Secure Data Encryption Based on Quantum Walks for 5G Internet of Things Scenario

被引:151
作者
Abd El-Latif, Ahmed A. [1 ,2 ,3 ,4 ]
Abd-El-Atty, Bassem [1 ]
Mazurczyk, Wojciech [5 ]
Fung, Carol [6 ]
Venegas-Andraca, Salvador E. [7 ]
机构
[1] Menoufia Univ, Math & Comp Sci Dept, Fac Sci, Shibin Al Kawm 32511, Egypt
[2] Nile Univ, Sch Informat Technol & Comp Sci, Giza 12588, Egypt
[3] Univ Jeddah, Dept Cybersecur, Coll Comp Sci & Engn, Jeddah 23890, Saudi Arabia
[4] Harbin Inst Technol, Sch Comp Sci & Technol, Harbin 150080, Peoples R China
[5] Warsaw Univ Technol, Inst Comp Sci, Fac Elect & Informat Technol, PL-00665 Warsaw, Poland
[6] Virginia Commonwealth Univ, Sch Engn, Dept Comp Sci, Med Coll Virginia Campus, Richmond, VA 23284 USA
[7] Tecnol Monterrey, Escuela Ingn & Ciencias, Monterrey 64849, Mexico
来源
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT | 2020年 / 17卷 / 01期
关键词
5G networks; IoT; video encryption; quantum walks; security analysis; S-BOXES; BIG DATA; IMAGE; CHAOS; SCHEME; STORAGE; DESIGN; IOT; TECHNOLOGIES; CHALLENGES;
D O I
10.1109/TNSM.2020.2969863
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Fifth generation (5G) networks are the base communication technology for connecting objects in the Internet of Things (IoT) environment. 5G is being developed to provide extremely large capacity, robust integrity, high bandwidth, and low latency. With the development and innovating new techniques for 5G-IoT, it surely will drive to new enormous security and privacy challenges. Consequently, secure techniques for data transmissions will be needed as the basis for 5G-IoT technology to address these arising challenges. Therefore, various traditional security mechanisms are provided for 5G-IoT technologies and most of them are built on mathematical foundations. With the growth of quantum technologies, traditional cryptographic techniques may be compromised due to their mathematical computation based construction. Quantum walks (QWs) is a universal quantum computational model, which possesses inherent cryptographic features that can be utilized to build efficient cryptographic mechanisms. In this paper, we use the features of quantum walk to construct a new S-box method which plays a significant role in block cipher techniques for 5G-IoT technologies. As an application of the presented S-box mechanism and controlled alternate quantum walks (CAQWs) for 5G-IoT technologies a new robust video encryption mechanism is proposed. As well as to fulfill needs of encryption for varied files in 5G-IoT, we utilize the features of quantum walk to propose a novel encryption strategy for secure transmission of sensitive files in 5G-IoT paradigm. The analyses and results of the proposed cryptosystems show that it has better security properties and efficacy in terms of cryptographic performance.
引用
收藏
页码:118 / 131
页数:14
相关论文
共 78 条
[1]   Controlled alternate quantum walk-based pseudo-random number generator and its application to quantum color image encryption [J].
Abd EL-Latif, Ahmed A. ;
Abd-El-Atty, Bassem ;
Venegas-Andraca, Salvador E. .
PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS, 2020, 547
[2]   Controlled alternate quantum walks based privacy preserving healthcare images in Internet of Things [J].
Abd EL-Latif, Ahmed A. ;
Abd-El-Atty, Bassem ;
Abou-Nassar, Eman M. ;
Venegas-Andraca, Salvador E. .
OPTICS AND LASER TECHNOLOGY, 2020, 124
[3]   Efficient quantum-based security protocols for information sharing and data protection in 5G networks [J].
Abd EL-Latif, Ahmed A. ;
Abd-El-Atty, Bassem ;
Venegas-Andraca, Salvador E. ;
Mazurczyk, Wojciech .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 100 :893-906
[4]   A novel image steganography technique based on quantum substitution boxes [J].
Abd EL-Latif, Ahmed A. ;
Abd-El-Atty, Bassem ;
Venegas-Andraca, Salvador E. .
OPTICS AND LASER TECHNOLOGY, 2019, 116 :92-102
[5]   Secure Quantum Steganography Protocol for Fog Cloud Internet of Things [J].
Abd El-Latif, Ahmed A. ;
Abd-El-Atty, Bassem ;
Hossain, M. Shamim ;
Elmougy, Samir ;
Ghoneim, Ahmed .
IEEE ACCESS, 2018, 6 :10332-10340
[6]   An encryption protocol for NEQR images based on one-particle quantum walks on a circle [J].
Abd-El-Atty, Bassem ;
Abd El-Latif, Ahmed A. ;
Venegas-Andraca, Salvador E. .
QUANTUM INFORMATION PROCESSING, 2019, 18 (09)
[7]   Side-Channel Analysis of Chaos-Based Substitution Box Structures [J].
Acikkapi, Mehmet Sahin ;
Ozkaynak, Fatih ;
Ozer, Ahmet Bedri .
IEEE ACCESS, 2019, 7 :79030-79043
[8]   A Survey on 5G Networks for the Internet of Things: Communication Technologies and Challenges [J].
Akpakwu, Godfrey Anuga ;
Silva, Bruno J. ;
Hancke, Gerhard P. ;
Abu-MAhfouz, Adnan M. .
IEEE ACCESS, 2018, 6 :3619-3647
[9]   Application Based Construction and Optimization of Substitution Boxes Over 2D Mixed Chaotic Maps [J].
Ali, Khawaja Muhammad ;
Khan, Majid .
INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2019, 58 (09) :3091-3117
[10]   SeDaSC: Secure Data Sharing in Clouds [J].
Ali, Mazhar ;
Dhamotharan, Revathi ;
Khan, Eraj ;
Khan, Samee U. ;
Vasilakos, Athanasios V. ;
Li, Keqin ;
Zomaya, Albert Y. .
IEEE SYSTEMS JOURNAL, 2017, 11 (02) :395-404