scholarly journals Multimedia Cryptosystem for IoT Applications Based on a Novel Chaotic System around a Predefined Manifold

Sensors ◽  
2022 ◽  
Vol 22 (1) ◽  
pp. 334
Author(s):  
Li Li ◽  
Ahmed A. Abd El-Latif ◽  
Sajad Jafari ◽  
Karthikeyan Rajagopal ◽  
Fahimeh Nazarimehr ◽  
...  

Multimedia data play an important role in our daily lives. The evolution of internet technologies means that multimedia data can easily participate amongst various users for specific purposes, in which multimedia data confidentiality and integrity have serious security issues. Chaos models play an important role in designing robust multimedia data cryptosystems. In this paper, a novel chaotic oscillator is presented. The oscillator has a particular property in which the chaotic dynamics are around pre-located manifolds. Various dynamics of the oscillator are studied. After analyzing the complex dynamics of the oscillator, it is applied to designing a new image cryptosystem, in which the results of the presented cryptosystem are tested from various viewpoints such as randomness, time encryption, correlation, plain image sensitivity, key-space, key sensitivity, histogram, entropy, resistance to classical types of attacks, and data loss analyses. The goal of the paper is proposing an applicable encryption method based on a novel chaotic oscillator with an attractor around a pre-located manifold. All the investigations confirm the reliability of using the presented cryptosystem for various IoT applications from image capture to use it.

Electronics ◽  
2021 ◽  
Vol 10 (11) ◽  
pp. 1260
Author(s):  
Savanna Denega Machado ◽  
João Elison da Rosa Tavares ◽  
Márcio Garcia Martins ◽  
Jorge Luis Victória Barbosa ◽  
Gabriel Villarrubia González ◽  
...  

New Internet of Things (IoT) applications are enabling the development of projects that help with monitoring people with different diseases in their daily lives. Alzheimer’s is a disease that affects neurological functions and needs support to maintain maximum independence and security of patients during this stage of life, as the cure and reversal of symptoms have not yet been discovered. The IoT-based monitoring system provides the caregivers’ support in monitoring people with Alzheimer’s disease (AD). This paper presents an ontology-based computational model that receives physiological data from external IoT applications, allowing identification of potentially dangerous behaviors for patients with AD. The main scientific contribution of this work is the specification of a model focusing on Alzheimer’s disease using the analysis of context histories and context prediction, which, considering the state of the art, is the only one that uses analysis of context histories to perform predictions. In this research, we also propose a simulator to generate activities of the daily life of patients, allowing the creation of data sets. These data sets were used to evaluate the contributions of the model and were generated according to the standardization of the ontology. The simulator generated 1026 scenarios applied to guide the predictions, which achieved average accurary of 97.44%. The experiments also allowed the learning of 20 relevant lessons on technological, medical, and methodological aspects that are recorded in this article.


2018 ◽  
Vol 2018 ◽  
pp. 1-11 ◽  
Author(s):  
Guodong Ye ◽  
Kaixin Jiao ◽  
Chen Pan ◽  
Xiaoling Huang

In this paper, an effective framework for chaotic encryption based on a three-dimensional logistic map is presented together with secure hash algorithm-3 (SHA-3) and electrocardiograph (ECG) signal. Following the analysis of the drawbacks, namely, fixed key and low sensitivity, of some current algorithms, this work tries to solve these two problems and includes two contributions: (1) removal of the phenomenon of summation invariance in a plain-image, for which SHA-3 is proposed to calculate the hash value for the plain-image, with the results being employed to influence the initial keys for chaotic map; (2) resolution of the problem of fixed key by using an ECG signal, that can be different for different subjects or different for same subject at different times. The Wolf algorithm is employed to produce all the control parameters and initial keys in the proposed encryption method. It is believed that combining with the classical architecture of permutation-diffusion, the summation invariance in the plain-image and shortcoming of a fixed key will be avoided in our algorithm. Furthermore, the experimental results and security analysis show that the proposed encryption algorithm can achieve confidentiality.


