic toll collection system has greatly improved the toll collection process by making use of transponder with RFID technology and license plate recognition system to identify vehicles and by transmitting information in relation to toll transaction over ETC network to collect the final tolls without stopping or slowing traffic. ETC system helps eliminate or minimize chock points along the routes with toll booths, thus effectively accelerating the speed of toll collection, enhancing traffic capacity of the toll roads, and conserving energy. Due to the advantages mentioned above, ETC is gaining widespread use throughout the country and even the world.

1.1. Electronic Toll Collection System

As shown in Figure 1, an electronic toll collection system is generally divided into two subsystems: a foreground system and a background system. The former mainly comprises three parts [3]: automatic vehicle identification (AVI) system, automatic vehicle classification (AVC) system, and violation enforcement (VE) system. The on board unit (OBU) is a box installed in the car, capable of collecting location information that is sent to the road side unit (RSU) via dedicated short range communication (DSRC) protocol. The latter is primarily responsible for the initialization of OBU, receiving and processing the transaction data from the foreground, storing communication data, computing the prices associated with the roads, and forming the final payment information, and so on. An automatic toll collection process is completed smoothly with the deliberate cooperation of foreground and background.

Figure 1: ETC intelligent transportation system.
1.2. ETC Intelligent Transportation Network

Information on tolls is transmitted over an ETC intelligent transportation network, which is regarded as a derivative of the Internet of Things [4], thereby possessing its structural characteristics. The layered structure of ETC intelligent transportation network is illustrated in Figure 2, in which the data perception level collects the vehicle information and OBU information and then forwards those data to the background system through the data transport level after the process of the data protection level. Finally, the data application level takes full use of those data gathered.

Figure 2: Four layers of ETC intelligent transportation network.

Data communications between OBU and RSU over an intelligent transportation network are carried out using DSRC technology [5]; data transmission among sensor nodes uses wireless sensor network (WSN) technique; the exchange of information between RSU and the processing centre is based on wireless local area network (WLAN) and so on. All of the communication links collaboratively realize the transaction information transmitted favourably.

1.3. Security Requirements

As Dimitrakopoulos and Demestichas stated, the popularization of ETC intelligent transportation network has raised numerous information security issues [2]. Data packets carrying private and valuable information about the driver and the car transmitted over an intelligent transportation network are subject to eavesdropping, tampering, and decoding attacks by adversaries. This is owing to the fact that an ETC system uses many traditional communication technologies with inherent security problems.

The inherent vulnerabilities of wireless sensor network, which is deployed in ETC lanes, could compromise the whole security of an intelligent transportation network. Moreover, the DSRC protocol that is used to connect OBU and RSU has several shortcomings, such as bypass interference and car-following interference. Therefore, it is urgent to improve data transmission security for ETC intelligent transportation networks.

With the aim of improving the security of data communications over an ETC intelligent transportation network, we focused on creating a safe environment for WSN as a part of it to protect the information in relation to the drivers and the vehicles in the ETC lanes from being eavesdropped, tampered, and/or interfered.

1.4. Motivation for Giving a Priority to WSN

In an ETC system, a large number of wireless sensor nodes are deployed at ETC lanes, and they are small in size and operate on small sized battery with very limited data processing power. Those wireless sensor nodes constitute a WSN by means of self-organization [6]. The sensor nodes are used to apperceive (acquire), dispose, and transmit information about the driver and the driving vehicle in ETC lanes. Meanwhile, they are also used to store, manage, and fuse information which is retransmitted by other sensor nodes. The above information is then converged at a sink node and forwarded to the processing centre (server) for central fusion and processing through exterior networks. Depending on the received information, the processing centre determines the final tolls that should be deducted from the vehicle owner’s Intelligent Card.

The maintenance and monitoring of sensor nodes are quite difficult due to its deployment environment, and so the sensor nodes could be easily compromised by adversaries. The security of the information collected by the sensor nodes has a direct impact on the privacy of vehicle owners; thus a priority should be given to secure data communication over WSN.

Encrypting sensitive data such as vehicle information on deduction standards could effectively resist some attacks on WSN. As secure key management is the premise of information encryption, encryption techniques and key management are the central gravity for the security of WSN. There has been extensive literature in researching WSN security, which can be divided into two categories in the cryptography field. One uses symmetric encryption; although existing symmetric encryption schemes provide a good level of security, key maintenance remains difficult. The other emphasizes asymmetric encryption (public-key cryptography). When asymmetric schemes are used, key management becomes easier, but they provide a lower level of security compared to the former. No matter which kind of protection method is adopted, the low battery power, limited memory space, and less processing capabilities of sensor nodes should be taken into account. In this study, we proposed an efficient symmetric key negotiation, data encryption, and key update scheme based on a logistic chaotic stream cipher algorithm.

