Open Access Open Access  Restricted Access Subscription or Fee Access

Performance Assessment of Lightweight Cryptography in Image Processing for IoT/WSN Applications

Monika Sharma, Mohit Sharma

Abstract


The Internet of Things (IoT) can serve as an interface to small processing tools for future technology.
More communication data is required and safety of information can be dangerous. Pinnacles of data
and security of information can be a risk. This gadget is basically a small, low power consumption in
this engineering. Many encryption rounds are basically an abuse of the Gadget vitality criteria.
Unrelenting calculation as it may require uprightness, conceivable compromise. It is a 64-bit secret
key which needs a 64-bit key to encrypt data. The calculation is designed to combine Feistel and
replace the Simulation system in a uniform way. The results show that the calculation provides only
five rounds of encryption with significant security. The proposed work shows the implementation of
the lightweight symmetrical key algorithm for secure data transfer of images and text using the image
encryption system However, the tests and concerns about IoT should be considered and addressed in
order to determine the potential benefits to individuals, society, and the economy. Finally, maximizing
the benefits of the Internet of Things while minimizing security risks cannot be achieved by engaging
in a never-ending debate that pits IoT against its attributes. To give away the best routes in the future,
it will take dedicated dedication and collaboration across partner meetings. The use of IoT segments
has raised a slew of legal questions and exacerbated already-existing legal problems related to the
Internet. The investigations are massive in scope, and the rapid advancement of IoT technology
addresses the capacity of the relevant approach, as well as the legal and administrative zones, to be
modified.


Keywords


Internet of Thing, MANET, WSN, encryption, decryption, block cipher

Full Text:

PDF

References


Halabi Dana. Salam Hamdan. Enhance the security in smart home applications based on IoT-CoAP protocol.

Choi Jongsoek, Shin Yongtae. Study on information security sharing system among the industrial IOT service and product provider. IEEE ICOIN, 2018.

Hyeong Jeon Jin, Kim Ki-Hyung. Block chain-based data security enhanced IOT server platform, IEEE ICOIN; 2018.

Muhammet Zekeriya Gunduz, Resul Das. A comparison of cyber security-oriented test beds for IOT based smart grids. IEEE Publications; 2016.

Gupta Himanshu, Garima Varshney. A security Framework for IOT devices against wireless threats, second international conference on telecommunication and networks; 2017.

Maurin Thomas, Lurent George Caraiman. IOT security assessment through the interfaces P-SCAN test bench platform, 2018. EDAA.

Kumar Sanjay, Ambar Dutta. A Study on Robustness of Block Entropy Based Digital Image Watermarking Techniques with respect to Various Attacks. IEEE Publications; 2016.

Senthil Kumaran N, Abinaya S. Comparison analysis of digital image watermarking using DWT and LSB technique. IEEE Publications; 2016.

Patil Harsha M, Baban U. Rindhe. Study and Overview of Combined NSCT–DCT Digital Image Watermarking. 2016, IEEE.

Wen Zhang, Jie Men, Conglong Ma. Research progress of applying digital watermarking technology for printing. 2018. IEEE Publications.

Muñoz-Ramirez David-Octavio, Volodymyr Ponomaryo Rogelio, Reyes-Reyes Volodymyr Kyrychenko, Oleksandr Pechenin Alexander Totsky. A robust watermarking scheme to JPEG compression for embedding a color watermark into digital images. IEEE Publications; 2018.

Anirban Patra Arijit Saha, Chakraborty Ajoy Kumar, Bhattacharya Kallol. A new approach to invisible water marking of color images using alpha blending. IEEE Publications; 2018.

Ahmad Ansari Irshad, Wook Ahn Chang, Pant Millie. On the Security of Block-based SVD image watermarking in spatial and transform domains. IEEE Publications; 2018.

Komarov Alexander S. Adaptive probability thresholding in automated ice and open water detection from RADARSAT-2 images. IEEE Publications; 2018.

Dong Aoshuang, Rui Zeng. Research and implementation based on three-dimensional model watermarking algorithm. IEEE Publications; 2017.

Naveed Aman Muhammad, Chua Kee Chaing. A light weight mutual authentication protocol for IOT system; 2017.

Baahrami Mehdi, Li Dong, Mukesh Singhal. Efficient parallel implementation of light weight data privacy method for cloud users; seventh international workshop on data intensive computing in clouds; 2016.

Gaurav Bansod Abhijit Patil. An Ultra-light weight design for security in pervasive computing IEEE second international conference on big data security cloud; 2016.

Enjian Bai Yiyu Yang, Jiang Xueqin. Image digital watermarking based on a novel clock-controlled generator. IEEE Publications; 2017.

Evsutin Oleg, Meshcheryakov Roman, Genrikh Viktor, Nekrasov Denis, Yugov Nikolai. An improved algorithm of digital watermarking based on wavelet transform using learning automata. IEEE Publications; 2017.

Gill Ritu, Soni Rishi. Digital image watermarking using 2-DCT and 2- DWT in gray images. IEEE Publications; 2017.

Shahab Goli Mohammad, Alireza Naghsh. Introducing a new method robust against crop attack in digital image watermarking using two-step Sudoku. IEEE Publications; 2017.

Usman Muhammad, Ahmed Irfan. Shujaat khan. SIT: A light weight encryption algorithm for secure Internet of Things. international Journal of advanced computer science and applications. 2017;8(1).

Almulhim Maria, Zaman Noor. Proposing secure and the lightweight authentication scheme for IOT based e health applications. International conference on advance communication technology; 2018.

Zahid Mahmood, Huansheng Ning. Light weight two level session key management for end user authentication in Internet of Things IEEE international conference on IOT; 2016.

Ayaz Hassan moon, Ummer Iqbal. Light weight authentication framework for WSN International conference on Electrical, Electronics and Optimization techniques; 2016.

Rani D Jamuna. Light weight cryptographic algorithm for medical Internet of Things. Online International Conference on Green Engineering and Technology; 2016.

Sudhir Satpathy, Sanu Mathew. Ultra-low-energy security circuits for IOT applications 34th international conference on computer design. IEEE Publications; 2016.

Sainandan Bayya, Vankata Prabhkar Yellai. A new light weight transport method for secured transmission of data for IOT, international journal of electrical, electronic engineering, 2016.

Sultan Amber, Yang Xuelin. Physical layer data encryption using chaotic constellation rotation in OFDM-PON. Proceedings of the 15th international Bhurban conference on applied science and technology Islamabad, Pakistan; 2018.

Yang Xuelin, Zanwei. Shen. Physical layer encryption algorithm for chaotic optical OFDM transmission against chosen plaintext attacks. In: ICTON 2016.

Chen Han, Yang Xuelin. Physical layer OFDM data encryption using chaotic ZCMT precoding matrix. IEEE, ICTON 2017.

Gao Baojian Luo Yongling, Hou Aiqin. New physical layer encryption algorithm based on DFT-S-OFDM system International Conference on Mechatronic Sciences. Shenyang, China: Electric Engineering and Computer; 2013.

Bi Meihua, Fu Xiaosong, Zhou X, Zhang L, Yang G, Yang X, Xiao S, Hu W. A key space enhanced Chaotic encryption scheme for physical layer security in OFDM-PON. IEEE Photonics J. 2017;9(1):1–10. doi: 10.1109/JPHOT.2017.2661581.




DOI: https://doi.org/10.37628/ijcam.v7i1.1291

Refbacks

  • There are currently no refbacks.