A Lightweight Image Encryption Algorithm for Secure Communications in Multimedia Internet of Things

被引:14
作者
Hedayati, Razieh [1 ]
Mostafavi, Seyedakbar [1 ]
机构
[1] Yazd Univ, Dept Comp Engn, Yazd, Iran
关键词
Multimedia Internet of Things; Image compression; Lightweight cryptography; BLOCK CIPHER; DES; LOSSLESS;
D O I
10.1007/s11277-021-09173-w
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Devices in the Internet of Things (IoT) have resource constraints in terms of energy, computing power, and memory that make them vulnerable to some security attacks. Due to the increasing volume of multimedia content, lightweight encryption algorithms have been developed to allow IoT nodes to communicate securely with the least computational complexity and bandwidth usage. To adapt the low data rate of IoT devices, a lightweight data compression algorithm for image encryption is proposed in this paper which utilizes scan-based block compression and selective pixel encryption approach to encrypt the image data in only one round, resulting in low computational complexity and reduced data volume. The results of the implementing the proposed approach in IoT testbed show that, on average, the power consumption of the devices and packet rate is decreased by 15% and 26%, respectively, compared to the existing algorithms.
引用
收藏
页码:1121 / 1143
页数:23
相关论文
共 39 条
[1]  
A Javadpour, 2016, J Biomed Phys Eng, V6, P95
[2]  
[Anonymous], 2012, SELECTED AREAS CRYPT, DOI DOI 10.1007/978-3-642-35999-622
[3]  
[Anonymous], 2016, International Journal of Computer Applications
[4]  
Arava Karuna, 2019, Smart Intelligent Computing and Applications. Proceedings of the Second International Conference on SCI 2018. Smart Innovation, Systems and Technologies (SIST 105), P155, DOI 10.1007/978-981-13-1927-3_16
[5]   Towards a Generalized Approach for Deep Neural Network Based Event Processing for the Internet of Multimedia Things [J].
Aslam, Asra ;
Curry, Edward .
IEEE ACCESS, 2018, 6 :25573-25587
[6]   Security analysis and improvement of a partial encryption scheme [J].
Benrhouma, Oussama ;
Hermassi, Houcemeddine ;
Belghith, Safya .
MULTIMEDIA TOOLS AND APPLICATIONS, 2015, 74 (11) :3617-3634
[7]  
Bogdanov A, 2007, LECT NOTES COMPUT SC, V4727, P450
[8]   An image encryption algorithm based on bit level Brownian motion and new chaotic systems [J].
Chai, Xiuli .
MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (01) :1159-1175
[9]   THE DATA ENCRYPTION STANDARD (DES) AND ITS STRENGTH AGAINST ATTACKS [J].
COOPERSMITH, D .
IBM JOURNAL OF RESEARCH AND DEVELOPMENT, 1994, 38 (03) :243-250
[10]  
De Cannière C, 2008, LECT NOTES COMPUT SC, V4986, P244