{"id":"https://openalex.org/W4414413320","doi":"https://doi.org/10.1186/s42400-024-00347-0","title":"$$e$$-CM: A novel approach to advancing chaotic dynamics in discrete one-dimensional maps for secure IoT applications","display_name":"$$e$$-CM: A novel approach to advancing chaotic dynamics in discrete one-dimensional maps for secure IoT applications","publication_year":2025,"publication_date":"2025-09-23","ids":{"openalex":"https://openalex.org/W4414413320","doi":"https://doi.org/10.1186/s42400-024-00347-0"},"language":"en","primary_location":{"id":"doi:10.1186/s42400-024-00347-0","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-024-00347-0","pdf_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-024-00347-0","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-024-00347-0","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5031080425","display_name":"Mir Nazish","orcid":"https://orcid.org/0000-0003-2488-9054"},"institutions":[{"id":"https://openalex.org/I135388327","display_name":"University of Kashmir","ror":"https://ror.org/032xfst36","country_code":"IN","type":"education","lineage":["https://openalex.org/I135388327"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Mir Nazish","raw_affiliation_strings":["Department of Electronics and Instrumentation Technology, University of Kashmir, Srinagar, 190006, India"],"affiliations":[{"raw_affiliation_string":"Department of Electronics and Instrumentation Technology, University of Kashmir, Srinagar, 190006, India","institution_ids":["https://openalex.org/I135388327"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5063557387","display_name":"Mahroosh Banday","orcid":"https://orcid.org/0000-0003-2052-2677"},"institutions":[{"id":"https://openalex.org/I135388327","display_name":"University of Kashmir","ror":"https://ror.org/032xfst36","country_code":"IN","type":"education","lineage":["https://openalex.org/I135388327"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"M. Tariq Banday","raw_affiliation_strings":["Department of Electronics and Instrumentation Technology, University of Kashmir, Srinagar, 190006, India"],"affiliations":[{"raw_affiliation_string":"Department of Electronics and Instrumentation Technology, University of Kashmir, Srinagar, 190006, India","institution_ids":["https://openalex.org/I135388327"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5031080425"],"corresponding_institution_ids":["https://openalex.org/I135388327"],"apc_list":null,"apc_paid":null,"fwci":3.6542,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.93864576,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":97},"biblio":{"volume":"8","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12162","display_name":"Cellular Automata and Applications","score":0.9894999861717224,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9850000143051147,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/chaotic","display_name":"Chaotic","score":0.8118000030517578},{"id":"https://openalex.org/keywords/lyapunov-exponent","display_name":"Lyapunov exponent","score":0.7702999711036682},{"id":"https://openalex.org/keywords/bifurcation","display_name":"Bifurcation","score":0.5809999704360962},{"id":"https://openalex.org/keywords/trajectory","display_name":"Trajectory","score":0.49470001459121704},{"id":"https://openalex.org/keywords/control-theory","display_name":"Control theory (sociology)","score":0.4465999901294708},{"id":"https://openalex.org/keywords/sensitivity","display_name":"Sensitivity (control systems)","score":0.4124999940395355},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4122999906539917},{"id":"https://openalex.org/keywords/range","display_name":"Range (aeronautics)","score":0.40070000290870667}],"concepts":[{"id":"https://openalex.org/C2777052490","wikidata":"https://www.wikidata.org/wiki/Q5072826","display_name":"Chaotic","level":2,"score":0.8118000030517578},{"id":"https://openalex.org/C191544260","wikidata":"https://www.wikidata.org/wiki/Q1238630","display_name":"Lyapunov exponent","level":3,"score":0.7702999711036682},{"id":"https://openalex.org/C2781349735","wikidata":"https://www.wikidata.org/wiki/Q4904824","display_name":"Bifurcation","level":3,"score":0.5809999704360962},{"id":"https://openalex.org/C13662910","wikidata":"https://www.wikidata.org/wiki/Q193139","display_name":"Trajectory","level":2,"score":0.49470001459121704},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.4851999878883362},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.46779999136924744},{"id":"https://openalex.org/C47446073","wikidata":"https://www.wikidata.org/wiki/Q5165890","display_name":"Control theory (sociology)","level":3,"score":0.4465999901294708},{"id":"https://openalex.org/C21200559","wikidata":"https://www.wikidata.org/wiki/Q7451068","display_name":"Sensitivity (control systems)","level":2,"score":0.4124999940395355},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4122999906539917},{"id":"https://openalex.org/C204323151","wikidata":"https://www.wikidata.org/wiki/Q905424","display_name":"Range (aeronautics)","level":2,"score":0.40070000290870667},{"id":"https://openalex.org/C106301342","wikidata":"https://www.wikidata.org/wiki/Q4117933","display_name":"Entropy (arrow of time)","level":2,"score":0.3824999928474426},{"id":"https://openalex.org/C126701199","wikidata":"https://www.wikidata.org/wiki/Q264224","display_name":"Complex dynamics","level":2,"score":0.37959998846054077},{"id":"https://openalex.org/C66696666","wikidata":"https://www.wikidata.org/wiki/Q17105612","display_name":"Sample entropy","level":3,"score":0.3336000144481659},{"id":"https://openalex.org/C60640748","wikidata":"https://www.wikidata.org/wiki/Q2337858","display_name":"Lyapunov function","level":3,"score":0.33219999074935913},{"id":"https://openalex.org/C198531522","wikidata":"https://www.wikidata.org/wiki/Q485146","display_name":"Sample (material)","level":2,"score":0.3287000060081482},{"id":"https://openalex.org/C86859247","wikidata":"https://www.wikidata.org/wiki/Q4781760","display_name":"Approximate entropy","level":3,"score":0.31450000405311584},{"id":"https://openalex.org/C44280652","wikidata":"https://www.wikidata.org/wiki/Q104837","display_name":"Phase (matter)","level":2,"score":0.30070000886917114},{"id":"https://openalex.org/C28826006","wikidata":"https://www.wikidata.org/wiki/Q33521","display_name":"Applied mathematics","level":1,"score":0.2865999937057495},{"id":"https://openalex.org/C2780586882","wikidata":"https://www.wikidata.org/wiki/Q7520643","display_name":"Simple (philosophy)","level":2,"score":0.2667999863624573},{"id":"https://openalex.org/C86243350","wikidata":"https://www.wikidata.org/wiki/Q2595915","display_name":"Bifurcation diagram","level":4,"score":0.2621999979019165},{"id":"https://openalex.org/C79379906","wikidata":"https://www.wikidata.org/wiki/Q3174497","display_name":"Dynamical systems theory","level":2,"score":0.2614000141620636},{"id":"https://openalex.org/C121864883","wikidata":"https://www.wikidata.org/wiki/Q677916","display_name":"Statistical physics","level":1,"score":0.2599000036716461},{"id":"https://openalex.org/C2781402108","wikidata":"https://www.wikidata.org/wiki/Q1642961","display_name":"H\u00e9non map","level":3,"score":0.25780001282691956}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1186/s42400-024-00347-0","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-024-00347-0","pdf_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-024-00347-0","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:2084fdcebb1041ab863505e935e472d8","is_oa":true,"landing_page_url":"https://doaj.org/article/2084fdcebb1041ab863505e935e472d8","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cybersecurity, Vol 