Connectivity ◽  
2020 ◽  
Vol 148 (6) ◽  
Author(s):  
S. A. Zhezhkun ◽  
◽  
L. B. Veksler ◽  
S. M. Brezitsʹkyy ◽  
B. O. Tarasyuk

This article focuses on the analysis of promising technologies for long-range traffic transmission for the implementation of the Internet of Things. The result of the review of technical features of technologies, their advantages and disadvantages is given. A comparative analysis was performed. An analysis is made that in the future heterogeneous structures based on the integration of many used radio technologies will play a crucial role in the implementation of fifth generation networks and systems. The Internet of Things (IoT) is heavily affecting our daily lives in many domains, ranging from tiny wearable devices to large industrial systems. Consequently, a wide variety of IoT applications have been developed and deployed using different IoT frameworks. An IoT framework is a set of guiding rules, protocols, and standards which simplify the implementation of IoT applications. The success of these applications mainly depends on the ecosystem characteristics of the IoT framework, with the emphasis on the security mechanisms employed in it, where issues related to security and privacy are pivotal. In this paper, we survey the security of the main IoT frameworks, a total of 8 frameworks are considered. For each framework, we clarify the proposed architecture, the essentials of developing third-party smart apps, the compatible hardware, and the security features. Comparing security architectures shows that the same standards used for securing communications, whereas different methodologies followed for providing other security properties.


Author(s):  
Israa Al_Barazanchi ◽  
Aparna Murthy ◽  
Ahmad AbdulQadir Al Rababah ◽  
Ghadeer Khader ◽  
Haider Rasheed Abdulshaheed ◽  
...  

Blockchain innovation has picked up expanding consideration from investigating and industry over the later a long time. It permits actualizing in its environment the smart-contracts innovation which is utilized to robotize and execute deals between clients. Blockchain is proposed nowadays as the unused specialized foundation for a few sorts of IT applications. Blockchain would aid avoid the duplication of information because it right now does with Bitcoin and other cryptocurrencies. Since of the numerous hundreds of thousands of servers putting away the Bitcoin record, it’s impossible to assault and alter. An aggressor would need to change the record of 51 percent of all the servers, at the precise same time. The budgetary fetched of such an assault would distantly exceed the potential picks up. The same cannot be said for our private data that lives on single servers possessed by Google and Amazon. In this paper, we outline major Blockchain technology that based as solutions for IOT security. We survey and categorize prevalent security issues with respect to IoT data privacy, in expansion to conventions utilized for organizing, communication, and administration. We diagram security necessities for IoT together with the existing scenarios for using blockchain in IoT applications.


2020 ◽  
Vol 1 (2) ◽  
pp. 1-12
Author(s):  
Ritu Chauhan ◽  
Gatha Tanwar

The internet of things has brought in innovations in the daily lives of users. The enthusiasm and openness of consumers have fuelled the manufacturers to dish out new devices with more features and better aesthetics. In an attempt to keep up with the competition, the manufacturers are not paying enough attention to cyber security of these smart devices. The gravity of security vulnerabilities is further aggravated due to their connected nature. As a result, a compromised device would not only stop providing the intended service but could also act as a host for malware introduced by an attacker. This study has focused on 10 manufacturers, namely Fitbit, D-Link, Edimax, Ednet, Homematic, Smarter, Osram, Belkin Wemo, Philips Hue, and Withings. The authors studied the security issues which have been raised in the past and the communication protocols used by devices made by these brands. It was found that while security vulnerabilities could be introduced due to lack of attention to details while designing an IoT device, they could also get introduced by the protocol stack and inadequate system configuration. Researchers have iterated that protocols like TCP, UDP, and mDNS have inherent security shortcomings and manufacturers need to be mindful of the fact. Furthermore, if protocols like EAPOL or Zigbee have been used, then the device developers need to be aware of safeguarding the keys and other authentication mechanisms. The authors also analysed the packets captured during setup of 23 devices by the above-mentioned manufacturers. The analysis gave insight into the underlying protocol stack preferred by the manufacturers. In addition, they also used count vectorizer to tokenize the protocols used during device setup and use them to model a multinomial classifier to identify the manufacturers. The intent of this experiment was to determine if a manufacturer could be identified based on the tokenized protocols. The modelled classifier could then be used to drive an algorithm to checklist against possible security vulnerabilities, which are characteristic of the protocols and the manufacturer history. Such an automated system will be instrumental in regular diagnostics of a smart system. The authors then wrapped up this report by suggesting some measures a user can take to protect their local networks and connected devices.


MaRBLe ◽  
2018 ◽  
Vol 4 ◽  
Author(s):  
Carolyn Gaumet

With the Internet growing in importance in our daily lives, concerns about privacy and data protection have emerged. While people worry about where they data may end up, they continue making themselves openly transparent by sharing information about themselves and their lives online. This study aims to understand the paradoxes between privacy considerations – mainly, the wish to keep individual data private and secure – and the actions that people undertake in reality. More specifically, it focuses on three paradoxes and dilemmas of privacy: age, perceived usefulness, and rewards. These will be studied by analyzing the results of a survey, in which respondents from the EU, North America and East Asia were asked about their online habits and their opinions on various security issues and privacy measures. The analysis ultimately aims to further the understanding of privacy paradoxes, and what hinders people from protecting their data sufficiently.