The rest of this paper is organized as follows: Section 2 presents the related research work on WSN security protection. Our proposed cryptographic scheme is described in detail in Section 3. Section 4 shows the security analysis of the proposed scheme. The experimental results and performance comparisons of the proposed scheme are discussed in Section 5. Finally, the conclusion of the paper is given in Section 6.

2. Related Work

The security aspects that have been attracting vast attention in WSN are the areas of information encryption and key management, which are mainly achieved by using symmetric cryptography and public key cryptography.

Currently, security in wireless sensor network is provided mostly through symmetric cryptography. LEAP protocol [7] was designed to prevent security threats and localize the possible damages based on symmetric cryptography. This protocol supports the establishment of some types of keys for each sensor node, in which pair wise keys are used for secure data transmission between a sensor node and its direct neighbours. To share the key with neighbours, sensor node broadcasts a “hello” message to discover its direct neighbours (one hop node) and then waits for each neighbour to reply with their identities. After receiving replay from neighbour , computes a key . Sensor node generates and then computes as . Node erases the key after neighbour discovery or time expiration. Thus no other node can compute after erasing the key. Sensor node computes in the same manner without transmitting any message. Finally, each pair of adjacent sensor nodes possesses a unique secret key. The protocol effectively enhances the security of information transferred between sensor nodes. However, the number of neighbour nodes is abundant for each sensor node, which results in the difficulty of key maintenance. In addition, the workload for computing those secret keys is tremendous. The defects mentioned above are contradictory with the features of sensor nodes.

An RSA-based asymmetric algorithm was used to solve the problem of information security in wireless sensor network [8]. This encryption algorithm contains two phrases: a sensor node to shake hand with another sensor node in which the two sensor nodes setup a session key; the use of the session key for data encryption. However, this encryption algorithm is not practical, since under the assumption that the nature of sensor node could not support asymmetric encryption algorithm due to the limitations of sensor battery and CPU power. Furthermore, the public key algorithm with low encryption speed could not meet the real-time data transmission requirement, which is vital to WSN.

The above analysis shows that both symmetric and asymmetric encryption algorithms have shortcomings. To cope up with the shortcomings, Ganesh et al. [9] proposed to combine elliptical curve cryptography (ECC) with advanced encryption standards (AES) to form an information protection method for WSN. The equation of standard Elliptic Curve is , in which the values of and are fixed. AES is of a symmetric encryption, and decryption is similar to the encryption process but in reverse direction. In the method, sensor nodes and first negotiate a session key for ECC algorithm. Second, the communication initiator (sensor node ) uses an ECC algorithm which is mainly designed for encrypting a random number generated in the sensor node to consult a key for AES algorithm and then sends the cipher to sensor node . The sensor node obtains a random number by ECC decryption. Subsequently, the sensor node uses ECC to encrypt plaintext and primary ciphertext is then obtained, which is further encrypted using AES algorithm. Finally, at the receiver side, the ciphertext is first decrypted by AES decryptor and then decrypted by ECC decryptor, and the plaintext is obtained.

Although the existing ECC_AES scheme is pretty secure, the whole process is complicated and time-consuming. As wireless sensor nodes possess the inherent limitations of sensor battery and CPU power, the practical application of this scheme is limited. The increase in the elapsed time of finishing this complicated scheme has a negative effect on the quality of real-time communication.

So in this study, we are devoted to improving key management and information security for WSN by proposing a more reliable, speedy, and secure cryptographic scheme.

3. Proposed Chaotic Stream Cipher-Based Cryptographic Scheme

In this section, at first, we describe a logistic chaotic algorithm briefly. Subsequently, we detail our proposed chaotic stream cipher-based cryptographic algorithm for wireless sensor network.

3.1. Logistic Chaotic Algorithm

A wide range of ciphers are included in the chaotic stream cipher, which is a hybrid algorithm of chaotic system and stream cipher. Chaotic system is an important subdiscipline of nonlinear science, which includes a unidimensional Logistic map, bidimensional Duffing equation and Henon chaotic system, three-dimensional Lorenz system, Chua’s system and CLHE hyperchaos system, and four-dimensional Rössler hyperchaos system.

