8,027 research outputs found
Secure Communication in wise Homes using IoT
The advancement of the Internet of Things has madeextraordinary progress in recent years in academic as well as industrial fields. There are quite a few wise home systems (WHSs) that have been developed by major companies to achieve home automation. However, the nature of wise homesinescapable raises security and privacy concerns. In this paper, we propose an improved energy-efficient, secure, and privacy-preserving com-munication protocol for the WHSs. In our proposed scheme, data transmissions within the WHS are secured by a symmetric encryption scheme with secret keys being generated by anarchicsystems. Meanwhile, we incorporate message authentication codes to our scheme to guarantee data integrity and authenticity. We also provide detailed security analysis and performance evaluation in comparison with our previous work in terms of computational complexity, memory cost, and communication overhead
Statistical Review of Health Monitoring Models for Real-Time Hospital Scenarios
Health Monitoring System Models (HMSMs) need speed, efficiency, and security to work. Cascading components ensure data collection, storage, communication, retrieval, and privacy in these models. Researchers propose many methods to design such models, varying in scalability, multidomain efficiency, flexibility, usage and deployment, computational complexity, cost of deployment, security level, feature usability, and other performance metrics. Thus, HMSM designers struggle to find the best models for their application-specific deployments. They must test and validate different models, which increases design time and cost, affecting deployment feasibility. This article discusses secure HMSMs' application-specific advantages, feature-specific limitations, context-specific nuances, and deployment-specific future research scopes to reduce model selection ambiguity. The models based on the Internet of Things (IoT), Machine Learning Models (MLMs), Blockchain Models, Hashing Methods, Encryption Methods, Distributed Computing Configurations, and Bioinspired Models have better Quality of Service (QoS) and security than their counterparts. Researchers can find application-specific models. This article compares the above models in deployment cost, attack mitigation performance, scalability, computational complexity, and monitoring applicability. This comparative analysis helps readers choose HMSMs for context-specific application deployments. This article also devises performance measuring metrics called Health Monitoring Model Metrics (HM3) to compare the performance of various models based on accuracy, precision, delay, scalability, computational complexity, energy consumption, and security
Security performance and protocol consideration in optical communication system with optical layer security enabled by optical coding techniques
With the fast development of communication systems, network security issues have more and more impact on daily life. It is essential to construct a high degree of optical layer security to resolve the security problem once and for all.
Three different techniques which can provide optical layer security are introduced and compared. Optical chaos can be used for fast random number generation. Quantum cryptography is the most promising technique for key distribution. And the optical coding techniques can be deployed to encrypt the modulated signal in the optical layer.
A mathematical equation has been derived from information theory to evaluate the information-theoretic security level of the wiretap channel in optical coding schemes. And the merits and limitation of two coherent optical coding schemes, temporal phase coding and spectral phase coding, have been analysed.
The security scheme based on a reconfigurable optical coding device has been introduced, and the corresponding security protocol has been developed. By moving the encryption operation from the electronic layer to the optical layer, the modulated signals become opaque to the unauthorised users.
Optical code distribution and authentication is the one of the major challenges for our proposed scheme. In our proposed protocol, both of the operations are covered and defined in detail. As a preliminary draft of the optical code security protocol, it could be a useful guidance for further research
A DNA Based Colour Image Encryption Scheme Using A Convolutional Autoencoder
With the advancement in technology, digital images can easily be transmitted
and stored over the Internet. Encryption is used to avoid illegal interception
of digital images. Encrypting large-sized colour images in their original
dimension generally results in low encryption/decryption speed along with
exerting a burden on the limited bandwidth of the transmission channel. To
address the aforementioned issues, a new encryption scheme for colour images
employing convolutional autoencoder, DNA and chaos is presented in this paper.
The proposed scheme has two main modules, the dimensionality conversion module
using the proposed convolutional autoencoder, and the encryption/decryption
module using DNA and chaos. The dimension of the input colour image is first
reduced from N M 3 to P Q gray-scale image using the
encoder. Encryption and decryption are then performed in the reduced dimension
space. The decrypted gray-scale image is upsampled to obtain the original
colour image having dimension N M 3. The training and
validation accuracy of the proposed autoencoder is 97% and 95%, respectively.