2019 ◽  
Vol 1 (2) ◽  
pp. 16 ◽  
Author(s):  
Deepak Choudhary

The Internet of Things (IoT) enables the integration of data from virtual and physical worlds. It involves smart objects that can understand and react to their environment in a variety of industrial, commercial and household settings. As the IoT expands the number of connected devices, there is the potential to allow cyber-attackers into the physical world in which we live, as they seize on security holes in these new systems. New security issues arise through the heterogeneity  of  IoT  applications and devices and their large-scale deployment.


2021 ◽  
Author(s):  
Ahmad Pourjabbar Kari ◽  
Ahmad Habibizad Navin ◽  
Amir Massoud Bidgoli ◽  
Mirkamal Mirnia

Abstract This paper introduces a new multi-image cryptosystem based on modified Henon map and nonlinear combination of chaotic seed maps. Based on the degree of correlation between the adjacent pixels of the plain image, a unique weight is assigned to the plain image. First, the coordinates of plain images are disrupted by modified Henon map as confusion phase. In the first step of diffusion phase, the pixels content of images are changed separately by XOR operation between confused images and matrices with suitable nonlinear combination of seed maps sequences. These combination of seed maps are selected depending on the weight of plain images as well as bifurcation properties of mentioned chaotic maps. After concatenating the matrices obtained from the first step of diffusion phase, the bitwise XOR operation is applied between newly developed matrix and the other produced matrix from the chaotic sequences of the Logistic-Tent-Sine hybrid system, as second step of diffusion phase. The encrypted image is obtained after applying shift and exchange operations. The results of the implementation using graphs and histograms show that the proposed scheme, compared to some existing methods, can effectively resist common attacks and can be used as a secure method for encrypting digital images.


Complexity ◽  
2021 ◽  
Vol 2021 ◽  
pp. 1-16
Author(s):  
Bassem Abd-El-Atty ◽  
Abdullah M. Iliyasu ◽  
Ahmed A. Abd El-Latif

The ubiquity of image and video applications in our daily lives makes data security and privacy prominent concerns for everyone. Among others, various image cryptosystems are relied upon to provide the necessary safeguards. With the inevitable realisation of quantum computing hardware, however, the anticipated quantum supremacy entails effortless violation of the integrity of even the best cryptosystems. Quantum walks (QWs) utilise the potent properties of quantum mechanics to provide randomness via stochastic transitions between states. Our study exploits these properties of QWs to design a multi-image cryptosystem. Furthermore, we infuse the symmetricity and orthogonality of Chebyshev maps into the QWs to realise a powerful cryptosystem that guarantees data integrity, authentication, and anonymity of the resulting images. These properties are validated via extensive simulation-based experiments that produce average values of NPCR as 99.606%, UACI as 33.45%, global entropy as 7.9998, and chi-square test as 238.14. Therefore, the proposed cryptosystem provides ordnance to protect images from illicit tampering during the era.


2021 ◽  
Author(s):  
donghua jiang ◽  
Lidong Liu ◽  
Liya Zhu ◽  
Xingyuan Wang ◽  
Yingpin Chen ◽  
...  

Abstract The transmission of images via the Internet has grown exponentially in the past few decades. However, the Internet considered as an insecure method of information transmission may cause serious privacy issues. In order to overcome such potential security issues, a novel double-image visually meaningful encryption (DIVME) algorithm conjugating quantum cellular neural network (QCNN), compressed sensing (CS) and fractional Fourier transform (FRFT) is proposed in this paper. First, the wavelet coefficients of the two plain images are scrambled by the Fisher-Yates confusion algorithm, and then compressed by the key-controlled partial Hadamard matrix. The final meaningful cipher image is generated by embedding the encrypted images into a host image with the same resolution of the plain image via the FRFT-based embedding method. Besides, the eigenvalues of the plain images are utilized to generate the key stream to improve the ability of proposed DIVME algorithm to withstand the plaintext attacks. Afterwards, the plaintext eigenvalues are embedded into the alpha channel of the meaningful cipher image under control of the keys to reduce unnecessary storage space and transmission costs. Ultimately, the simulation results and security analyses indicate that the proposed DIVME algorithm is effective and can withstand multiple attacks.


Sign in / Sign up

Export Citation Format

Share Document