Fig 1.
IoT security challenges.
Fig 2.
Key issues with traditional cryptography.
Table 1.
A comparative analysis of existing work.
Fig 3.
Overview of LWLCM.
Fig 4.
Bifurcation diagram of logistic map.
Fig 5.
Key initialization.
Fig 6.
Simulation of the LWLCM on Raspberry Pi.
Fig 7.
Experimental setup of Raspberry Pi.
Table 2.
Encryption time (sec).
Fig 8.
Encryption time (sec).
Table 3.
Decryption Time(sec).
Fig 9.
Decryption time (sec).
Table 4.
Encryption throughput (Byte/sec).
Table 5.
Decryption throughput (Byte/sec).
Fig 10.
Encryption throughput (Kb/sec).
Fig 11.
Decryption throughput (kb/sec).
Table 6.
Avalanche Effect (%) of Key- Keystream.
Table 7.
Avalanche effect (%) Key- Cipher text.
Fig 12.
Key-Keystream Avalanche effect.
Fig 13.
Key-Cipher Text Avalanche effect.
Fig 14.
Average Avalanche effect for Key-Keystream.
Fig 15.
Average Avalanche effect for Key-Cipher text.
Fig 16.
Memory usage (Kb).
Table 8.
Energy consumption (Joule).
Fig 17.
Energy consumption (Joule).
Table 9.
Encryption time(sec) in the absence of each component at a time.
Table 10.
Decryption time(sec) in the absence of each component at a time.
Table 11.
Throughput (byte/sec) in the absence of each component at a time.
Table 12.
Entropy analysis in the absence of each component.
Table 13.
Avalnche analysis(%) in the absence of each components at a time.
Table 14.
NIST test.
Table 15.
Shannon entropy analysis.
Table 16.
Compare the correlation coefficients of the proposed work with other existing algorithms.