Secure Data Encryption Based on Quantum Walks for 5G Internet of Things Scenario

被引:147
作者
Abd El-Latif, Ahmed A. [1 ,2 ,3 ,4 ]
Abd-El-Atty, Bassem [1 ]
Mazurczyk, Wojciech [5 ]
Fung, Carol [6 ]
Venegas-Andraca, Salvador E. [7 ]
机构
[1] Menoufia Univ, Math & Comp Sci Dept, Fac Sci, Shibin Al Kawm 32511, Egypt
[2] Nile Univ, Sch Informat Technol & Comp Sci, Giza 12588, Egypt
[3] Univ Jeddah, Dept Cybersecur, Coll Comp Sci & Engn, Jeddah 23890, Saudi Arabia
[4] Harbin Inst Technol, Sch Comp Sci & Technol, Harbin 150080, Peoples R China
[5] Warsaw Univ Technol, Inst Comp Sci, Fac Elect & Informat Technol, PL-00665 Warsaw, Poland
[6] Virginia Commonwealth Univ, Sch Engn, Dept Comp Sci, Med Coll Virginia Campus, Richmond, VA 23284 USA
[7] Tecnol Monterrey, Escuela Ingn & Ciencias, Monterrey 64849, Mexico
来源
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT | 2020年 / 17卷 / 01期
关键词
5G networks; IoT; video encryption; quantum walks; security analysis; S-BOXES; BIG DATA; IMAGE; CHAOS; SCHEME; STORAGE; DESIGN; IOT; TECHNOLOGIES; CHALLENGES;
D O I
10.1109/TNSM.2020.2969863
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Fifth generation (5G) networks are the base communication technology for connecting objects in the Internet of Things (IoT) environment. 5G is being developed to provide extremely large capacity, robust integrity, high bandwidth, and low latency. With the development and innovating new techniques for 5G-IoT, it surely will drive to new enormous security and privacy challenges. Consequently, secure techniques for data transmissions will be needed as the basis for 5G-IoT technology to address these arising challenges. Therefore, various traditional security mechanisms are provided for 5G-IoT technologies and most of them are built on mathematical foundations. With the growth of quantum technologies, traditional cryptographic techniques may be compromised due to their mathematical computation based construction. Quantum walks (QWs) is a universal quantum computational model, which possesses inherent cryptographic features that can be utilized to build efficient cryptographic mechanisms. In this paper, we use the features of quantum walk to construct a new S-box method which plays a significant role in block cipher techniques for 5G-IoT technologies. As an application of the presented S-box mechanism and controlled alternate quantum walks (CAQWs) for 5G-IoT technologies a new robust video encryption mechanism is proposed. As well as to fulfill needs of encryption for varied files in 5G-IoT, we utilize the features of quantum walk to propose a novel encryption strategy for secure transmission of sensitive files in 5G-IoT paradigm. The analyses and results of the proposed cryptosystems show that it has better security properties and efficacy in terms of cryptographic performance.
引用
收藏
页码:118 / 131
页数:14
相关论文
共 78 条
  • [11] Some basic cryptographic requirements for chaos-based cryptosystems
    Alvarez, Gonzalo
    Li, Shujun
    [J]. INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 2006, 16 (08): : 2129 - 2151
  • [12] Chaos-based hash function (CBHF) for cryptographic applications
    Amin, Mohamed
    Faragallah, Osama S.
    El-Latif, Ahmed A. Abd
    [J]. CHAOS SOLITONS & FRACTALS, 2009, 42 (02) : 767 - 772
  • [13] [Anonymous], 2013, International Journal of Engineering Research and Applications (IJERA)
  • [14] [Anonymous], 2018, SMART THINGS FEMTOCE
  • [15] [Anonymous], 1990, WORKSH THEOR APPL CR
  • [16] SecSVA: Secure Storage, Verification, and Auditing of Big Data in the Cloud Environment
    Aujla, Gagangeet Singh
    Chaudhary, Rajat
    Kumar, Neeraj
    Das, Ashok Kumar
    Rodrigues, Joel J. P. C.
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2018, 56 (01) : 78 - 85
  • [17] A simple yet efficient S-box method based on chaotic sine map
    Belazi, Akram
    Abd El-Latif, Ahmed A.
    [J]. OPTIK, 2017, 130 : 1438 - 1444
  • [18] Efficient cryptosystem approaches: S-boxes and permutation-substitution-based encryption
    Belazi, Akram
    Khan, Majid
    Abd El-Latif, Ahmed A.
    Belghith, Safya
    [J]. NONLINEAR DYNAMICS, 2017, 87 (01) : 337 - 361
  • [19] Perfect nonlinear functions and cryptography
    Blondeau, Celine
    Nyberg, Kaisa
    [J]. FINITE FIELDS AND THEIR APPLICATIONS, 2015, 32 : 120 - 147
  • [20] Borkar S, 2016, 2016 International Conference on Internet of Things and Applications (IOTA), P443, DOI 10.1109/IOTA.2016.7562769