Providing End-to-End Security Using Quantum Walks in IoT Networks

被引:54
|
作者
Abd El-Latif, Ahmed A. [1 ,2 ]
Abd-El-Atty, Bassem [2 ]
Venegas-Andraca, Salvador E. [3 ]
Elwahsh, Haitham [4 ]
Piran, Md Jalil [5 ]
Bashir, Ali Kashif [6 ]
Song, Oh-Young [7 ]
Mazurczyk, Wojciech [8 ]
机构
[1] Menoufia Univ, Fac Sci, Math & Comp Sci Dept, Shibin Al Kawm 32511, Egypt
[2] Menoufia Univ, Ctr Excellence Cybersecur Quantum Informat Proc &, Shibin Al Kawm 32511, Egypt
[3] Tecnol Monterrey, Escuela Ingn & Ciencias, Monterrey 64849, Mexico
[4] Kafrelsheikh Univ, Fac Comp & Informat, Comp Sci Dept, Kafrelsheikh 33516, Egypt
[5] Sejong Univ, Comp Engn Dept, Seoul 05006, South Korea
[6] Manchester Metropolitan Univ, Dept Comp & Math, Manchester M15 6BH, Lancs, England
[7] Sejong Univ, Software Dept, Seoul 05006, South Korea
[8] Warsaw Univ Technol, Inst Comp Sci, PL-00665 Warsaw, Poland
关键词
Quantum walks; lightweight cipher; data transfer in IoT; image encryption; edge computing; wireless communication; HEALTH-CARE; ENCRYPTION; INTERNET; THINGS; PRIVACY; FRAMEWORK; SCHEME; DESIGN;
D O I
10.1109/ACCESS.2020.2992820
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of Things acts an essential role in our everyday lives and it definitely has the potential to grow on the importance and revolutionize our future. However, the present communication technologies have several security related issues which is required to provide secure end to end connectivity among services. Moreover, due to recent, rapid growth of quantum technologies, most common security mechanisms considered secure today may be soon imperilled. Thus, the modern security mechanisms during their construction also require the power of quantum technologies to resist various potential attacks from quantum computers. Because of its characteristics, quantum walks (QW) is considered as a universal quantum computation paradigm that can be accepted as an excellent key generator. In this regard, in this paper a new lightweight image encryption scheme based on QW for secure data transfer in the internet of things platforms and wireless networking with edge computing is proposed. The introduced approach utilises the power of nonlinear dynamic behaviour of QW to construct permutation boxes and generates pseudo-random numbers for encrypting the plain image after dividing it into blocks. The results of the conducted simulation and numerical analyses confirm that the presented encryption algorithm is effective. The encrypted images have randomness properties, no useful data about the ciphered image can be obtained via analysing the correlation of adjacent pixels. Moreover, the entropy value is close to 8, the number of the pixel change rate is greater than 99.61% and there is high sensitivity of the key parameters with large key space to resist various attacks.
引用
收藏
页码:92687 / 92696
页数:10
相关论文
共 50 条
  • [1] An End-to-End View of IoT Security and Privacy
    Ling, Zhen
    Liu, Kaizheng
    Xu, Yiling
    Jin, Yier
    Fu, Xinwen
    GLOBECOM 2017 - 2017 IEEE GLOBAL COMMUNICATIONS CONFERENCE, 2017,
  • [2] Flexible IoT security middleware for end-to-end cloud-fog communication
    Mukherjee, Bidyut
    Wang, Songjie
    Lu, Wenyi
    Neupane, Roshan Lal
    Dunn, Daniel
    Ren, Yijie
    Su, Qi
    Calyam, Prasad
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 87 : 688 - 703
  • [3] IoTSM: An End-to-end Security Model for IoT Ecosystems
    Bugeja, Joseph
    Vogel, Bahtijar
    Jacobsson, Andreas
    Varshney, Rimpu
    2019 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS (PERCOM WORKSHOPS), 2019, : 267 - 272
  • [4] TOWARD END-TO-END BIOMETRICS-BASED SECURITY FOR IOT INFRASTRUCTURE
    Hossain, M. Shamim
    Muhammad, Ghulam
    Rahman, Sk Md Mizanur
    Abdul, Wadood
    Alelaiwi, Abdulhameed
    Alamri, Atif
    IEEE WIRELESS COMMUNICATIONS, 2016, 23 (05) : 44 - 51
  • [5] Efficient End-to-End Security Scheme for Privacy-Preserving in IoT
    Harbi, Yasmine
    Refoufi, Allaoua
    Aliouat, Zibouda
    Harous, Saad
    2019 4TH INTERNATIONAL CONFERENCE ON NETWORKING AND ADVANCED SYSTEMS (ICNAS 2019), 2019, : 94 - 99
  • [6] A decentralized scalable security framework for end-to-end authentication of future IoT communication
    Sheron, P. S. Febin
    Sridhar, K. P.
    Baskar, S.
    Shakeel, P. Mohamed
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2020, 31 (12)
  • [7] Decentralized security framework for future IoT end-to-end connectivity
    Xin, Qin
    Gonzalez Crespo, Ruben
    Enrique Montenegro-Marin, Carlos
    Garcia Diaz, Vicente
    Alazab, Mamoun
    ANNALS OF OPERATIONS RESEARCH, 2023, 326 (SUPPL 1) : 79 - 79
  • [8] Application Layer Key Establishment for End-to-End Security in IoT
    Perez, Salvador
    Hernandez-Ramos, Jose L.
    Raza, Shahid
    Skarmeta, Antonio
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (03): : 2117 - 2128
  • [9] Hybrid End-to-End VPN Security Approach for Smart IoT Objects
    Juma, Mazen
    Monem, Azza Abdel
    Shaalan, Khaled
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2020, 158
  • [10] End-to-end security enabled intelligent remote IoT monitoring system
    Saleem, Kashif
    Zinou, Mohammed Farouk
    Mohammad, Farah
    Ouni, Ridha
    Elhendi, Ahmed Zohier
    Almuhtadi, Jalal
    FRONTIERS IN PHYSICS, 2024, 12