期刊文献+
共找到7篇文章
< 1 >
每页显示 20 50 100
End-To-End Encryption Enabled Lightweight Mutual Authentication Scheme for Resource Constrained IoT Network
1
作者 Shafi Ullah Haidawati Muhammad Nasir +5 位作者 Kushsairy Kadir Akbar Khan Ahsanullah Memon Shanila Azhar Ilyas Khan Muhammad Ashraf 《Computers, Materials & Continua》 2025年第2期3223-3249,共27页
Machine-to-machine (M2M) communication networks consist of resource-constrained autonomous devices, also known as autonomous Internet of things (IoTs) or machine-type communication devices (MTCDs) which act as a backb... Machine-to-machine (M2M) communication networks consist of resource-constrained autonomous devices, also known as autonomous Internet of things (IoTs) or machine-type communication devices (MTCDs) which act as a backbone for Industrial IoT, smart cities, and other autonomous systems. Due to the limited computing and memory capacity, these devices cannot maintain strong security if conventional security methods are applied such as heavy encryption. This article proposed a novel lightweight mutual authentication scheme including elliptic curve cryptography (ECC) driven end-to-end encryption through curve25519 such as (i): efficient end-to-end encrypted communication with pre-calculation strategy using curve25519;and (ii): elliptic curve Diffie-Hellman (ECDH) based mutual authentication technique through a novel lightweight hash function. The proposed scheme attempts to efficiently counter all known perception layer security threats. Moreover, the pre-calculated key generation strategy resulted in cost-effective encryption with 192-bit curve security. It showed comparative efficiency in key strength, and curve strength compared with similar authentication schemes in terms of computational and memory cost, communication performance and encryption robustness. 展开更多
关键词 Mutual authentication lightweight end-to-end encryption elliptic curve cryptography industrial internet of things curve25519 machine-to-machine communication
在线阅读 下载PDF
Random Strip Peeling:A novel lightweight image encryption for IoT devices based on colour planes permutation
2
作者 Kenan Ince Cemile Ince Davut Hanbay 《CAAI Transactions on Intelligence Technology》 2025年第2期529-544,共16页
This paper introduces a novel lightweight colour image encryption algorithm,specifically designed for resource-constrained environments such as Internet of Things(IoT)devices.As IoT systems become increasingly prevale... This paper introduces a novel lightweight colour image encryption algorithm,specifically designed for resource-constrained environments such as Internet of Things(IoT)devices.As IoT systems become increasingly prevalent,secure and efficient data transmission becomes crucial.The proposed algorithm addresses this need by offering a robust yet resource-efficient solution for image encryption.Traditional image encryption relies on confusion and diffusion steps.These stages are generally implemented linearly,but this work introduces a new RSP(Random Strip Peeling)algorithm for the confusion step,which disrupts linearity in the lightweight category by using two different sequences generated by the 1D Tent Map with varying initial conditions.The diffusion stage then employs an XOR matrix generated by the Logistic Map.Different evaluation metrics,such as entropy analysis,key sensitivity,statistical and differential attacks resistance,and robustness analysis demonstrate the proposed algorithm's lightweight,robust,and efficient.The proposed encryption scheme achieved average metric values of 99.6056 for NPCR,33.4397 for UACI,and 7.9914 for information entropy in the SIPI image dataset.It also exhibits a time complexity of O(2×M×N)for an image of size M×N. 展开更多
关键词 chaotic encryption image scrambling algorithm lightweight image encryption symmetric encryption
在线阅读 下载PDF
An Anti-Physical Attack Scheme of ARX Lightweight Algorithms for IoT Applications
3
作者 Qiang Zhi Xiang Jiang +3 位作者 Hangying Zhang Zhengshu Zhou Jianguo Ren Tong Huang 《Computer Systems Science & Engineering》 SCIE EI 2023年第7期389-402,共14页
The lightweight encryption algorithm based on Add-Rotation-XOR(ARX)operation has attracted much attention due to its high software affinity and fast operation speed.However,lacking an effective defense scheme for phys... The lightweight encryption algorithm based on Add-Rotation-XOR(ARX)operation has attracted much attention due to its high software affinity and fast operation speed.However,lacking an effective defense scheme for physical attacks limits the applications of the ARX algorithm.The critical challenge is how to weaken the direct dependence between the physical information and the secret key of the algorithm at a low cost.This study attempts to explore how to improve its physical security in practical application scenarios by analyzing the masking countermeasures of ARX algorithms and the leakage causes.Firstly,we specify a hierarchical security framework by quantitatively evaluating the indicators based on side-channel attacks.Then,optimize the masking algorithm to achieve a trade-off balance by leveraging the software-based local masking strategies and non-full-round masking strategies.Finally,refactor the assembly instruction to improve the leaks by exploring the leakage cause at assembly instruction.To illustrate the feasibility of the proposed scheme,we further conducted a case study by designing a software-based masking method for Chaskey.The experimental results show that the proposed method can effectively weaken the impact of physical attacks. 展开更多
关键词 IoT security lightweight encryption anti-physical attack ARX algorithms
在线阅读 下载PDF
Secure Medical Image Retrieval Based on Multi-Attention Mechanism and Triplet Deep Hashing
4
作者 Shaozheng Zhang Qiuyu Zhang +1 位作者 Jiahui Tang Ruihua Xu 《Computers, Materials & Continua》 2025年第2期2137-2158,共22页
