Research on AI security enhanced encryption algorithm of autonomous IoT systems

被引:79
作者
Li, Bin [1 ,4 ,5 ]
Feng, Yuhao [3 ]
Xiong, Zenggang [2 ]
Yang, Weidong [1 ,5 ]
Liu, Gang [1 ,5 ]
机构
[1] Henan Univ Technol, Coll Informat Sci & Engn, Zhengzhou, Peoples R China
[2] Hubei Engn Univ, Sch Comp & Informat Sci, Xiaogan, Peoples R China
[3] China Univ Geosci, Sch Geog & Informat Engn, Wuhan, Peoples R China
[4] State Key Lab Geoinformat Engn, Xian, Peoples R China
[5] Henan Univ Technol, Henan Key Lab Grain Photoelect Detect & Control, Zhengzhou, Peoples R China
基金
中国国家自然科学基金;
关键词
Data security; AI; Secure network coding; Data encryption; Depth first search; Autonomous IoT systems;
D O I
10.1016/j.ins.2021.06.016
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Aiming at the security issues during the multi-types data storage and data transmission in autonomous Internet of Things (IoT) systems, this paper proposes an AI algorithm for data enhanced encryption used in the ends and the intermediate nodes of IoTs. The algorithm in this paper first constructs a three-dimensional Arnold transformation matrix for data unit value encryption in the end of IoTs, and designs a quantum logic intelligent mapping that effectively diffuses the encrypted data units to reduce the linear correlation of the image data and to improve the security performance of IoT edge data. Furthermore, the algorithm designs an AI access strategy for scrambling sequence nodes and builds a random-access route for the elements of the scrambling sequence which can reduce the calculation cost and improve the operating efficiency of IoT system in the ends and intermediate nodes. Finally, the data shared matrix is used to share the encrypted data to achieve the (k, n) threshold strategy. Experimental results prove that the algorithm has high plaintext and key sensitivity and can effectively resist brute force attacks, statistical analysis and differential attacks. The algorithm in this paper provides an AI solution for data security encryption in the ends and the intermediate nodes of autonomous IoT systems. (c) 2021 Elsevier Inc. All rights reserved.
引用
收藏
页码:379 / 398
页数:20
相关论文
共 30 条
[1]   DNA based Multi-Secret Image Sharing [J].
Anbarasi, L. Jani ;
Mala, G. S. Anandha ;
Narendra, Modigari .
PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES, ICICT 2014, 2015, 46 :1794-1801
[2]   A novel chaos-based image encryption algorithm using DNA sequence operations [J].
Chai, Xiuli ;
Chen, Yiran ;
Broyde, Lucie .
OPTICS AND LASERS IN ENGINEERING, 2017, 88 :197-213
[3]  
Chen F., 2019, J BEIJING I PETROCHE, V27, P72
[4]  
[陈善学 Chen Shanxue], 2018, [重庆邮电大学学报. 自然科学版, Journal of Chongqing University of Posts and Telecommunications. Natural Science Edition], V30, P812
[5]   Who Moved My Data? Privacy Protection in Smartphones [J].
Dai, Wenyun ;
Qiu, Meikang ;
Qiu, Longfei ;
Chen, Longbin ;
Wu, Ana .
IEEE COMMUNICATIONS MAGAZINE, 2017, 55 (01) :20-25
[6]   An efficient attribute-based online/offline searchable encryption and its application in cloud-based reliable smart grid [J].
Eltayieb, Nabeil ;
Elhabob, Rashad ;
Hassan, Alzubair ;
Li, Fagen .
JOURNAL OF SYSTEMS ARCHITECTURE, 2019, 98 :165-172
[7]  
Fang L., 2018, CHINESE J IMAGE GRAP, V23, P123
[8]  
Feng X., 2019, J XIAN U POSTS TELEC, V24, P28
[9]   A chaos-based digital image encryption scheme with an improved diffusion strategy [J].
Fu, Chong ;
Chen, Jun-jie ;
Zou, Hao ;
Meng, Wei-hong ;
Zhan, Yong-feng ;
Yu, Ya-wen .
OPTICS EXPRESS, 2012, 20 (03) :2363-2378
[10]   Optimal resource allocation using reinforcement learning for IoT content-centric services [J].
Gai, Keke ;
Qiu, Meikang .
APPLIED SOFT COMPUTING, 2018, 70 :12-21