Skip to main content
Advertisement
Browse Subject Areas
?

Click through the PLOS taxonomy to find articles in your field.

For more information about PLOS Subject Areas, click here.

< Back to Article

Fig 1.

IoT security challenges.

More »

Fig 1 Expand

Fig 2.

Key issues with traditional cryptography.

More »

Fig 2 Expand

Table 1.

A comparative analysis of existing work.

More »

Table 1 Expand

Fig 3.

Overview of LWLCM.

More »

Fig 3 Expand

Fig 4.

Bifurcation diagram of logistic map.

More »

Fig 4 Expand

Fig 5.

Key initialization.

More »

Fig 5 Expand

Fig 6.

Simulation of the LWLCM on Raspberry Pi.

More »

Fig 6 Expand

Fig 7.

Experimental setup of Raspberry Pi.

More »

Fig 7 Expand

Table 2.

Encryption time (sec).

More »

Table 2 Expand

Fig 8.

Encryption time (sec).

More »

Fig 8 Expand

Table 3.

Decryption Time(sec).

More »

Table 3 Expand

Fig 9.

Decryption time (sec).

More »

Fig 9 Expand

Table 4.

Encryption throughput (Byte/sec).

More »

Table 4 Expand

Table 5.

Decryption throughput (Byte/sec).

More »

Table 5 Expand

Fig 10.

Encryption throughput (Kb/sec).

More »

Fig 10 Expand

Fig 11.

Decryption throughput (kb/sec).

More »

Fig 11 Expand

Table 6.

Avalanche Effect (%) of Key- Keystream.

More »

Table 6 Expand

Table 7.

Avalanche effect (%) Key- Cipher text.

More »

Table 7 Expand

Fig 12.

Key-Keystream Avalanche effect.

More »

Fig 12 Expand

Fig 13.

Key-Cipher Text Avalanche effect.

More »

Fig 13 Expand

Fig 14.

Average Avalanche effect for Key-Keystream.

More »

Fig 14 Expand

Fig 15.

Average Avalanche effect for Key-Cipher text.

More »

Fig 15 Expand

Fig 16.

Memory usage (Kb).

More »

Fig 16 Expand

Table 8.

Energy consumption (Joule).

More »

Table 8 Expand

Fig 17.

Energy consumption (Joule).

More »

Fig 17 Expand

Table 9.

Encryption time(sec) in the absence of each component at a time.

More »

Table 9 Expand

Table 10.

Decryption time(sec) in the absence of each component at a time.

More »

Table 10 Expand

Table 11.

Throughput (byte/sec) in the absence of each component at a time.

More »

Table 11 Expand

Table 12.

Entropy analysis in the absence of each component.

More »

Table 12 Expand

Table 13.

Avalnche analysis(%) in the absence of each components at a time.

More »

Table 13 Expand

Table 14.

NIST test.

More »

Table 14 Expand

Table 15.

Shannon entropy analysis.

More »

Table 15 Expand

Table 16.

Compare the correlation coefficients of the proposed work with other existing algorithms.

More »

Table 16 Expand