Open Access Open Access  Restricted Access Subscription Access

Securing Privacy in BSN with Chaos Based Image Encryption Scheme

Harshvardhan Tiwari, Shilpa N, Harshitha R, Rakshatha S, Archana K N


BSN play the vital role in the field of telemedicine. In BSN sensor nodes transmit different physiological information, thus privacy and security of these information become very important in these networks. In this paper we have presented a simple and secure scheme for image encryption using one-dimensional chaotic maps. This image encryption scheme first shuffles the position of pixel values using bit-level permutation method and then changes the gray values to make the complex relationship between original plain image and encrypted image. Image scrambling and diffusing, both operations are performed by logistic map and tent map. Various experiments have been conducted to test the robustness and security of proposed image cipher algorithm and the experimental results shows that the proposed scheme is resistant to different cryptanalytic attacks and provides adequate security.

Full Text:



Shamir, A. : (1985) “Identity-Based Cryptosystems and Signature Schemes” CRYPTO’85 , 196: 47–53.

Boneh, D.; Franklin, M.: (2001) “Identity-Based Encryption from the Weil Pairing” CRYPTO’01, 2139: 213–229.

A. Abd Manaf et al.: (2011) “A Study of Attribute-Based Encryption for Body Sensor Networks” ICIEIS,251: 238–247.

Jang, C.S.; Lee, D.G.; Han, J.-W.; Park, J.H.: (2011) “Hybrid security protocol for wireless body area networks”, 11: 277–288.

Bao, S.D.; Shen, L.F.; Zhang, Y.T. : (2004) “A Novel Key Distribution of Body Area Networks for Telemedicine, In Proceedings of the 2004 IEEE International Workshop on Biomedical Circuits and Systems”, 1-

Fridrich, J.: (1998) “Symmetric Ciphers Based on Two-Dimensional Chaotic Maps”, 8: 1259–1284.

M. S. Baptista. : (1998) “Cryptography with chaos,” 240: 50–54.

R. Matthews. : (1989) “On the derivation of a chaotic encryption algorithm” 13: 29-42.

S.Li et al.: (2004) “Baptista-type chaotic cryptosystems: problems and countermeasures” 332: 368-375.

R.M. May. : (1976) “Simple mathematical models with very complicated dynamics” 261: 459–467.


  • There are currently no refbacks.