Providing End-to-End Security Using Quantum Walks in IoT Networks

被引:57
作者
Abd El-Latif, Ahmed A. [1 ,2 ]
Abd-El-Atty, Bassem [2 ]
Venegas-Andraca, Salvador E. [3 ]
Elwahsh, Haitham [4 ]
Piran, Md Jalil [5 ]
Bashir, Ali Kashif [6 ]
Song, Oh-Young [7 ]
Mazurczyk, Wojciech [8 ]
机构
[1] Menoufia Univ, Fac Sci, Math & Comp Sci Dept, Shibin Al Kawm 32511, Egypt
[2] Menoufia Univ, Ctr Excellence Cybersecur Quantum Informat Proc &, Shibin Al Kawm 32511, Egypt
[3] Tecnol Monterrey, Escuela Ingn & Ciencias, Monterrey 64849, Mexico
[4] Kafrelsheikh Univ, Fac Comp & Informat, Comp Sci Dept, Kafrelsheikh 33516, Egypt
[5] Sejong Univ, Comp Engn Dept, Seoul 05006, South Korea
[6] Manchester Metropolitan Univ, Dept Comp & Math, Manchester M15 6BH, Lancs, England
[7] Sejong Univ, Software Dept, Seoul 05006, South Korea
[8] Warsaw Univ Technol, Inst Comp Sci, PL-00665 Warsaw, Poland
关键词
Quantum walks; lightweight cipher; data transfer in IoT; image encryption; edge computing; wireless communication; HEALTH-CARE; ENCRYPTION; INTERNET; THINGS; PRIVACY; FRAMEWORK; SCHEME; DESIGN;
D O I
10.1109/ACCESS.2020.2992820
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of Things acts an essential role in our everyday lives and it definitely has the potential to grow on the importance and revolutionize our future. However, the present communication technologies have several security related issues which is required to provide secure end to end connectivity among services. Moreover, due to recent, rapid growth of quantum technologies, most common security mechanisms considered secure today may be soon imperilled. Thus, the modern security mechanisms during their construction also require the power of quantum technologies to resist various potential attacks from quantum computers. Because of its characteristics, quantum walks (QW) is considered as a universal quantum computation paradigm that can be accepted as an excellent key generator. In this regard, in this paper a new lightweight image encryption scheme based on QW for secure data transfer in the internet of things platforms and wireless networking with edge computing is proposed. The introduced approach utilises the power of nonlinear dynamic behaviour of QW to construct permutation boxes and generates pseudo-random numbers for encrypting the plain image after dividing it into blocks. The results of the conducted simulation and numerical analyses confirm that the presented encryption algorithm is effective. The encrypted images have randomness properties, no useful data about the ciphered image can be obtained via analysing the correlation of adjacent pixels. Moreover, the entropy value is close to 8, the number of the pixel change rate is greater than 99.61% and there is high sensitivity of the key parameters with large key space to resist various attacks.
引用
收藏
页码:92687 / 92696
页数:10
相关论文
共 49 条
[1]   Controlled alternate quantum walk-based pseudo-random number generator and its application to quantum color image encryption [J].
Abd EL-Latif, Ahmed A. ;
Abd-El-Atty, Bassem ;
Venegas-Andraca, Salvador E. .
PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS, 2020, 547
[2]   Secure Data Encryption Based on Quantum Walks for 5G Internet of Things Scenario [J].
Abd El-Latif, Ahmed A. ;
Abd-El-Atty, Bassem ;
Mazurczyk, Wojciech ;
Fung, Carol ;
Venegas-Andraca, Salvador E. .
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2020, 17 (01) :118-131
[3]   Quantum-inspired cascaded discrete-time quantum walks with induced chaotic dynamics and cryptographic applications [J].
Abd El-Latif, Ahmed A. ;
Abd-El-Atty, Bassem ;
Amin, Mohamed ;
Iliyasu, Abdullah M. .
SCIENTIFIC REPORTS, 2020, 10 (01)
[4]   Controlled alternate quantum walks based privacy preserving healthcare images in Internet of Things [J].
Abd EL-Latif, Ahmed A. ;
Abd-El-Atty, Bassem ;
Abou-Nassar, Eman M. ;
Venegas-Andraca, Salvador E. .
OPTICS AND LASER TECHNOLOGY, 2020, 124
[5]   Efficient quantum-based security protocols for information sharing and data protection in 5G networks [J].
Abd EL-Latif, Ahmed A. ;
Abd-El-Atty, Bassem ;
Venegas-Andraca, Salvador E. ;
Mazurczyk, Wojciech .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 100 :893-906
[6]   A novel image steganography technique based on quantum substitution boxes [J].
Abd EL-Latif, Ahmed A. ;
Abd-El-Atty, Bassem ;
Venegas-Andraca, Salvador E. .
OPTICS AND LASER TECHNOLOGY, 2019, 116 :92-102
[7]   Efficient Quantum Information Hiding for Remote Medical Image Sharing [J].
Abd El-Latif, Ahmed A. ;
Abd-El-Atty, Bassem ;
Hossain, M. Shamim ;
Rahman, Md. Abdur ;
Alamri, Atif ;
Gupta, B. B. .
IEEE ACCESS, 2018, 6 :21075-21083
[8]   Secure Quantum Steganography Protocol for Fog Cloud Internet of Things [J].
Abd El-Latif, Ahmed A. ;
Abd-El-Atty, Bassem ;
Hossain, M. Shamim ;
Elmougy, Samir ;
Ghoneim, Ahmed .
IEEE ACCESS, 2018, 6 :10332-10340
[9]   Robust Encryption of Quantum Medical Images [J].
Abd El-Latif, Ahmed A. ;
Abd-El-Atty, Bassem ;
Talha, Muhammad .
IEEE ACCESS, 2018, 6 :1073-1081
[10]   An encryption protocol for NEQR images based on one-particle quantum walks on a circle [J].
Abd-El-Atty, Bassem ;
Abd El-Latif, Ahmed A. ;
Venegas-Andraca, Salvador E. .
QUANTUM INFORMATION PROCESSING, 2019, 18 (09)