Open Access Open Access  Restricted Access Subscription or Fee Access

Design of Block Cipher Based Lightweight Cryptography for Image Encryption Decryption Process

Monika Sharma, Mohit Sharma

Abstract


The Internet of Things (IOT) is a promising future technology that will connect billions of devices.
More correspondence is expected to be delivered. Information security and data pinnacles can be
dangerous. The size of the device in this engineering is basically small, and it uses very little power.
Many rounds of encryption are basically a waste of Gadget vitality requirements. However, a less
complicated calculation, conceivable compromise, necessitated uprightness. It is a 64-bit square
secret key that encrypts data with another 64-bit key. To replace the system simulation, the
calculation engineering is a mix of Feistel and uniform substitution. The results show that the
calculation only provides a significant level of security after five rounds of encryption. The Internet of
Things provided proof for providing social and financial benefits to the developing and emerging
economies, including supported farming, water quality issues, human services issues, projects, and
condition management, among other things. IOT also promises to become a means of achieving the
United Nations' Sustainable Development Goals. The vast scope of IOT problems is nothing new to
industrialized countries. Developing districts must also respond to the benefits of the Internet of
Things. Furthermore, the requirements and challenges of implementing this concept in less-developed
areas must be addressed, including frameworks, market and venture motivating forces, specialized
skills, and approach assets. Because the connections between things, the planet, and the general
public are becoming increasingly dynamic, the Internet of Things that is currently taking place
promises to deliver a progressive, fully connected brilliant world. However, the tests and concerns
about IOT should be considered and addressed in order to determine the potential benefits to
individuals, society, and the economy. Finally, maximizing the benefits of the Internet of Things while
minimizing security risks cannot be achieved by engaging in a never-ending debate that pits IOT
against its attributes. To give away the best routes in the future, it will take dedicated dedication and
collaboration across partner meetings. The use of IOT segments has raised a slew of legal questions
and exacerbated already-existing legal problems related to the Internet. The investigations are
massive in scope, and the rapid advancement of IOT technology addresses the capacity of the relevant
approach, as well as the legal and administrative zones, to be modified.


Keywords


Internet of Thing, MANET, WSN, Encryption, Decryption, Block Cipher

Full Text:

PDF

References


Moon AH, Iqbal U, Bhat GM. Light weight authentication framework for WSN. Chennai, India: IEEE Publications; 2016 Mar 3–5. PMID 20163099–3105p.

Rani DJ, Roslin SE. Light weight cryptographic algorithms for medical internet of things (IoT)-a review. Coimbatore, India: IEEE Publications; 2016 Nov 19. p. 2016 Nov1–6p.

Satpathy S, Mathew S, Suresh V, et al. Ultra-low energy security circuits for IoT applications. Vol. 2016. Scottsdale, AZ: IEEE Publications; 2016 Oct 2–5. p. 682–685p.

Venkata SB, Yellai P, Verma GD, et al. A new Light Weight Transport Method for secured transmission of data for IoT. Vol. 2016. Bangalore, India: IEEE Publications; 2016 Nov 6–9. p. 1–6.

Sultan A, Yang X, Hussain SB, et al. Physical-layer data encryption using chaotic constellation rotation in OFDM-PON. Vol. 2018. Islamabad, Pakistan: IEEE Publications; 2018 Jan 9–13. p. 446–448p.

Yang X, Shen Z, Hu X, et al. Physical layer encryption algorithm for chaotic optical OFDM transmission against chosen-plaintext attacks. Vol. 2016. Trento, Italy: IEEE Publications; 2016 Jul 10–14. p. 1–5p.

Chen H, Yang X, Sun W, et al. Physical-layer OFDM data encryption using chaotic ZCMT precoding matrix. Vol. 2017. Girona, Spain: IEEE Publications; 2017 Jul 2–6. p. 1–4p.

Baojian G, Yongling L, Aiqin H, Xiaoning Z, Qian W. New physical layer encryption algorithm based on DFT-S-OFDM system. Vol. 2013. Shenyang, China: IEEE Publications; 2013 Dec 20–22. p. 2018–2022p.

Bi M, Fu X, Zhou X, Zhang L, Yang G, Yang X, Xiao S, Hu W. A key space enhanced chaotic encryption scheme for physical layer security in OFDM-PON. IEEE Photonics J. 2017;9(1):1–10. doi: 10.1109/JPHOT.2017.2661581.

Halabi D, Hamdan S, Almajali S. Enhance the security in smart home applications based on IOT-CoAP protocol. Vol. 2018. Beirut, Lebanon: IEEE Publications; 2018 Apr 25–27. p. 81–85p.

Choi J, Shin Y, Cho S. Study on information security sharing system among the industrial IoT service and product provider. Vol. 2018. Chiang Mai, Thailand: IEEE Publications; 2018 Jan 10–12. p. 551–555p.

Jeon JH, Kim KH, Kim JH. Block chain based data security enhanced IoT server platform. Vol. 2018. Chiang Mai, Thailand: IEEE Publications; 2018 Jan 10–12. p. 941–4.