Chaotic systems can be roughly classified into two types: chaos and hyperchaos. The essential difference between chaos and hyperchaos lies in the number of positive Lyapunov exponents associated with them. There is a positive exponent in a dynamical system, which is usually taken as an indication that the system is chaotic. A chaotic system with at least two positive Lyapunov exponents is typically defined as hyperchaos.

In mathematics the Lyapunov exponent of a dynamical system is a quantity that characterizes the rate of separation of infinitesimally close trajectories. In a dynamical system, there is a spectrum of Lyapunov exponents, equal in number to the dimensionality of the phase space, in which the more positive the Lyapunov exponent is, the more chaotic the dynamic system is. So in a hyperchaotic system, the directions of trajectories are more unstable and the pseudorandom sequences generated are more random than a chaotic system. Although the research on hyperchaotic systems is in the budding stage, with their strong chaotic characteristics they are getting well application prospects in many fields, such as secure communication [10], electronic implementation [11], chaotic neural networks, weather forecast, and economics.

With the newest advances in communication technology, secure communication has gained more and more attention. The emerging technology of chaotic secure communication has opened up a new approach to secure data communications. Secure communication is achieved through either masking of a weak analog message signal by adding it into a chaotic coupling signal or modulation of the parameters of the drive system by a digital message signal [10]. The early algorithms for chaotic secure communication mostly employed low-dimensional chaotic systems; however, the space of pseudorandom sequences generated is limited and its complexity is quite low. So the chaotic communication systems could not effectively resist phase space reconstruction and brute force attacks (e.g., using predictive modelling or noise reduction methods from nonlinear dynamics). The use of hyperchaos system could generate pseudorandom sequences of an ultrahigh degree of randomness. Meanwhile, the structure of the hyperchaos system is pretty complex, which could effectively resist the phase space reconstruction attack on the hyperchaos communication system, meaning that hyperchaos could strengthen the security of communication process. However, there is a defect in chaos and hyperchaos systems that the speed of generating pseudorandom sequences is low, which is serious for hyperchaos due to its complexity structure. This means that use of hyperchaos will delay the communication significantly.

To meet the real-time data transmission requirement of ETC intelligent transportation network and the limitations of wireless sensors in computation and energy, we chose a straightforward logistic chaotic system rather than a hyperchaotic system. The stream cipher used is one kind of symmetric cryptography, which encrypts and decrypts plaintext or ciphertext in one or several bits. Taking performance into account, RC4 algorithm was chosen as a component of chaotic stream cipher in this study.

3.1.1. Logistic Chaotic System

The logistic chaotic system [12] is one of the most popular models for discrete nonlinear dynamical systems. Its expression and computation process are straightforward. A logistic chaotic map can be described in where is a control parameter on the interval and is a real number on the interval .

Figure 3 depicts a bifurcation diagram of a logistic chaotic map. As Figure 3 shows, when , the value of is equal or close to 0. When , the value of quickly approaches the value of . When , , the sequence generated by using (1) is in a chaotic status, which is similar to the probability nature of white noise, so the logistic chaotic system is an ideal way to act as a key sequence generator [13].

Figure 3: Bifurcation diagram of logistic chaotic map.

In addition, the logistic chaotic system is sensitive to the initial value. Figure 4 shows the deviations of two logistic chaotic sequences at two initial values. As Figure 4 illustrates, when , the initial values and , respectively, with a scanty margin, the deviations of the two logistic chaotic sequences generated by the logistic chaotic map described by (1) are blindingly obvious. The deviations vary as the iteration n increases between . For the first thirty iterations, the deviations of the two logistic chaotic sequences are equal or close to zero, while the deviations are evident since then. Therefore, the act of fixing the initial element position of a key sequence at the beginning of the iteration should be avoided when the logistic chaotic map is used as a key sequence generator.

Figure 4: Deviation of two logistic chaotic sequences (, ).
3.1.2. RC4 Encryption Algorithm

The RC4 algorithm is composed of two components: key-scheduling algorithm (KSA) and pseudorandom number generation algorithm (PRGA). RC4 is regarded as a variable key-size stream cipher based on a 256-byte secret internal state and two one-byte indexes. Information is encrypted by XORing data with the key sequence which is generated by RC4 from a seed key. For a given seed key, KSA generates an initial permutation state . PRGA is a repeated loop procedure with each loop generating a one-byte pseudorandom output as a key stream. At each loop, a one-byte key stream is generated and XORed with one-byte of plaintext; in the meantime a new 256-byte permutation state as well as two one-byte indexes and are updated, which are defined by where and are the indexes and is the state updated from , and by applying one loop of PRGA.

