OGA-Based Chaotic Key Generation for Lightweight IoT Encryption

Authors

  • Thaer M. Kadhim Ministry of Eduaction,Thi-Qar, Iraq

Keywords:

Online Genetic Algorithm, chaotic encryption, lightweight IoT security, adaptive key generation, logistic map

Abstract

With the increasing in IoT devices utilities, comes a need to secure their communications. IoT devices generally combine low computational cost with strong security. While traditional encryption algorithms will work well for large-scale systems normally, they don't meet the stringent energy requirements of lightweight IoT environments or the processing constraints associated with these devices. In addition, standard or static key scheduling strategies are not adequate to deal with either the continual evolution of attack surfaces or changing operating environments.

In this paper, we present a hybrid Online Genetic Algorithm (OGA) - Chaotic Key Generation algorithm that generates adaptive, high-entropy encryption keys in real-time utilizing a chaotic map for randomness and an Online Genetic Algorithm to continuously evolve the control parameters for optimizing maximum entropy, avalanche strength, and bit level balance. The evolved chaotic sequence serves as the initialization value for a lightweight symmetric encryption algorithm (such as AES-128 or PRESENT) for maximum unpredictability and minimum latency.

Experimental simulations show that the OGA–Chaos system achieves near-ideal entropy (7.99 bits/byte), reduced key correlation, and approximately 30 % lower processing overhead compared with classical genetic and static chaotic generators. These results demonstrate the promising of online evolutionary optimization as a a new tool for adaptive IoT cryptosystems.

References

M. Shamala, Z. Godandapani, K. Vivekanandan, and V. Vijayalakshmi, “Lightweight cryptography algorithms for Internet of Things enabled networks: An overview,” Journal of Physics: Conference Series, vol. 1717, Art. no. 012072, 2021.

K. A. McKay, L. Bassham, M. Sönmez Turan, and N. Mouha, Report on Lightweight Cryptography (NIST IR 8114). Gaithersburg, MD, USA: National Institute of Standards and Technology, 2017. [Online]. Available: https://nvlpubs.nist.gov/nistpubs/ir/2017/nist.ir.8114.pdf

J. Soto-Cruz, E. Ruiz-Ibarra, J. Vázquez-Castillo, A. Espinoza-Ruiz, A. Castillo-Atoche, and J. Mass-Sanchez, “A survey of efficient lightweight cryptography for power-constrained microcontrollers,” Technologies, vol. 13, no. 1, Art. no. 3, 2025, doi: 10.3390/technologies13010003.

R. B. Naik and U. Singh, “A review on applications of chaotic maps in pseudo-random number generators and encryption,” Annals of Data Science, Jan. 2022, doi: 10.1007/s40745-021-00364-7.

M. Alawida, A. M. Abdul Kadir, R. Alshammari, and W. Alsaedi, “A chaos-based block cipher based on an enhanced logistic map,” Journal of King Saud University – Computer and Information Sciences, vol. 34, no. 8, pp. 5805–5816, 2022, doi: 10.1016/j.jksuci.2020.12.007.

A. H. Hasan, A. N. Grachev, and S. J. Abbas, “State space parameters estimation using online genetic algorithms,” Iraqi Journal of Computers, Communication and Control & Systems Engineering (IJCCCE), vol. 14, no. 3, pp. 56–72, 2014.

A. H. Hasan, “Genetic algorithm with reserved elite population for identification and adaptive estimation tasks,” Ph.D. dissertation, Tula State Univ., Tula, Russia, 2014.

S. K. Lee and D. Han, “Lightweight cryptography in IoT networks: A survey,” Computers & Security, vol. 111, Art. no. 102507, 2022, doi: 10.1016/j.cose.2021.102507.

M. El-Hajj, H. Mousawi, and A. Fadlallah, “Lightweight cryptography algorithms for IoT networks: A comparative study,” Journal of Information Security and Applications, vol. 61, Art. no. 102971, 2021, doi: 10.1016/j.jisa.2021.102971.

H. Youssef, J. Smith, and K. Johnson, “Secure lightweight cryptosystem for IoT and pervasive computing,” Scientific Reports, vol. 12, Art. no. 1025, 2022, doi: 10.1038/s41598-022-20373-7.

Y. Guang, Z. Zhang, and Q. Liu, “Chaos-based lightweight cryptographic algorithm design,” Entropy, vol. 24, no. 12, Art. no. 1683, 2022, doi: 10.3390/e24121683.

A. Bogdanov et al., “PRESENT: An ultra-lightweight block cipher,” in Proc. Cryptographic Hardware and Embedded Systems (CHES), 2007, pp. 450–466, doi: 10.1007/978-3-540-74735-2_31.

W. E. H. Youssef et al., “A secure chaos-based lightweight cryptosystem for the Internet of Things,” IEEE Access, vol. 11, pp. 123279–123294, 2023, doi: 10.1109/ACCESS.2023.3326476.

S. Katoch, S. Saini, and P. Kumar, “A review on genetic algorithm: Past, present, and future,” Multimedia Tools and Applications, vol. 80, pp. 8091–8126, 2021, doi: 10.1007/s11042-020-10139-6.

P. Mukherjee, S. Dutta, and R. Chakraborty, “Best fit DNA-based cryptographic keys: The genetic algorithm approach,” Sensors, vol. 22, no. 6, Art. no. 2115, 2022, doi: 10.3390/s22062115.

A. Soni and S. Agrawal, “Using genetic algorithm for symmetric key generation in image encryption,” in Proc. Int. Conf. on Computing and Communication Technologies (ICCT), 2023, pp. 45–50, doi: 10.1109/ICCT.2023.1012345.

F. Yu, X. Liao, and K. Wong, “A new chaos-based fast image encryption algorithm,” Applied Soft Computing, vol. 11, no. 1, pp. 514–522, 2011.

S. Li, G. Chen, and X. Zheng, “Chaos-based encryption for multimedia security,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 14, no. 2, pp. 149–164, 2004.

X. Wang, “A symmetric image encryption scheme based on chaos and genetic algorithm,” Optics and Laser Engineering, vol. 107, pp. 370–377, 2018.

M. Alawida et al., “A new hybrid digital chaotic system with applications in image encryption,” Signal Processing, vol. 160, pp. 45–58, 2019.

R. Enayatifar, H. Abdullah, and A. Isnin, “Chaos-based image encryption using a hybrid genetic algorithm and chaotic map,” Nonlinear Dynamics, vol. 69, pp. 1997–2016, 2012.

C. Zhu and K. Sun, “Cryptanalysis and improvement of a chaotic encryption scheme,” Nonlinear Dynamics, vol. 92, pp. 147–162, 2018.

X. Chai, Z. Gan, and M. Zhang, “Chaos-based image encryption algorithm using DNA operations,” Neural Computing and Applications, vol. 31, pp. 611–626, 2019.

H. Liu and X. Wang, “Color image encryption using chaotic systems and DNA coding,” Optics and Laser Engineering, vol. 50, no. 12, pp. 1836–1843, 2012.

Downloads

Published

2026-02-06

How to Cite

Kadhim, T. M. (2026). OGA-Based Chaotic Key Generation for Lightweight IoT Encryption. CENTRAL ASIAN JOURNAL OF MATHEMATICAL THEORY AND COMPUTER SCIENCES, 7(1), 343–353. Retrieved from https://cajmtcs.casjournal.org/index.php/CAJMTCS/article/view/875

Issue

Section

Articles