location:Home > 2020 Vol.3 Aug. No.4 > Automatic encryption of captured data in sensor networks based on symmetric algorithm

2020 Vol.3 Aug. No.4

  • Title: Automatic encryption of captured data in sensor networks based on symmetric algorithm
  • Name: Seungmin Rho
  • Company: Dept. of Industrial Security, Chung-Ang University, Seoul, Korea
  • Abstract:

    Due to the limitations of sensor networks in computing power and vulnerability, traditional network key distribution and management methods are not applicable. In this paper, an automatic encryption method based on symmetric algorithm is proposed. Based on the digital encryption algorithm of DES, a hybrid chaotic optimization encryption theory is proposed. Firstly, the dynamic hybrid chaotic f structure of symmetric algorithm is designed by dynamic iteration method, and then the key suitable for data encryption of sensor network is selected and managed, and the key expansion algorithm is established. Finally, the automatic encryption method of sensor network capture data is completed by combining one-dimensional logistic map with two-dimensional Henon mapping, compared with AES and RAS algorithm. The experimental results of TinyOS simulation platform show the feasibility and effectiveness of the proposed method, and show good comprehensive performance, which provides a new means for the encryption of sensor networks.


  • Keyword: symmetric algorithm; sensor network; capture data; automatic encryption; dynamic iteration
  • DOI: 10.12250/jpciams2020040405
  • Citation form: Seungmin Rho.Automatic encryption of captured data in sensor networks based on symmetric algorithm[J]. Computer Informatization and Mechanical System, 2020, vol. 3, pp. 59-72.
Reference:

[1]Kumaresan S Shanmugam V . Time-variant attribute-based multitype encryption algorithm for improved cloud data security using user profile[J]. The Journal of Supercomputing2020(76):6094–6112.

[2]BhardwajRupali. Enhanced encrypted reversible data hIDing algorithm with minimum distortion through homomorphic encryption[J]. Journal of Electronic Imaging201827(2):1-9.

[3] Shuai Liu, Xinyu Liu, Shuai Wang, Khan Muhammad. Fuzzy-Aided Solution for Out-of-View Challenge in Visual Tracking under IoT Assisted Complex Environment. Neural Computing & Applications, 2021, 33(4): 1055-1065.

[4]Hasheminejad A Rostami M J . A novel bit level multiphase algorithm for image encryption based on PWLCM chaotic map[J]. Optik2019184:205-213.

[5]Chai X Zheng X Gan Z et al. An image encryption algorithm based on chaotic system and compressive sensing[J]. Signal Processing2018148(7):124-144. 

[6]Ayantika ChatterjeeIndranil SenGupta. Translating Algorithms to handle Fully Homomorphic Encrypted Data on the Cloud[J]. IEEE Transactions on Cloud Computing20186(1):287-300.

[7]Pujari S K Bhattacharjee G Bhoi S . A HybrIDized Model for Image Encryption through Genetic Algorithm and DNA Sequence[J]. Procedia Computer Science2018125:165-171.

[8]Ghulam M Muhammad T Hanif S M . Energy Efficient Data Encryption Techniques in Smartphones[J]. Wireless Personal Communications2018106(11):2023-2035.

[9]Gai K Qiu M Zhao H . Privacy-Preserving Data Encryption Strategy for Big Data in Mobile Cloud Computing[J]. IEEE Transactions on Big Data201718(5):1-1.

[10] Zong J Hajomer A A E Zhang L et al. Real-time secure optical OFDM transmission with chaotic data encryption[J]. Optics Communications2020473(15):126005.

[11] Liu, S., Bai, W., Srivastava, G. et al. Property of Self-Similarity Between Baseband and Modulated Signals. Mobile Networks & Applications, 2020, 25(4): 1537-1547.

[12]Bokhari M U Shallal Q M Tamandani Y K . Reducing the Required Time and Power for Data Encryption and Decryption Using K-NN Machine Learning[J]. IETE Journal of Research201965(2):227-235.

[13]Wang Y Zhang W Chen G et al. Multi-Gbit/s real-time modems for chaotic optical OFDM data encryption and decryption[J]. Optics Communications2018432(9):39-43.

[14]Angizi S He Z Bagherzadeh N et al. Design and Evaluation of a Spintronic In-Memory Processing Platform for Nonvolatile Data Encryption[J]. 201837(9):1788-1801.

[15]Vengala D V K Kavitha D Kumar A P S . Secure data transmission on a distributed cloud server with the help of HMCA and data encryption using optimized CP-ABE-ECC[J]. Cluster Computing2020(5).

[16] Shuai Liu. Introduction of Key Problems in Long-Distance Learning and Training, Mobile Networks and Applications, 2019, 24(1): 1-4.

[17] Akgul A Kacar S Pehlivan I et al. Chaos‐based encryption of multimedia data and design of security analysis interface as an educational tool[J]. Computer Applications in Engineering Education201826(5):1336-1349.

[18]Quang D V Hoan T N K Koo I . Energy-Efficient Data Encryption Scheme for Cognitive Radio Networks[J]. IEEE Sensors Journal201810(1):2050-2059.

[19] Sultan A Yang X Hajomer A A E et al. Chaotic Constellation Mapping for Physical-Layer Data Encryption in OFDM-PON[J]. IEEE Photonics Technology Letters20184(1):339-342.

[20]Bai T Lin J Li G et al. A lightweight method of data encryption in BANs using electrocardiogram signal[J]. Future Generation Computer Systems201892(3):800-811.

[21] Chen H Yang X Hu W . Chaotic reconfigurable ZCMT precoder for OFDM data encryption and PAPR reduction[J]. Optics Communications2017405(15):12-16.

[22]Puthal D Wu X Nepal S et al. SEEN: A Selective Encryption Method to Ensure ConfIDentiality for Big Sensing Data Streams[J]. IEEE Transactions on Big Data20178(5):379-392.

[23] Qin Y Zhang Y . Information Encryption in Ghost Imaging With Customized Data Container and XOR Operation[J]. IEEE Photonics Journal201731(3):7802208.

[24]Liu W Liu J Wu Q et al. Efficient subtree-based encryption for fuzzy-entity data sharing[J]. Soft Computing201822(4):7961-7976.

[25]Li H Yang Y Dai Y et al. Achieving Secure and Efficient Dynamic Searchable Symmetric Encryption over Medical Cloud Data[J]. IEEE Transactions on Cloud Computing20208(2):484-494.

 


Tsuruta Institute of Medical Information Technology
Address:[502,5-47-6], Tsuyama, Tsukuba, Saitama, Japan TEL:008148-28809 fax:008148-28808 Japan,Email:jpciams@hotmail.com,2019-09-16