Since RC4 is probably the most widely used stream cipher nowadays due to its high efficiency and simplicity, attacks on RC4 have gathered pace in recent years. The attacks can be mainly classified into three types [1417]: week key attacks, force attacks, and related key attacks. The primary method of enhancing the anti-attack ability of RC4 is to improve the complexity and randomicity of key sequences. To address this problem, we proposed to use the logistic chaotic RC4 algorithm below.

3.1.3. Logistic Chaotic RC4 Algorithm

Logistic chaotic RC4 algorithm is made of a logistic chaotic algorithm and an RC4 stream cipher. To explore the advantages of RC4 and to improve the randomicity of the pseudorandom number generated by pseudorandom number generation algorithm in RC4, in this study we designed a new scheme by embedding a logistic chaotic system into the PRSA component of RC4 algorithm without modifying the KSA algorithm of RC4. The function of KSA in RC4 is to complete initialization of RC4 key, while the function of PRSA is to produce a pseudorandom number. Pseudocode 1 shows the comparison of the pseudocodes of PRGA in RC4 algorithm and Logistic chaotic RC4 algorithm.

Pseudocode 1: Pseudocodes of PRGA: (a) in RC4 algorithm and (b) in the proposed logistic chaotic RC4 algorithm.

3.2. Chaotic Stream Cipher-Based Cryptographic Scheme

The proposed chaotic stream cipher-based cryptographic scheme not only possesses the inherent advantages of symmetric cipher but also settles the problem of key management. The proposed scheme includes four stages: regional division, the initialization of sensor nodes, the creation of session key and data encryption, and key updating.

3.2.1. Regional Division

Regional division of the deployment area of sensor nodes is dominant for key management, and so it needs to pick up an appropriate division method firstly. According to the mosaic principle (3), it is possible to judge which polygon can connect seamlessly and cover the whole WSN area: where the parameter represents the number of edges in a polygon. When the result of (3) is an integer, the corresponding polygon can realize a seamless connection, and vice versa. Regular hexagon is an optimum in dividing the WSN area due to every vertex having the least adjacent domains, which means that the critical sensor nodes can prestore less information of the adjacent domains.

Assuming that the base station is an unconditionally trusted entity, which manages keys for sensor nodes in WSN. The base station sends flooding broadcast to the whole WSN and then collects the information including the number and location of sensor nodes. Subsequently, the base station divides the WSN area in the form of regular hexagon. Figure 5 depicts the specific regional division of WSN area, in which , , and represent the cluster head, member node, and critical node, respectively. After the initialization of sensor nodes, it creates session keys which confidentially communicate with others.

Figure 5: Regional division of WSN area.
3.2.2. Initialization of Sensor Nodes

The sensor nodes deployed in ETC lanes can be divided into three types after the regional division. The initialization processes vary for different types of wireless sensor nodes.(a): it is the cluster head of every partition, which is used to manage the whole non sensor nodes within a partition. Each cluster head needs to be loaded with the information: the identity assigned by the base station which has an identity repository (IR) used to restore the identities of all cluster heads. In addition, it also needs to prestore two sets of keys and . One is a shared key with the base station, which includes the initial value and the control parameter of logistic chaotic system. The other one is a shared key with all noncluster head nodes within a partition, which includes the initial value and the control parameter of logistic chaotic system.(b): there are three adjacent domains at the most for every critical sensor node according to the above regional division method. Thus, needs to prestore two or three pairs of keys shared with every adjacent domain.(c): it is a general member sensor node that only needs to prestore a pair of keys shared with the partition domain to which belongs.

