Machine-to-machine (M2M) communication networks consist of resource-constrained autonomous devices, also known as autonomous Internet of things (IoTs) or machine-type communication devices (MTCDs) which act as a backb...Machine-to-machine (M2M) communication networks consist of resource-constrained autonomous devices, also known as autonomous Internet of things (IoTs) or machine-type communication devices (MTCDs) which act as a backbone for Industrial IoT, smart cities, and other autonomous systems. Due to the limited computing and memory capacity, these devices cannot maintain strong security if conventional security methods are applied such as heavy encryption. This article proposed a novel lightweight mutual authentication scheme including elliptic curve cryptography (ECC) driven end-to-end encryption through curve25519 such as (i): efficient end-to-end encrypted communication with pre-calculation strategy using curve25519;and (ii): elliptic curve Diffie-Hellman (ECDH) based mutual authentication technique through a novel lightweight hash function. The proposed scheme attempts to efficiently counter all known perception layer security threats. Moreover, the pre-calculated key generation strategy resulted in cost-effective encryption with 192-bit curve security. It showed comparative efficiency in key strength, and curve strength compared with similar authentication schemes in terms of computational and memory cost, communication performance and encryption robustness.展开更多
This paper introduces a novel lightweight colour image encryption algorithm,specifically designed for resource-constrained environments such as Internet of Things(IoT)devices.As IoT systems become increasingly prevale...This paper introduces a novel lightweight colour image encryption algorithm,specifically designed for resource-constrained environments such as Internet of Things(IoT)devices.As IoT systems become increasingly prevalent,secure and efficient data transmission becomes crucial.The proposed algorithm addresses this need by offering a robust yet resource-efficient solution for image encryption.Traditional image encryption relies on confusion and diffusion steps.These stages are generally implemented linearly,but this work introduces a new RSP(Random Strip Peeling)algorithm for the confusion step,which disrupts linearity in the lightweight category by using two different sequences generated by the 1D Tent Map with varying initial conditions.The diffusion stage then employs an XOR matrix generated by the Logistic Map.Different evaluation metrics,such as entropy analysis,key sensitivity,statistical and differential attacks resistance,and robustness analysis demonstrate the proposed algorithm's lightweight,robust,and efficient.The proposed encryption scheme achieved average metric values of 99.6056 for NPCR,33.4397 for UACI,and 7.9914 for information entropy in the SIPI image dataset.It also exhibits a time complexity of O(2×M×N)for an image of size M×N.展开更多
The lightweight encryption algorithm based on Add-Rotation-XOR(ARX)operation has attracted much attention due to its high software affinity and fast operation speed.However,lacking an effective defense scheme for phys...The lightweight encryption algorithm based on Add-Rotation-XOR(ARX)operation has attracted much attention due to its high software affinity and fast operation speed.However,lacking an effective defense scheme for physical attacks limits the applications of the ARX algorithm.The critical challenge is how to weaken the direct dependence between the physical information and the secret key of the algorithm at a low cost.This study attempts to explore how to improve its physical security in practical application scenarios by analyzing the masking countermeasures of ARX algorithms and the leakage causes.Firstly,we specify a hierarchical security framework by quantitatively evaluating the indicators based on side-channel attacks.Then,optimize the masking algorithm to achieve a trade-off balance by leveraging the software-based local masking strategies and non-full-round masking strategies.Finally,refactor the assembly instruction to improve the leaks by exploring the leakage cause at assembly instruction.To illustrate the feasibility of the proposed scheme,we further conducted a case study by designing a software-based masking method for Chaskey.The experimental results show that the proposed method can effectively weaken the impact of physical attacks.展开更多
