Intelligent security algorithm for UNICODE data privacy and security in IOT

被引:59
|
作者
Maram, Balajee [1 ]
Gnanasekar, J. M. [2 ]
Manogaran, Gunasekaran [3 ]
Balaanand, M. [4 ]
机构
[1] GMR Inst Technol, Dept CSE, Rajam, India
[2] Sri Venkateswara Coll Engn, Dept Comp Sci & Engn, Sriperumbudur, India
[3] Univ Calif Davis, Davis, CA 95616 USA
[4] VRS Coll Engn & Technol, Dept CSE, Villupuram, India
关键词
UNICODE; S-box; Hamming distance; Avalanche effect; Balanced output; S-BOX GENERATION;
D O I
10.1007/s11761-018-0249-x
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Information security algorithms provide praxis for security to the different forms of data. Data are transmitted in different forms like ASCII text, UNICODE text, audio, video, image, etc. Different algorithms have been proposed by various researchers for handling text security. The existing cryptographic algorithms are working on ASCII text. Multilingual data communication is so prevalent in the digital era. In the digital era, many symmetric cryptographic algorithms have been introduced using S-boxes. S-box is a vital component for some cluster of cryptographic algorithms. Some cryptographic algorithms depend on the static S-box, which yields insecurity to the digital data. The existing S-box concept handles ASCII text only. This research paper presents the Substitution box (S-box) that is dynamic and key-dependent. Dynamic and key-dependent S-box wraps the data with high security. This S-box works with UNICODE text which includes UTF-16. It was tested for UNICODE text using python language. It concludes that the novel S-box is suitable for handling UNICODE text and shows better performance.
引用
收藏
页码:3 / 15
页数:13
相关论文
共 50 条
  • [41] Editorial: Special Issue on Security and Privacy of IoT
    Hua Wang
    Zonghua Zhang
    Tarek Taleb
    [J]. World Wide Web, 2018, 21 : 1 - 6
  • [42] Security and Privacy Issues for Business Intelligence In IOT
    Kagita, Mohan Krishna
    [J]. PROCEEDINGS OF 2019 IEEE 12TH INTERNATIONAL CONFERENCE ON GLOBAL SECURITY, SAFETY AND SUSTAINABILITY (ICGS3-2019), 2019, : 116 - +
  • [43] Data-centric security: Integrating data privacy and data security
    Hennessy, S. D.
    Lauer, G. D.
    Zunic, N.
    Gerber, B.
    Nelson, A. C.
    [J]. IBM JOURNAL OF RESEARCH AND DEVELOPMENT, 2009, 53 (02)
  • [44] Security and Privacy for Emerging IoT and CPS Domains
    Bertino, Elisa
    Sandhu, Ravi
    Bhavani
    Ray, Indrakshi
    Li, Wenjia
    Gupta, Maanak
    Mittal, Sudip
    [J]. CODASPY'22: PROCEEDINGS OF THE TWELVETH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY, 2022, : 336 - 337
  • [45] Security and privacy for IoT and Fog Computing Paradigm
    Rauf, Abdul
    Shaikh, Riaz Ahmed
    Shah, Asadullah
    [J]. 2018 15TH LEARNING AND TECHNOLOGY CONFERENCE (L&T), 2018, : 96 - 101
  • [46] Internet of Things (IoT): Security and Privacy Threats
    Shaikh, Eman
    Mohiuddin, Iman
    Manzoor, Ayisha
    [J]. 2019 2ND INTERNATIONAL CONFERENCE ON COMPUTER APPLICATIONS & INFORMATION SECURITY (ICCAIS), 2019,
  • [47] Privacy and Security Best Practices for IoT Solutions
    Anedda, Matteo
    Floris, Alessandro
    Girau, Roberto
    Fadda, Mauro
    Ruiu, Pietro
    Farina, Massimo
    Bonu, Alessandro
    Giusto, Daniele D.
    [J]. IEEE ACCESS, 2023, 11 : 129156 - 129172
  • [48] Special Issue on Security and Privacy in Blockchains and the IoT
    Stach, Christoph
    [J]. FUTURE INTERNET, 2022, 14 (11):
  • [49] RESEARCH ON SECURITY AND PRIVACY FOR IOT-DOMOTICS
    Cheng, Jinxue
    Lu, Xiaoming
    Qiu, Qin
    Lu, Qing
    [J]. 2021 ITU KALEIDOSCOPE CONFERENCE: CONNECTING PHYSICAL AND VIRTUAL WORLDS (ITU K), 2021, : 75 - 84
  • [50] A Testbed for Security and Privacy Analysis of IoT Devices
    Tekeoglu, Ali
    Tosun, Ali Saman
    [J]. PROCEEDINGS 2016 IEEE 13TH INTERNATIONAL CONFERENCE ON MOBILE AD HOC AND SENSOR SYSTEMS (MASS 2016), 2016, : 343 - 348