3.2.3. Creation of Session Key and Data Encryption

When a wireless sensor node wants to transmit vehicle information to a sensor node , there are two situations according to the specific position of the sensor node . One case is that sensor nodes and are in the same partition, in which they can negotiate a session key directly. The other case is that the two sides of communication are in different partitions, since both of them possess different shared keys prestored, in which the creation of session key depends on the as a medium. The creation of session key is completed by sensor nodes that belong to the same partition step by step no matter which situation it is. Figure 6 illustrates the creation process of session key and information encryption. The specific steps of using the proposed scheme are described as follows.(a)Sensor node sends a random number to sensor node , when receiving from , transmits a random number to .(b)Sensor nodes and use the logistic chaotic map (1) and key owned jointly to generate a chaotic sequence. Subsequently, sensor nodes and choose seed keys for Logistic chaotic RC4 algorithm. The use of the random number is to determine the position of the initially selected value in the chaotic sequence and the length of the selected seed key.(c)Sensor nodes and employ logistic chaotic RC4 algorithm to produce a key sequence based on the seed key, respectively. The function of the random number is to decide the position of the initially selected value in the chaotic sequence generated by the imbedded logistic chaotic system in logistic chaotic RC4 algorithm. The shared key is used by the embedded logistic chaotic system again.(d)Sensor node encrypts and decrypts vehicle information by XORing it with the key sequence, while sensor node decrypts and encrypts the cipher text by XORing it with the key sequence.

Figure 6: Creation of session key and data encryption.
3.2.4. Key Updating

In the proposed scheme, keys are updated within the scope of a partition instead of the whole WSN area. The key update process includes two kinds of key updating: and . The of each partition is responsible for the process of key update, in which the steps involved are described as follows.(a)At first, sends its identity and a random number to the base station, and then the base station determines whether the identity is legal or not by matching the value with its identity repository (IR). In addition, also sends an indication number or that indicates which kind of keys is to be updated, respectively. The number denotes the update of and another number means the updating of .(b)If the identity is legal, the base station sends a random number to the initiator of the communication and then generates a pair of new keys or according to the value of indication number or .(c)At this time, and the base station have a pair of shared random numbers and . The base station sends the new keys to after the process by using the proposed scheme in the stage of the creation of session key and data encryption.(d) decrypts the cipher and obtains the new keys or . If the update keys are the former, also needs to send it to all non sensor nodes in its partition. To protect from malicious attacks, needs to negotiate a session key with all of the non sensor nodes within a partition and then to encrypt . This process is slightly different from the above stage of session key creation and data encryption, taking into account the low battery power, limited memory space, and less processing capabilities of sensor nodes. first sends flooding broadcasts carrying a random number to other sensor nodes in the same partition. The random number acts as the functions of and in the stage of session key creation and data encryption. Subsequently, transmits the new key after the process by using the proposed scheme in the stage of the creation of session key and data encryption.

4. Security Analysis

This section provides a security analysis of the proposed chaotic stream cipher-based cryptographic scheme used to realise secure data communications over a wireless sensor network. The use of logistic chaotic system in this study enhances key sequence randomness, thus preventing WSN from malicious attacks.

4.1. Dos Attacks

In the proposed scheme, the clustering that consists of building partitions of sensor nodes is used to form a logistical structure with respect to a given metric. So sensor nodes communicate directly inside a partition and use a cluster head to communicate between the partitions. The workload of the base station is then reduced; that is, it is only used in regional division and key updating. By this way, the proposed scheme can effectively withstand Dos attacks aimed at the base station.

4.2. Interference Attacks

Because of the application context of intelligent transportation systems, the transmitted information can be easily interfered by the perpetual noise of traffic and even other noises from the adversary. However, the proposed cryptographic scheme can resist interference attacks, because the statistical nature of the key sequence generated by the use of logistic chaotic system in our proposed scheme is similar to the white noise’s possessing anti-interference, as discussed by Wu and Huang [18].

4.3. Replay Attacks

Analysis shows that the proposed scheme can resist replay attacks. In the key sequence negotiation process, only two random numbers are transmitted over the unsecure wireless sensor network. Any action in which an adversary attempts to deceive another wireless sensor node by reusing the intercepted random number cannot be successful because the adversary does not possess the shared key , and so she or he could not obtain the key sequence.

4.4. Man-in-the Middle Attacks

According to the proposed scheme, the adversary is infeasible to pretend to be a sensor node to communicate with another sensor node by using the intercepted random numbers. Assuming that the adversary successfully shared two pairs of random numbers and with legal sensor nodes and , respectively, it still could not communicate with both of them. As the adversary could not decrypt the cipher coming from sensor nodes and , and vice versa, it does not have the prestored values .

