Secure Data Encryption Based on Quantum Walks for 5G Internet of Things Scenario

被引:147
作者
Abd El-Latif, Ahmed A. [1 ,2 ,3 ,4 ]
Abd-El-Atty, Bassem [1 ]
Mazurczyk, Wojciech [5 ]
Fung, Carol [6 ]
Venegas-Andraca, Salvador E. [7 ]
机构
[1] Menoufia Univ, Math & Comp Sci Dept, Fac Sci, Shibin Al Kawm 32511, Egypt
[2] Nile Univ, Sch Informat Technol & Comp Sci, Giza 12588, Egypt
[3] Univ Jeddah, Dept Cybersecur, Coll Comp Sci & Engn, Jeddah 23890, Saudi Arabia
[4] Harbin Inst Technol, Sch Comp Sci & Technol, Harbin 150080, Peoples R China
[5] Warsaw Univ Technol, Inst Comp Sci, Fac Elect & Informat Technol, PL-00665 Warsaw, Poland
[6] Virginia Commonwealth Univ, Sch Engn, Dept Comp Sci, Med Coll Virginia Campus, Richmond, VA 23284 USA
[7] Tecnol Monterrey, Escuela Ingn & Ciencias, Monterrey 64849, Mexico
来源
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT | 2020年 / 17卷 / 01期
关键词
5G networks; IoT; video encryption; quantum walks; security analysis; S-BOXES; BIG DATA; IMAGE; CHAOS; SCHEME; STORAGE; DESIGN; IOT; TECHNOLOGIES; CHALLENGES;
D O I
10.1109/TNSM.2020.2969863
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Fifth generation (5G) networks are the base communication technology for connecting objects in the Internet of Things (IoT) environment. 5G is being developed to provide extremely large capacity, robust integrity, high bandwidth, and low latency. With the development and innovating new techniques for 5G-IoT, it surely will drive to new enormous security and privacy challenges. Consequently, secure techniques for data transmissions will be needed as the basis for 5G-IoT technology to address these arising challenges. Therefore, various traditional security mechanisms are provided for 5G-IoT technologies and most of them are built on mathematical foundations. With the growth of quantum technologies, traditional cryptographic techniques may be compromised due to their mathematical computation based construction. Quantum walks (QWs) is a universal quantum computational model, which possesses inherent cryptographic features that can be utilized to build efficient cryptographic mechanisms. In this paper, we use the features of quantum walk to construct a new S-box method which plays a significant role in block cipher techniques for 5G-IoT technologies. As an application of the presented S-box mechanism and controlled alternate quantum walks (CAQWs) for 5G-IoT technologies a new robust video encryption mechanism is proposed. As well as to fulfill needs of encryption for varied files in 5G-IoT, we utilize the features of quantum walk to propose a novel encryption strategy for secure transmission of sensitive files in 5G-IoT paradigm. The analyses and results of the proposed cryptosystems show that it has better security properties and efficacy in terms of cryptographic performance.
引用
收藏
页码:118 / 131
页数:14
相关论文
共 78 条
  • [1] Controlled alternate quantum walk-based pseudo-random number generator and its application to quantum color image encryption
    Abd EL-Latif, Ahmed A.
    Abd-El-Atty, Bassem
    Venegas-Andraca, Salvador E.
    [J]. PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS, 2020, 547
  • [2] Controlled alternate quantum walks based privacy preserving healthcare images in Internet of Things
    Abd EL-Latif, Ahmed A.
    Abd-El-Atty, Bassem
    Abou-Nassar, Eman M.
    Venegas-Andraca, Salvador E.
    [J]. OPTICS AND LASER TECHNOLOGY, 2020, 124
  • [3] Efficient quantum-based security protocols for information sharing and data protection in 5G networks
    Abd EL-Latif, Ahmed A.
    Abd-El-Atty, Bassem
    Venegas-Andraca, Salvador E.
    Mazurczyk, Wojciech
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 100 : 893 - 906
  • [4] A novel image steganography technique based on quantum substitution boxes
    Abd EL-Latif, Ahmed A.
    Abd-El-Atty, Bassem
    Venegas-Andraca, Salvador E.
    [J]. OPTICS AND LASER TECHNOLOGY, 2019, 116 : 92 - 102
  • [5] Secure Quantum Steganography Protocol for Fog Cloud Internet of Things
    Abd El-Latif, Ahmed A.
    Abd-El-Atty, Bassem
    Hossain, M. Shamim
    Elmougy, Samir
    Ghoneim, Ahmed
    [J]. IEEE ACCESS, 2018, 6 : 10332 - 10340
  • [6] An encryption protocol for NEQR images based on one-particle quantum walks on a circle
    Abd-El-Atty, Bassem
    Abd El-Latif, Ahmed A.
    Venegas-Andraca, Salvador E.
    [J]. QUANTUM INFORMATION PROCESSING, 2019, 18 (09)
  • [7] Side-Channel Analysis of Chaos-Based Substitution Box Structures
    Acikkapi, Mehmet Sahin
    Ozkaynak, Fatih
    Ozer, Ahmet Bedri
    [J]. IEEE ACCESS, 2019, 7 : 79030 - 79043
  • [8] A Survey on 5G Networks for the Internet of Things: Communication Technologies and Challenges
    Akpakwu, Godfrey Anuga
    Silva, Bruno J.
    Hancke, Gerhard P.
    Abu-MAhfouz, Adnan M.
    [J]. IEEE ACCESS, 2018, 6 : 3619 - 3647
  • [9] Application Based Construction and Optimization of Substitution Boxes Over 2D Mixed Chaotic Maps
    Ali, Khawaja Muhammad
    Khan, Majid
    [J]. INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2019, 58 (09) : 3091 - 3117
  • [10] SeDaSC: Secure Data Sharing in Clouds
    Ali, Mazhar
    Dhamotharan, Revathi
    Khan, Eraj
    Khan, Samee U.
    Vasilakos, Athanasios V.
    Li, Keqin
    Zomaya, Albert Y.
    [J]. IEEE SYSTEMS JOURNAL, 2017, 11 (02): : 395 - 404