Medical institutions frequently utilize cloud servers for storing digital medical imaging data, aiming to lower both storage expenses and computational expenses. Nevertheless, the reliability of cloud servers as third...Medical institutions frequently utilize cloud servers for storing digital medical imaging data, aiming to lower both storage expenses and computational expenses. Nevertheless, the reliability of cloud servers as third-party providers is not always guaranteed. To safeguard against the exposure and misuse of personal privacy information, and achieve secure and efficient retrieval, a secure medical image retrieval based on a multi-attention mechanism and triplet deep hashing is proposed in this paper (abbreviated as MATDH). Specifically, this method first utilizes the contrast-limited adaptive histogram equalization method applicable to color images to enhance chest X-ray images. Next, a designed multi-attention mechanism focuses on important local features during the feature extraction stage. Moreover, a triplet loss function is utilized to learn discriminative hash codes to construct a compact and efficient triplet deep hashing. Finally, upsampling is used to restore the original resolution of the images during retrieval, thereby enabling more accurate matching. To ensure the security of medical image data, a lightweight image encryption method based on frequency domain encryption is designed to encrypt the chest X-ray images. The findings of the experiment indicate that, in comparison to various advanced image retrieval techniques, the suggested approach improves the precision of feature extraction and retrieval using the COVIDx dataset. Additionally, it offers enhanced protection for the confidentiality of medical images stored in cloud settings and demonstrates strong practicality.展开更多
Ensuring the secure transmission of secret messages,particularly through video—one of the most widely used media formats—is a critical challenge in the field of information security.Relying on a single-layered secur...Ensuring the secure transmission of secret messages,particularly through video—one of the most widely used media formats—is a critical challenge in the field of information security.Relying on a single-layered security approach is often insufficient for safeguarding sensitive data.This study proposes a triple-lightweight cryptographic and steganographic model that integrates the Hill Cipher Technique(HCT),Rotation Left Digits(RLD),and Discrete Wavelet Transform(DWT)to embed secret messages within video frames securely.The approach begins with encrypting the secret text using a private key matrix(PK^(1))of size 2×2 up to 6×6 via HCT.A second encryption layer is applied using a dynamic private key(PK2)derived from the RGB pixel values of the video frame,resulting in a rotated cipher.The doubly encrypted message is then embedded into the video frames using the DWT method.Upon transmission,the concealed message is extracted using inverse DWT and decrypted in two steps—first with PK2 and then with the inverse of PK^(1).Experiments conducted using MPEG video sequences and message lengths ranging from 10 to 300 bytes demonstrate strong performance in terms of Mean Square Error(MSE),Peak Signal-to-Noise Ratio(PSNR),and Correlation Coefficient(CC)between original and encrypted messages.The similarity between original and stego frames is further validated using Structural Similarity Index(SSIM),Mean Absolute Error(MAE),Number of Pixel Change Rate(NPCR),and Unified Average Changing Intensity(UACI).Results confirm that utilizing video frames to generate PK2 offers superior security compared to static key images.Moreover,the indistinguishability between original and stego frames highlights the method’s robustness against visual and statistical attacks.展开更多
Robust encryption techniques require heavy computational capability and consume large amount of memory which are unaffordable for resource constrained IoT devices and Cyber-Physical Systems with an inclusion of genera...Robust encryption techniques require heavy computational capability and consume large amount of memory which are unaffordable for resource constrained IoT devices and Cyber-Physical Systems with an inclusion of general-purpose data manipulation tasks.Many encryption techniques have been introduced to address the inability of such devices,lacking in robust security provision at low cost.This article presents an encryption technique,implemented on a resource constrained IoT device(AVR ATmega2560)through utilizing fast execution and less memory consumption properties of curve25519 in a novel and efficient lightweight hash function.The hash function utilizes GMP library for multi-precision arithmetic calculations and pre-calculated curve points to devise a good cipher block using ECDH based key exchange protocols and large random prime number generator function.展开更多