4.5. Session Key Security

In case a wireless sensor node wants to transmit vehicle information to another sensor node, it can obtain a session key sequence by using the proposed scheme, which is fairly secure. First, the negotiated session key sequence is not known to the third party but only to the two communicating wireless sensors. Second, it possesses a better pseudorandom owing to the use of logistic chaotic system in the proposed scheme, which prevents the adversary from launching ciphertext-only attacks.

5. Experimental Results and Discussion

To evaluate the efficiency and availability of the proposed chaotic stream cipher-based cryptographic scheme, we set up experiments simulating WSN in a real environment.

The communications between sensor nodes were implemented with the proposed scheme, and the associated encryption algorithm functions were supported by the OpenSSL cryptographic library. In our experiments, we measured the elapsed times of session key negotiation and data encryption using the proposed scheme and then compared the experimental results with the results obtained from the experiments using the existing ECC_AES scheme.

Figure 7 illustrates the experimental environment/setup for performance measurements. As Figure 7 shows, the communication between senor nodes and was based on our proposed scheme, while the communication between sensor nodes and was based on the existing ECC_AES scheme [8].

Figure 7: Experimental setup.

The processes of session key negotiation and data encryption are illustrated in Figures 8 and 9. Figures 8 and 9 were based on our proposed scheme and the existing ECC_AES scheme, respectively. For comparing the elapsed times, the two schemes encrypted information with the same length. With regard to the elapsed time of finishing one round session key creation and data encryption, each run obtained a slightly different result. As shown in Figures 8 and 9, the elapsed times were measured to be 62 ms and 218 ms for the proposed scheme and the existing ECC_AES scheme, respectively.

Figure 8: Key negotiation and data encryption using the proposed scheme.
Figure 9: Key negotiation and data encryption using the ECC_AES scheme.

After 40 times repeated tests, we obtained the elapsed times of finishing one round session key creation and data encryption for the proposed scheme and the existing ECC_AES scheme, respectively, and the results are listed in Table 1.

Table 1: Elapsed time of completing one round.

Close analysis of the results is listed in the table; the average elapsed time for finishing one round of our proposed scheme and the ECC_AES scheme are 70.53 ms and 214.58 ms, respectively. It is obvious that our proposed scheme is more time saving compared with the existing scheme. Since intelligent transportation networks have a strict requirement in real-time data transmission, wireless sensor network as a component of ITS network should also meet the real-time data transmission requirement. Taking into account the experimental results, the elapsed times for finishing one round with our proposed scheme were much shorter than the existing ECC_AES scheme. In other words, our proposed chaotic stream cipher-based cryptographic scheme could realise secure data communications over a wireless sensor network without compromising the real-time data communications over intelligent transportation systems.

Figure 10 shows the average elapsed times and standard deviations for finishing one round of our proposed cryptographic scheme based on logistic chaotic RC4 encryption/decryption algorithm and the ECC_AES scheme, respectively. As the results show, the proposed cryptographic scheme reduced the average elapsed time up to 67% in comparison with the existing ECC_AES scheme, indicating that the proposed scheme is remarkably effective in terms of security and performance.

Figure 10: Average elapsed times and standard deviations for finishing one round of each scheme.

6. Conclusions

In this study, we suggested a new chaotic stream cipher-based cryptographic scheme to achieve secure data communications over a wireless sensor network for intelligent transportation systems. The proposed cryptographic scheme not only provided key negotiation and data encryption between sensor nodes in the WSN but also reduced computational costs and power consumption. Security analysis indicated that the proposed scheme could protect data transmission between wireless sensor nodes from malicious attacks, such as Dos attacks, interference attacks, replay attacks, and man-in-the middle attacks. Experimental results showed that, in comparison with the existing ECC_AES scheme, the proposed scheme reduced the average elapsed time (the communication overhead) up to 67%, thus meeting the real-time data transmission requirement of ITS.

Further experiments should investigate how the steganography technology could be applied to ITS so as to improve data communications security further on the basis of the proposed scheme.

Conflict of Interests

The authors declare that there is no conflict of interests regarding the publication of this paper.

Acknowledgments

This work was supported in part by the National Natural Science Foundation of China under Grant 61272469 and Grant 61303237, and the Wuhan Scientific Research Program under Grant 2013010501010144.