Gunduz MZ, Das R. A comparison of cyber-security oriented test beds for IoT-based smart grids. Vol. 2018. Antalya, Turkey: IEEE Publications; 2018 Mar 22–25. p. 1–6.

Varshney G, Gupta H. A security framework for IOT devices against wireless threats. Vol. 2018. Noida, India: IEEE Publications; 2017 Aug 10–11. p. 1–6.

Zhang W, Meng J, Ma C. Research progress of applying digital watermarking technology for printing. Vol. 2018. Shenyang, China: IEEE Publications; 2018 Jun 9–11. p. 4479–4482p.

Muñoz-Ramirez DO, Ponomaryov V, Reyes-Reyes R, et al. A robust watermarking scheme to JPEG compression for embedding a color watermark into digital images. Vol. 2018. Kyiv, Ukraine: IEEE Publications; 2018 May 24–27. p. 619–624p.

Patra A, Saha A, Chakraborty AK, et al. A new approach to invisible water marking of color images using alpha blending. In 2018 Emerging Trends in electronic devices and computational techniques (EDCT). IEEE Publications; 2018. p. 1–4.

Ansari IA, Ahn CW, Pant M. On the security of block-based SVD image watermarking in spatial and transform domains. Vol. 2018. Phayao, Thailand: IEEE Publications; 2018 Feb 25–28. p. 44–48p.

Komarov AS, Buehner M. Adaptive probability thresholding in automated ice and open water detection from RADARSAT-2 images. IEEE Geosci Remote Sens Lett. 2018;15(4):552–6. doi: 10.1109/LGRS.2018.2806189.

Dong A, Zeng R. Research and implementation based on three-dimensional model watermarking algorithm. Vol. 2017. Nanjing, China: IEEE Publications; 2017 Apr 21–23. p. 277–282p.

Usman M, Ahmed I. Shujaat khan. SIT: A light weight encryption algorithm for secure internet of things. International Journal of Advanced Computer Science and Applications. Vol. 8(1); 2017.

Bahrami M, Li D, Singhal M, et al. An efficient parallel implementation of a light-weight data privacy method for mobile cloud users. Vol. 2016. Salt Lake City: IEEE Publications; 2016 Nov 14. p. 51–58p.

Bansod G, Patil A, Sutar S, et al. An ultra lightweight encryption design for security in pervasive computing. Vol. 2016. New York: IEEE Publications; 2016 Apr 9–10. p. 79–84p.

Mahmood Z, Ning H, Ghafoor A. Lightweight two-level session key management for end user authentication in Internet of Things. Chengdu, China: IEEE Publications; 2016 Dec 15–18. PMID 2016323–327.

Bai E, Yang Y, Jiang X. Image digital watermarking based on a novel clock-controlled generator. Hangzhou, China: IEEE Publications; 2017 Nov 11–13. p. 1224–1228p.

Evsutin O, Meshcheryakov R, Genrikh V, et al. An improved algorithm of digital watermarking based on wavelet transform using learning automata. Vol. 2017. Vladivostok, Russia: IEEE Publications; 2017 Sep 25–29. p. 49–53p.

Gill R, Soni R. Digital image watermarking using 2-DCT and 2-DWT in gray images. Vol. 2017. Madurai, India: IEEE Publications; 2017 Jun 15–16. p. 797–803.

Goli MS, Naghsh A. Introducing a new method robust against crop attack in digital image watermarking using two-step Sudoku;2017. Apr 19–20. Shahrekord, Iran: IEEE Publications:2017. p. 237–42.

Almulhim M, Zaman N. Proposing secure and lightweight authentication scheme for IoT based e-health applications. Vol. 2018. Chuncheon, South Korea: IEEE Publications; 2018 Feb 11–14. p. 481–487p.

Aman MN, Chua KC, Sikdar B. A light-weight mutual authentication protocol for iot systems. Vol. 2017. Singapore: IEEE Publications; 2017 Dec 4–8. p. 1–6p.

Maurin T, Ducreux LF, Caraiman G, et al. Iot security assessment through the interfaces p-scan test bench platform2018. Mar 19–23. Dresden, Germany: IEEE Publications:2018. p. 1007–1008p.

Kumar S, Dutta A. A study on robustness of block entropy based digital image watermarking techniques with respect to various attacks. Vol. 2017. Bangalore, India: IEEE Publications; 2016 May 20–21. p. 1802–1806p.

Kumaran NS, Abinaya S. Comparison analysis of digital image watermarking using DWT and LSB technique; 2016 Apr 6–8. Melmaruvathur. India: IEEE Publications:2016.0448–0451p.

Patil HM, Rindhe BU. Study and overview of combined NSCT-DCT digital image watermarking. Vol. 2017. Jalgaon, India: IEEE Publications; 2016 Dec 22. p. 302–307p.


Refbacks

  • There are currently no refbacks.