CellSecure: Securing Image Data in Industrial Internet-of-Things via Cellular Automata and Chaos-Based Encryption

被引:8
作者
Ali, Hassan [1 ]
Khan, Muhammad Shahbaz [2 ]
Driss, Maha [3 ,4 ]
Ahmad, Jawad [2 ]
Buchanan, William J. [2 ]
Pitropakis, Nikolaos [2 ]
机构
[1] HITEC Univ Taxila, Dept Elect Engn, Taxila, Pakistan
[2] Edinburgh Napier Univ, Sch Comp Engn & Built Environm, Edinburgh, Midlothian, Scotland
[3] Prince Sultan Univ, Robot & Internet Things Lab, Riyadh, Saudi Arabia
[4] Univ Manouba, Natl Sch Comp Sci, RIADI Lab, Manouba, Tunisia
来源
2023 IEEE 98TH VEHICULAR TECHNOLOGY CONFERENCE, VTC2023-FALL | 2023年
关键词
cellular automata; chaos; image encryption; industrial internet of things; industry; 4.0; IIoT;
D O I
10.1109/VTC2023-Fall60731.2023.10333478
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the era of Industrial IoT (IIoT) and Industry 4.0, ensuring secure data transmission has become a critical concern. Among other data types, images are widely transmitted and utilized across various IIoT applications, ranging from sensor-generated visual data and real-time remote monitoring to quality control in production lines. The encryption of these images is essential for maintaining operational integrity, data confidentiality, and seamless integration with analytics platforms. This paper addresses these critical concerns by proposing a robust image encryption algorithm tailored for IIoT and Cyber-Physical Systems (CPS). The algorithm combines Rule-30 cellular automata with chaotic scrambling and substitution. The Rule 30 cellular automata serves as an efficient mechanism for generating pseudo-random sequences that enable fast encryption and decryption cycles suitable for real-time sensor data in industrial settings. Most importantly, it induces non-linearity in the encryption algorithm. Furthermore, to increase the chaotic range and keyspace of the algorithm, which is vital for security in distributed industrial networks, a hybrid chaotic map, i.e., logistic-sine map is utilized. Extensive security analysis has been carried out to validate the efficacy of the proposed algorithm. Results indicate that our algorithm achieves close-to-ideal values, with an entropy of 7.99 and a correlation of 0.002. This enhances the algorithm's resilience against potential cyber-attacks in the industrial domain.
引用
收藏
页数:6
相关论文
共 16 条
[1]   A DNA Based Colour Image Encryption Scheme Using A Convolutional Autoencoder [J].
Ahmed, Fawad ;
Rehman, Muneeb Ur ;
Ahmad, Jawad ;
Khan, Muhammad Shahbaz ;
Boulila, Wadii ;
Srivastava, Gautam ;
Lin, Jerry Chun-Wei ;
Buchanan, William J. .
ACM TRANSACTIONS ON MULTIMEDIA COMPUTING COMMUNICATIONS AND APPLICATIONS, 2023, 19 (03)
[2]   Multiple-Layer Image Encryption Utilizing Fractional-Order Chen Hyperchaotic Map and Cryptographically Secure PRNGs [J].
Alexan, Wassim ;
Alexan, Nader ;
Gabr, Mohamed .
FRACTAL AND FRACTIONAL, 2023, 7 (04)
[3]   Color Image Encryption Through Chaos and KAA Map [J].
Alexan, Wassim ;
Elkandoz, Marwa ;
Mashaly, Maggie ;
Azab, Eman ;
Aboshousha, Amr .
IEEE ACCESS, 2023, 11 :11541-11554
[4]   RGB Image Encryption through Cellular Automata, S-Box and the Lorenz System [J].
Alexan, Wassim ;
ElBeltagy, Mohamed ;
Aboshousha, Amr .
SYMMETRY-BASEL, 2022, 14 (03)
[5]   A novel color image encryption scheme based on a new dynamic compound chaotic map and S-box [J].
Ali, Tahir Sajjad ;
Ali, Rashid .
MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 81 (15) :20585-20609
[6]   Image Compression and Encryption Combining Autoencoder and Chaotic Logistic Map [J].
Ameen Suhail, K. M. ;
Sankar, Syam .
IRANIAN JOURNAL OF SCIENCE AND TECHNOLOGY TRANSACTION A-SCIENCE, 2020, 44 (04) :1091-1100
[7]   A Novel Chaotic Permutation-Substitution Image Encryption Scheme Based on Logistic Map and Random Substitution [J].
Arif, Jameel ;
Khan, Muazzam A. ;
Ghaleb, Baraq ;
Ahmad, Jawad ;
Munir, Arslan ;
Rashid, Umer ;
Al-Dubai, Ahmed Y. .
IEEE ACCESS, 2022, 10 :12966-12982
[8]   THE DATA ENCRYPTION STANDARD (DES) AND ITS STRENGTH AGAINST ATTACKS [J].
COOPERSMITH, D .
IBM JOURNAL OF RESEARCH AND DEVELOPMENT, 1994, 38 (03) :243-250
[9]   A Blockchain-Based Secure Image Encryption Scheme for the Industrial Internet of Things [J].
Khan, Prince Waqas ;
Byun, Yungcheol .
ENTROPY, 2020, 22 (02)
[10]   Image encryption using chaotic map and cellular automata [J].
Li, Lanhang ;
Luo, Yuling ;
Qiu, Senhui ;
Ouyang, Xue ;
Cao, Lvchen ;
Tang, Shunbin .
MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 81 (28) :40755-40773