References

  1. World Road Association, “ITS Handbook,” http://road-network-operations.piarc.org/index.php?option=com_content&task=view&id=38&Itemid=71&lang=en.
  2. G. Dimitrakopoulos and P. Demestichas, “Intelligent transportation systems,” IEEE Vehicular Technology Magazine, vol. 5, no. 1, pp. 77–84, 2010. View at Publisher · View at Google Scholar · View at Scopus
  3. F. Don, Electronic Toll Collection: An Introduction and Brief Look at Potential Vulnerabilities, SANS Institute InfoSec Reading Room, 2004.
  4. H. Ning, N. Ning, S. Qu, Y. Zhang, and H. Yang, “Layered structure and management in internet of things,” in Proceedings of the Future Generation Communication and Networking (FGCN '07), vol. 2, pp. 386–389, Jeju, Republic of Korea, December 2007. View at Scopus
  5. R. Bera, J. Bera, S. Sil, S. Dogra, N. B. Sinha, and D. Mondal, “Dedicated Short Range Communications (DSRC) for intelligent transport system,” in Proceedings of the IFIP International Conference on Wireless and Optical Communications Networks, vol. 5, pp. 1–5, April 2006. View at Scopus
  6. S. Sharma, A. Sahu, A. Verma et al., “Wireless sensor network security,” in Advances in Computer Science and Information Technology, Computer Science and Information Technology, pp. 317–326, Springer, Berlin, Germany, 2012. View at Google Scholar
  7. S. Zhu, S. Setia, and S. Jajodia, “LEAP: efficient security mechanisms for large-scale distributed sensor networks,” in Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS '03), pp. 62–72, Washington, DC, USA, October 2003. View at Scopus
  8. C. Xu and Y. Ge, “The public key encryption to improve the security on wireless sensor networks,” in Proceedings of the 2nd International Conference on Information and Computing Science (ICIC "09), pp. 11–14, May 2009. View at Publisher · View at Google Scholar · View at Scopus
  9. A. R. Ganesh, P. N. Manikandan, S. P. Sethu, R. Sundararajan, and K. Pargunarajan, “An improved AES-ECC hybrid encryption scheme for secure communication in cooperative diversity based Wireless Sensor Networks,” in Proceedings of the International Conference on Recent Trends in Information Technology (ICRTIT '11), pp. 1209–1214, June 2011. View at Publisher · View at Google Scholar · View at Scopus
  10. K. G. Gopchandran, K. Gopakumar, and B. Premlet, “Information encryption and decryption using hyperchaotic systems in delayed nonlinear feedback systems,” in Proceedings of the International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT '10), pp. 855–859, October 2010. View at Publisher · View at Google Scholar · View at Scopus
  11. G. Grassi and D. A. Miller, “Theory and experimental realization of observer-based discrete-time hyperchaos synchronization,” IEEE Transactions on Circuits and Systems I. Fundamental Theory and Applications, vol. 49, no. 3, pp. 373–378, 2002. View at Publisher · View at Google Scholar · View at Scopus
  12. N. K. Pareek, V. Patidar, and K. K. Sud, “Image encryption using chaotic logistic map,” Image and Vision Computing, vol. 24, no. 9, pp. 926–934, 2006. View at Publisher · View at Google Scholar · View at Scopus
  13. M. Andrecut, “Logistic map as a random number generator,” International Journal of Modern Physics B, vol. 12, no. 9, pp. 921–930, 1998. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  14. S. Fluhrer, I. Mantin, and A. Shamir, “Weaknesses in the key scheduling algorithm of RC4,” in Selected Areas in Cryptography, vol. 2259 of Lecture Notes in Computer Science, pp. 1–24, Springer, Berlin, Germany, 2001. View at Publisher · View at Google Scholar · View at MathSciNet
  15. N. Couture and K. B. Kent, “The effectiveness of brute force attacks on RC4,” in Proceedings of the 2nd Annual Conference on Communication Networks and Services Research, pp. 333–336, May 2004. View at Publisher · View at Google Scholar · View at Scopus
  16. A. Klein, “Attacks on the RC4 stream cipher,” Designs, Codes and Cryptography, vol. 48, no. 3, pp. 269–286, 2008. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  17. S. Paul and B. Preneel, “A new weakness in the RC4 keystream generator and an approach to improve the security of the cipher,” in Fast Software Encryption, Springer, Berlin, Germany, 2004. View at Google Scholar
  18. Z. Wu and N. E. Huang, “A study of the characteristics of white noise using the empirical mode decomposition method,” Proceedings of the Royal Society A: Mathematical, Physical and Engineering Sciences, vol. 460, no. 2046, pp. 1597–1611, 2004. View at Publisher · View at Google Scholar · View at Scopus