8, Iss 1, Pp 1-33 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s42400-024-00347-0","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-024-00347-0","pdf_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-024-00347-0","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G7460481564","display_name":null,"funder_award_id":"190520461818","funder_id":"https://openalex.org/F4320320767","funder_display_name":"University Grants Commission"}],"funders":[{"id":"https://openalex.org/F4320320767","display_name":"University Grants Commission","ror":"https://ror.org/04p800546"}],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4414413320.pdf"},"referenced_works_count":47,"referenced_works":["https://openalex.org/W1964090637","https://openalex.org/W1971205388","https://openalex.org/W1972971222","https://openalex.org/W1976474044","https://openalex.org/W1978383253","https://openalex.org/W1990774234","https://openalex.org/W1992053929","https://openalex.org/W1992467429","https://openalex.org/W1993358708","https://openalex.org/W2010006328","https://openalex.org/W2056105196","https://openalex.org/W2082242351","https://openalex.org/W2085481500","https://openalex.org/W2102892532","https://openalex.org/W2122925582","https://openalex.org/W2214040503","https://openalex.org/W2257534475","https://openalex.org/W2278852559","https://openalex.org/W2460627154","https://openalex.org/W2463317129","https://openalex.org/W2507650878","https://openalex.org/W2523659803","https://openalex.org/W2592206357","https://openalex.org/W2801893904","https://openalex.org/W2895262474","https://openalex.org/W2895283602","https://openalex.org/W2905741893","https://openalex.org/W2946943331","https://openalex.org/W2965923646","https://openalex.org/W2976828254","https://openalex.org/W3005341457","https://openalex.org/W3165129070","https://openalex.org/W3183680798","https://openalex.org/W3187778974","https://openalex.org/W3197295360","https://openalex.org/W3201318708","https://openalex.org/W3213404197","https://openalex.org/W4206253007","https://openalex.org/W4229742883","https://openalex.org/W4312197525","https://openalex.org/W4313258481","https://openalex.org/W4389347592","https://openalex.org/W4390517532","https://openalex.org/W4391093983","https://openalex.org/W4399800561","https://openalex.org/W4401907645","https://openalex.org/W4404446697"],"related_works":[],"abstract_inverted_index":{"Abstract":[0],"One-dimensional":[1],"(1D)":[2],"chaotic":[3,74,100,175,247],"maps":[4,80,101,172,284,424],"play":[5],"a":[6,57,290,312],"pivotal":[7],"role":[8],"in":[9,41,189,288,300,330,334,381,435],"diverse":[10],"fields,":[11],"including":[12],"control":[13,35,75],"systems,":[14,20],"secure":[15],"communication,":[16],"and":[17,24,47,120,146,155,159,193,196,202,243,309,336,350,383,391,408,411,425,441],"modeling":[18],"complex":[19,174],"enabling":[21],"to":[22,71,81,128,327,376],"capture":[23],"analyze":[25],"the":[26,54,73,86,130,184,190,209,215,220,262,275,301,320,353,398,415],"intricate":[27],"behaviors":[28],"of":[29,78,85,186,265,315],"dynamical":[30],"processes.":[31],"However,":[32],"their":[33,39],"limited":[34],"parameter":[36,76],"ranges":[37],"constrain":[38],"effectiveness":[40],"security":[42],"applications":[43],"such":[44,139],"as":[45,140,429],"cryptography":[46],"pseudo-random":[48,291],"number":[49],"generation.":[50],"Addressing":[51],"these":[52],"concerns,":[53],"paper":[55],"proposes":[56],"universal":[58],"$$e$$":[59,87,132,166,276,416],"<mml:math":[60,88,133,167,235,249,267,277,358,367,417],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\">":[61,89,134,168,236,250,268,278,359,368,418],"<mml:mi>e</mml