Once the autoencoder is trained, it can be used to reduce and subsequently
increase the dimension of any arbitrary input colour image. The efficacy of the
designed autoencoder has been demonstrated by the successful reconstruction of
the compressed image into the original colour image with negligible perceptual
distortion. The second major contribution presented in this paper is an image
encryption scheme using DNA along with multiple chaotic sequences and
substitution boxes. The security of the proposed image encryption algorithm has
been gauged using several evaluation parameters, such as histogram of the
cipher image, entropy, NPCR, UACI, key sensitivity, contrast, etc. encryption
CellSecure: Securing Image Data in Industrial Internet-of-Things via Cellular Automata and Chaos-Based Encryption
In the era of Industrial IoT (IIoT) and Industry 4.0, ensuring secure data
transmission has become a critical concern. Among other data types, images are
widely transmitted and utilized across various IIoT applications, ranging from
sensor-generated visual data and real-time remote monitoring to quality control
in production lines. The encryption of these images is essential for
maintaining operational integrity, data confidentiality, and seamless
integration with analytics platforms. This paper addresses these critical
concerns by proposing a robust image encryption algorithm tailored for IIoT and
Cyber-Physical Systems (CPS). The algorithm combines Rule-30 cellular automata
with chaotic scrambling and substitution. The Rule 30 cellular automata serves
as an efficient mechanism for generating pseudo-random sequences that enable
fast encryption and decryption cycles suitable for real-time sensor data in
industrial settings. Most importantly, it induces non-linearity in the
encryption algorithm. Furthermore, to increase the chaotic range and keyspace
of the algorithm, which is vital for security in distributed industrial
networks, a hybrid chaotic map, i.e., logistic-sine map is utilized. Extensive
security analysis has been carried out to validate the efficacy of the proposed
algorithm. Results indicate that our algorithm achieves close-to-ideal values,
with an entropy of 7.99 and a correlation of 0.002. This enhances the
algorithm's resilience against potential cyber-attacks in the industrial
domain
Securing Wireless Communications of the Internet of Things from the Physical Layer, An Overview
The security of the Internet of Things (IoT) is receiving considerable
interest as the low power constraints and complexity features of many IoT
devices are limiting the use of conventional cryptographic techniques. This
article provides an overview of recent research efforts on alternative
approaches for securing IoT wireless communications at the physical layer,
specifically the key topics of key generation and physical layer encryption.
These schemes can be implemented and are lightweight, and thus offer practical
solutions for providing effective IoT wireless security. Future research to
make IoT-based physical layer security more robust and pervasive is also
covered
Physical layer authenticated image encryption for Iot network based on biometric chaotic signature for MPFrFT OFDM system
In this paper, a new physical layer authenticated encryption (PLAE) scheme based on the multi-parameter fractional Fourier transform–Orthogonal frequency division multiplexing (MP-FrFT-OFDM) is suggested for secure image transmission over the IoT network. In addition, a new robust multi-cascaded chaotic modular fractional sine map (MCC-MF sine map) is designed and analyzed. Also, a new dynamic chaotic biometric signature (DCBS) generator based on combining the biometric signature and the proposed MCC-MF sine map random chaotic sequence output is also designed. The final output of the proposed DCBS generator is used as a dynamic secret key for the MPFrFT OFDM system in which the encryption process is applied in the frequency domain. The proposed DCBS secret key generator generates a very large key space of (Formula presented.). The proposed DCBS secret keys generator can achieve the confidentiality and authentication properties. Statistical analysis, differential analysis and a key sensitivity test are performed to estimate the security strengths of the proposed DCBS-MP-FrFT-OFDM cryptosystem over the IoT network. The experimental results show that the proposed DCBS-MP-FrFT-OFDM cryptosystem is robust against common signal processing attacks and provides a high security level for image encryption application. © 2023 by the authors
9/7 LIFT Reconfigurable Architecture Implementation for Image Authentication
Considering the information system medical images are the most sensitive and critical types of data. Transferring medical images over the internet requires the use of authentication algorithms that are resistant to attacks. Another aspect is confidentiality for secure storage and transfer of medical images. The proposed study presents an embedding technique to improve the security of medical images. As a part of preprocessing that involves removing the high-frequency components, Gaussian filters are used. To get LL band features CDF9/7 wavelet is employed. In a similar way, for the cover image, the LL band features are obtained. In order to get the 1st level of encryption the technique of alpha blending is used. It combines the LL band features of the secret image and cover images whereas LH, HL, and HH bands are applied to Inverse CDF 9/7. The resulting encrypted image along with the key obtained through LH, HL, and HH bands is transferred. The produced key adds an extra layer of protection, and similarly, the receiver does the reverse action to acquire the original secret image. The PSNR acquired from the suggested technique is compared to PSNR obtained from existing techniques to validate the results. Performance is quantified in terms of PSNR. A Spartan 6 FPGA board is used to synthesize the complete architecture in order to compare hardware consumption
Physical Layer Security using Time-Reversal Pre-Coding based OFDM-DCSK Communication System with Artificial Noise Injection
In this paper, Time-Reversal (TR) pre-coding with Artificial Noise (AN) injection is proposed to enhance the physical layer security (PLS) performance in orthogonal Frequency Division Multiplexing-Differential Chaos Shift Keying (OFDM-DCSK) system, which is named the TRAN-OFDM-DCSK system. This approach is provided to achieve high data rates, high PL data security, and high reliability performance. The AN signal does not spoil the transmitted data to the genuine receiver, but it reduces the ungenuine detection performance. This system ensures the secrecy of communication to the genuine receiver when the sender knows the Channel State Information (CSI) of the genuine communication link. Still, the information about the instantaneous CSI of a possible eavesdropper does not know the transmitter. The performance of the proposed TRAN-OFDM-DCSK system is investigated and tested under a Flat Rayleigh Fading Channel (FRFC). An approach is provided for calculating the performance of Bit Error Rate (BER), and the expression of BER analytical is derived and compared with the simulation version. Furthermore, the ergodic Secrecy Rate (SR) is derived and analyzed at the genuine and ungenuine receivers over the FRFC. Our result shows the best performance for the genuine receiver compared with ungenuine receiver regarding secrecy performance for BER and SR
- …