Authentication per frame is an implicit necessity for security in wireless local area networks(WLANs). We propose a novel per frame secure authentication scheme which provides authentication to data frames in WLANs....Authentication per frame is an implicit necessity for security in wireless local area networks(WLANs). We propose a novel per frame secure authentication scheme which provides authentication to data frames in WLANs. The scheme involves no cryptographic overheads for authentication of frames.It utilizes the sequence number of the frame along with the authentication stream generators for authentication.Hence, it requires no extra bits or messages for the authentication purpose and also no change in the existing frame format is required. The scheme provides authentication by modifying the sequence number of the frame at the sender, and that the modification is verified at the receiver. The modified sequence number is protected by using the XOR operation with a random number selected from the random stream. The authentication is lightweight due to the fact that it requires only trivial arithmetic operations like the subtraction and XOR operation.展开更多
文摘Machine-to-machine (M2M) communication networks consist of resource-constrained autonomous devices, also known as autonomous Internet of things (IoTs) or machine-type communication devices (MTCDs) which act as a backbone for Industrial IoT, smart cities, and other autonomous systems. Due to the limited computing and memory capacity, these devices cannot maintain strong security if conventional security methods are applied such as heavy encryption. This article proposed a novel lightweight mutual authentication scheme including elliptic curve cryptography (ECC) driven end-to-end encryption through curve25519 such as (i): efficient end-to-end encrypted communication with pre-calculation strategy using curve25519;and (ii): elliptic curve Diffie-Hellman (ECDH) based mutual authentication technique through a novel lightweight hash function. The proposed scheme attempts to efficiently counter all known perception layer security threats. Moreover, the pre-calculated key generation strategy resulted in cost-effective encryption with 192-bit curve security. It showed comparative efficiency in key strength, and curve strength compared with similar authentication schemes in terms of computational and memory cost, communication performance and encryption robustness.
基金Türkiye Bilimsel ve Teknolojik Arastırma Kurumu。
文摘This paper introduces a novel lightweight colour image encryption algorithm,specifically designed for resource-constrained environments such as Internet of Things(IoT)devices.As IoT systems become increasingly prevalent,secure and efficient data transmission becomes crucial.The proposed algorithm addresses this need by offering a robust yet resource-efficient solution for image encryption.Traditional image encryption relies on confusion and diffusion steps.These stages are generally implemented linearly,but this work introduces a new RSP(Random Strip Peeling)algorithm for the confusion step,which disrupts linearity in the lightweight category by using two different sequences generated by the 1D Tent Map with varying initial conditions.The diffusion stage then employs an XOR matrix generated by the Logistic Map.Different evaluation metrics,such as entropy analysis,key sensitivity,statistical and differential attacks resistance,and robustness analysis demonstrate the proposed algorithm's lightweight,robust,and efficient.The proposed encryption scheme achieved average metric values of 99.6056 for NPCR,33.4397 for UACI,and 7.9914 for information entropy in the SIPI image dataset.It also exhibits a time complexity of O(2×M×N)for an image of size M×N.
基金This work was partially supported by the Natural Science Foundation of Jiangsu Province under Grant No.BK20201462partially supported by the Scientific Research Support Project of Jiangsu Normal University under Grant No.21XSRX001.
文摘The lightweight encryption algorithm based on Add-Rotation-XOR(ARX)operation has attracted much attention due to its high software affinity and fast operation speed.However,lacking an effective defense scheme for physical attacks limits the applications of the ARX algorithm.The critical challenge is how to weaken the direct dependence between the physical information and the secret key of the algorithm at a low cost.This study attempts to explore how to improve its physical security in practical application scenarios by analyzing the masking countermeasures of ARX algorithms and the leakage causes.Firstly,we specify a hierarchical security framework by quantitatively evaluating the indicators based on side-channel attacks.Then,optimize the masking algorithm to achieve a trade-off balance by leveraging the software-based local masking strategies and non-full-round masking strategies.Finally,refactor the assembly instruction to improve the leaks by exploring the leakage cause at assembly instruction.To illustrate the feasibility of the proposed scheme,we further conducted a case study by designing a software-based masking method for Chaskey.The experimental results show that the proposed method can effectively weaken the impact of physical attacks.
基金supported by the NationalNatural Science Foundation of China(No.61862041).