:mi>":[62,90,135,169,279,419],"</mml:math>":[63,91,136,170,242,256,272,280,363,372,420],"-CM":[64,92,137,421],"chaotification":[65],"model,":[66],"based":[67,422],"on":[68,352],"Euler\u2019s":[69],"number,":[70],"enhance":[72],"range":[77],"one-dimensional":[79],"infinity.":[82],"The":[83,162,200,229,295,323,344,394],"efficacy":[84],"model":[93],"has":[94,297,325,346],"been":[95,126,286,298,348],"assessed":[96],"for":[97,304,433],"thirteen":[98],"1D":[99,283],"including,":[102],"Chebyshev,":[103],"Logistic,":[104,110,119],"Sine,":[105,108],"Cubic,":[106],"Coupled":[107],"Cubic":[109],"Quadratic,":[111,114],"Renyi,":[112],"Simple":[113],"Sine-Sinh-Sine,":[115],"Singer,":[116],"Squared":[117],"Sine":[118],"Tent":[121],"maps.":[122],"Various":[123],"tests":[124],"have":[125,285],"conducted":[127],"evaluate":[129],"enhanced":[131,282,423],"maps,":[138],"Lyapunov":[141,181],"exponents,":[142],"bifurcation":[143,191],"diagrams,":[144],"approximate":[145,197],"sample":[147,195],"entropies,":[148],"time":[149],"sensitivity":[150],"analysis,":[151],"0\u20131":[152,230],"test,":[153],"2D":[154,201],"3D":[156,203],"phase":[157,204,217],"plots,":[158,257],"cobweb":[160,221],"plots.":[161],"findings":[163],"indicate":[164,396],"that":[165,208,397],"-CM-based":[171,281],"exhibit":[173],"dynamics":[176],"characterized":[177],"by":[178],"elevated":[179],"positive":[180],"exponent":[182],"values,":[183],"lack":[185],"periodic":[187],"windows":[188],"plot,":[192],"higher":[194],"entropy":[198],"values.":[199],"trajectory":[205],"plots":[206,222],"demonstrate":[207],"points":[210],"are":[211,443],"evenly":[212],"distributed":[213],"across":[214],"entire":[216],"space,":[218],"while":[219,338],"illustrate":[223],"densely":[224],"packed":[225],"irregular":[226],"rectangular":[227],"trajectories.":[228],"test":[231],"produces":[232],"linear":[233],"$$M-t$$":[234],"<mml:mrow>":[237,251,269,360,369],"<mml:mi>M</mml:mi>":[238],"<mml:mo>-</mml:mo>":[239,253],"<mml:mi>t</mml:mi>":[240],"</mml:mrow>":[241,255,271,362,371],"Brownian":[244],"motion":[245],"resembling":[246],"$$p-q$$":[248],"<mml:mi>p</mml:mi>":[252],"<mml:mi>q</mml:mi>":[254],"alongside":[258,311],"indicator":[259],"value":[260,264],"approaching":[261],"ideal":[263],"$$1$$":[266],"<mml:mn>1</mml:mn>":[270],".":[273],"Additionally,":[274],"employed":[287],"designing":[289],"bit":[292],"generator":[293],"(PRBG).":[294],"PRBG":[296,324,345,399,426],"evaluated":[299],"MATLAB":[302],"simulator":[303],"operational":[305],"efficiency,":[306,440],"bit-generation":[307],"speed,":[308],"performance,":[310],"rigorous":[313],"assessment":[314],"its":[316,378],"statistical":[317],"randomness":[318],"through":[319],"NIST":[321,342],"tests.":[322,343],"proven":[326],"be":[328],"efficient":[329],"resource":[331],"usage,":[332,386,403],"faster":[333],"execution,":[335],"high-performing,":[337],"also":[339,347],"successfully":[340],"passing":[341],"implemented":[349],"analyzed":[351],"leading":[354],"ARM":[355],"Cortex-M":[356],"$$4$$":[357],"<mml:mn>4</mml:mn>":[361],"-based":[364],"LPC":[365],"$$4357$$":[366],"<mml:mn>4357</mml:mn>":[370],"IoT":[373,436],"development":[374],"board":[375],"showcase":[377],"practical":[379],"efficiency":[380],"RAM":[382],"ROM":[384],"memory":[385,402],"execution":[387,406],"time,":[388,407],"current,":[389],"energy,":[390],"power":[392,410],"consumption.":[393,413],"results":[395],"demonstrates":[400],"smaller":[401],"significantly":[404],"reduced":[405],"minimal":[409],"energy":[412],"Thus,":[414],"stand":[427],"out":[428],"an":[430],"excellent":[431],"choice":[432],"use":[434],"environments,":[437],"where":[438],"security,":[439],"performance":[442],"paramount.":[444]},"counts_by_year":[{"year":2025,"cited_by_count":3}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