Medical institutions frequently utilize cloud servers for storing digital medical imaging data, aiming to lower both storage expenses and computational expenses. Nevertheless, the reliability of cloud servers as third... Medical institutions frequently utilize cloud servers for storing digital medical imaging data, aiming to lower both storage expenses and computational expenses. Nevertheless, the reliability of cloud servers as third-party providers is not always guaranteed. To safeguard against the exposure and misuse of personal privacy information, and achieve secure and efficient retrieval, a secure medical image retrieval based on a multi-attention mechanism and triplet deep hashing is proposed in this paper (abbreviated as MATDH). Specifically, this method first utilizes the contrast-limited adaptive histogram equalization method applicable to color images to enhance chest X-ray images. Next, a designed multi-attention mechanism focuses on important local features during the feature extraction stage. Moreover, a triplet loss function is utilized to learn discriminative hash codes to construct a compact and efficient triplet deep hashing. Finally, upsampling is used to restore the original resolution of the images during retrieval, thereby enabling more accurate matching. To ensure the security of medical image data, a lightweight image encryption method based on frequency domain encryption is designed to encrypt the chest X-ray images. The findings of the experiment indicate that, in comparison to various advanced image retrieval techniques, the suggested approach improves the precision of feature extraction and retrieval using the COVIDx dataset. Additionally, it offers enhanced protection for the confidentiality of medical images stored in cloud settings and demonstrates strong practicality. 展开更多
关键词 Secure medical image retrieval multi-attention mechanism triplet deep hashing image enhancement lightweight image encryption
在线阅读 下载PDF
Lightweight Multi-Layered Encryption and Steganography Model for Protecting Secret Messages in MPEG Video Frames
5
作者 Sara H.Elsayed Rodaina Abdelsalam +2 位作者 Mahmoud A.Ismail Shoman Raed Alotaibi Omar Reyad 《Computers, Materials & Continua》 2025年第12期4995-5013,共19页
Ensuring the secure transmission of secret messages,particularly through video—one of the most widely used media formats—is a critical challenge in the field of information security.Relying on a single-layered secur... Ensuring the secure transmission of secret messages,particularly through video—one of the most widely used media formats—is a critical challenge in the field of information security.Relying on a single-layered security approach is often insufficient for safeguarding sensitive data.This study proposes a triple-lightweight cryptographic and steganographic model that integrates the Hill Cipher Technique(HCT),Rotation Left Digits(RLD),and Discrete Wavelet Transform(DWT)to embed secret messages within video frames securely.The approach begins with encrypting the secret text using a private key matrix(PK^(1))of size 2×2 up to 6×6 via HCT.A second encryption layer is applied using a dynamic private key(PK2)derived from the RGB pixel values of the video frame,resulting in a rotated cipher.The doubly encrypted message is then embedded into the video frames using the DWT method.Upon transmission,the concealed message is extracted using inverse DWT and decrypted in two steps—first with PK2 and then with the inverse of PK^(1).Experiments conducted using MPEG video sequences and message lengths ranging from 10 to 300 bytes demonstrate strong performance in terms of Mean Square Error(MSE),Peak Signal-to-Noise Ratio(PSNR),and Correlation Coefficient(CC)between original and encrypted messages.The similarity between original and stego frames is further validated using Structural Similarity Index(SSIM),Mean Absolute Error(MAE),Number of Pixel Change Rate(NPCR),and Unified Average Changing Intensity(UACI).Results confirm that utilizing video frames to generate PK2 offers superior security compared to static key images.Moreover,the indistinguishability between original and stego frames highlights the method’s robustness against visual and statistical attacks. 展开更多
关键词 lightweight encryption stego frame HCT RLD DWT SSIM MAE NPCR UACI
在线阅读 下载PDF
Curve25519 based lightweight end-to-end encryption in resource constrained autonomous 8-bit IoT devices
6
作者 Shafi Ullah Raja Zahilah 《Cybersecurity》 EI CSCD 2021年第1期147-159,共13页
Robust encryption techniques require heavy computational capability and consume large amount of memory which are unaffordable for resource constrained IoT devices and Cyber-Physical Systems with an inclusion of genera... Robust encryption techniques require heavy computational capability and consume large amount of memory which are unaffordable for resource constrained IoT devices and Cyber-Physical Systems with an inclusion of general-purpose data manipulation tasks.Many encryption techniques have been introduced to address the inability of such devices,lacking in robust security provision at low cost.This article presents an encryption technique,implemented on a resource constrained IoT device(AVR ATmega2560)through utilizing fast execution and less memory consumption properties of curve25519 in a novel and efficient lightweight hash function.The hash function utilizes GMP library for multi-precision arithmetic calculations and pre-calculated curve points to devise a good cipher block using ECDH based key exchange protocols and large random prime number generator function. 展开更多
关键词 Cyber-physical systems IOT Resource constrained IoT devices lightweight encryption End-to-end encryption Elliptic curve cryptography Curve25519
原文传递
Novel Sequence Number Based Secure Authentication Scheme for Wireless LANs
7
作者 Rajeev Singh Teek Parval Sharma 《Journal of Electronic Science and Technology》 CAS CSCD 2015年第2期144-152,共9页
Authentication per frame is an implicit necessity for security in wireless local area networks(WLANs). We propose a novel per frame secure authentication scheme which provides authentication to data frames in WLANs.... Authentication per frame is an implicit necessity for security in wireless local area networks(WLANs). We propose a novel per frame secure authentication scheme which provides authentication to data frames in WLANs. The scheme involves no cryptographic overheads for authentication of frames.It utilizes the sequence number of the frame along with the authentication stream generators for authentication.Hence, it requires no extra bits or messages for the authentication purpose and also no change in the existing frame format is required. The scheme provides authentication by modifying the sequence number of the frame at the sender, and that the modification is verified at the receiver. The modified sequence number is protected by using the XOR operation with a random number selected from the random stream. The authentication is lightweight due to the fact that it requires only trivial arithmetic operations like the subtraction and XOR operation. 展开更多
关键词 Authentication authentication frames receiver verified lightweight operations cryptographic encryption sender
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部