文摘Medical institutions frequently utilize cloud servers for storing digital medical imaging data, aiming to lower both storage expenses and computational expenses. Nevertheless, the reliability of cloud servers as third-party providers is not always guaranteed. To safeguard against the exposure and misuse of personal privacy information, and achieve secure and efficient retrieval, a secure medical image retrieval based on a multi-attention mechanism and triplet deep hashing is proposed in this paper (abbreviated as MATDH). Specifically, this method first utilizes the contrast-limited adaptive histogram equalization method applicable to color images to enhance chest X-ray images. Next, a designed multi-attention mechanism focuses on important local features during the feature extraction stage. Moreover, a triplet loss function is utilized to learn discriminative hash codes to construct a compact and efficient triplet deep hashing. Finally, upsampling is used to restore the original resolution of the images during retrieval, thereby enabling more accurate matching. To ensure the security of medical image data, a lightweight image encryption method based on frequency domain encryption is designed to encrypt the chest X-ray images. The findings of the experiment indicate that, in comparison to various advanced image retrieval techniques, the suggested approach improves the precision of feature extraction and retrieval using the COVIDx dataset. Additionally, it offers enhanced protection for the confidentiality of medical images stored in cloud settings and demonstrates strong practicality.
文摘Ensuring the secure transmission of secret messages,particularly through video—one of the most widely used media formats—is a critical challenge in the field of information security.Relying on a single-layered security approach is often insufficient for safeguarding sensitive data.This study proposes a triple-lightweight cryptographic and steganographic model that integrates the Hill Cipher Technique(HCT),Rotation Left Digits(RLD),and Discrete Wavelet Transform(DWT)to embed secret messages within video frames securely.The approach begins with encrypting the secret text using a private key matrix(PK^(1))of size 2×2 up to 6×6 via HCT.A second encryption layer is applied using a dynamic private key(PK2)derived from the RGB pixel values of the video frame,resulting in a rotated cipher.The doubly encrypted message is then embedded into the video frames using the DWT method.Upon transmission,the concealed message is extracted using inverse DWT and decrypted in two steps—first with PK2 and then with the inverse of PK^(1).Experiments conducted using MPEG video sequences and message lengths ranging from 10 to 300 bytes demonstrate strong performance in terms of Mean Square Error(MSE),Peak Signal-to-Noise Ratio(PSNR),and Correlation Coefficient(CC)between original and encrypted messages.The similarity between original and stego frames is further validated using Structural Similarity Index(SSIM),Mean Absolute Error(MAE),Number of Pixel Change Rate(NPCR),and Unified Average Changing Intensity(UACI).Results confirm that utilizing video frames to generate PK2 offers superior security compared to static key images.Moreover,the indistinguishability between original and stego frames highlights the method’s robustness against visual and statistical attacks.
文摘Robust encryption techniques require heavy computational capability and consume large amount of memory which are unaffordable for resource constrained IoT devices and Cyber-Physical Systems with an inclusion of general-purpose data manipulation tasks.Many encryption techniques have been introduced to address the inability of such devices,lacking in robust security provision at low cost.This article presents an encryption technique,implemented on a resource constrained IoT device(AVR ATmega2560)through utilizing fast execution and less memory consumption properties of curve25519 in a novel and efficient lightweight hash function.The hash function utilizes GMP library for multi-precision arithmetic calculations and pre-calculated curve points to devise a good cipher block using ECDH based key exchange protocols and large random prime number generator function.
文摘Authentication per frame is an implicit necessity for security in wireless local area networks(WLANs). We propose a novel per frame secure authentication scheme which provides authentication to data frames in WLANs. The scheme involves no cryptographic overheads for authentication of frames.It utilizes the sequence number of the frame along with the authentication stream generators for authentication.Hence, it requires no extra bits or messages for the authentication purpose and also no change in the existing frame format is required. The scheme provides authentication by modifying the sequence number of the frame at the sender, and that the modification is verified at the receiver. The modified sequence number is protected by using the XOR operation with a random number selected from the random stream. The authentication is lightweight due to the fact that it requires only trivial arithmetic operations like the subtraction and XOR operation.