Providing End-to-End Security Using Quantum Walks in IoT Networks

被引:54
|
作者
Abd El-Latif, Ahmed A. [1 ,2 ]
Abd-El-Atty, Bassem [2 ]
Venegas-Andraca, Salvador E. [3 ]
Elwahsh, Haitham [4 ]
Piran, Md Jalil [5 ]
Bashir, Ali Kashif [6 ]
Song, Oh-Young [7 ]
Mazurczyk, Wojciech [8 ]
机构
[1] Menoufia Univ, Fac Sci, Math & Comp Sci Dept, Shibin Al Kawm 32511, Egypt
[2] Menoufia Univ, Ctr Excellence Cybersecur Quantum Informat Proc &, Shibin Al Kawm 32511, Egypt
[3] Tecnol Monterrey, Escuela Ingn & Ciencias, Monterrey 64849, Mexico
[4] Kafrelsheikh Univ, Fac Comp & Informat, Comp Sci Dept, Kafrelsheikh 33516, Egypt
[5] Sejong Univ, Comp Engn Dept, Seoul 05006, South Korea
[6] Manchester Metropolitan Univ, Dept Comp & Math, Manchester M15 6BH, Lancs, England
[7] Sejong Univ, Software Dept, Seoul 05006, South Korea
[8] Warsaw Univ Technol, Inst Comp Sci, PL-00665 Warsaw, Poland
关键词
Quantum walks; lightweight cipher; data transfer in IoT; image encryption; edge computing; wireless communication; HEALTH-CARE; ENCRYPTION; INTERNET; THINGS; PRIVACY; FRAMEWORK; SCHEME; DESIGN;
D O I
10.1109/ACCESS.2020.2992820
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of Things acts an essential role in our everyday lives and it definitely has the potential to grow on the importance and revolutionize our future. However, the present communication technologies have several security related issues which is required to provide secure end to end connectivity among services. Moreover, due to recent, rapid growth of quantum technologies, most common security mechanisms considered secure today may be soon imperilled. Thus, the modern security mechanisms during their construction also require the power of quantum technologies to resist various potential attacks from quantum computers. Because of its characteristics, quantum walks (QW) is considered as a universal quantum computation paradigm that can be accepted as an excellent key generator. In this regard, in this paper a new lightweight image encryption scheme based on QW for secure data transfer in the internet of things platforms and wireless networking with edge computing is proposed. The introduced approach utilises the power of nonlinear dynamic behaviour of QW to construct permutation boxes and generates pseudo-random numbers for encrypting the plain image after dividing it into blocks. The results of the conducted simulation and numerical analyses confirm that the presented encryption algorithm is effective. The encrypted images have randomness properties, no useful data about the ciphered image can be obtained via analysing the correlation of adjacent pixels. Moreover, the entropy value is close to 8, the number of the pixel change rate is greater than 99.61% and there is high sensitivity of the key parameters with large key space to resist various attacks.
引用
收藏
页码:92687 / 92696
页数:10
相关论文
共 50 条
  • [1] End-to-End Security for the IoT
    Dooley, James
    INTELLIGENT ENVIRONMENTS 2016, 2016, 21 : 606 - 606
  • [2] End-to-end Security Architecture for Federated Cloud and IoT Networks
    Massonet, Philippe
    Deru, Laurent
    Achour, Amel
    Dupont, Sebastien
    Levin, Anna
    Villari, Massimo
    2017 IEEE INTERNATIONAL CONFERENCE ON SMART COMPUTING (SMARTCOMP), 2017, : 463 - 468
  • [3] An End-to-End View of IoT Security and Privacy
    Ling, Zhen
    Liu, Kaizheng
    Xu, Yiling
    Jin, Yier
    Fu, Xinwen
    GLOBECOM 2017 - 2017 IEEE GLOBAL COMMUNICATIONS CONFERENCE, 2017,
  • [4] Composable end-to-end security of Gaussian quantum networks with untrusted relays
    Ghalaii, Masoud
    Papanastasiou, Panagiotis
    Pirandola, Stefano
    NPJ QUANTUM INFORMATION, 2022, 8 (01)
  • [5] Composable end-to-end security of Gaussian quantum networks with untrusted relays
    Masoud Ghalaii
    Panagiotis Papanastasiou
    Stefano Pirandola
    npj Quantum Information, 8
  • [6] IoTSM: An End-to-end Security Model for IoT Ecosystems
    Bugeja, Joseph
    Vogel, Bahtijar
    Jacobsson, Andreas
    Varshney, Rimpu
    2019 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS (PERCOM WORKSHOPS), 2019, : 267 - 272
  • [7] LEDS: Providing location-aware end-to-end data security in wireless sensor networks
    Ren, Kui
    Lou, Wenjing
    Zhang, Yanchao
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2008, 7 (05) : 585 - 598
  • [8] LEDS: Providing location-aware end-to-end data security in wireless sensor networks
    Ren, Kui
    Lou, Wenjing
    Zhang, Yanchao
    25TH IEEE INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-7, PROCEEDINGS IEEE INFOCOM 2006, 2006, : 2584 - 2595
  • [9] Application Layer Key Establishment for End-to-End Security in IoT
    Perez, Salvador
    Hernandez-Ramos, Jose L.
    Raza, Shahid
    Skarmeta, Antonio
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (03): : 2117 - 2128
  • [10] Decentralized security framework for future IoT end-to-end connectivity
    Xin, Qin
    Gonzalez Crespo, Ruben
    Enrique Montenegro-Marin, Carlos
    Garcia Diaz, Vicente
    Alazab, Mamoun
    ANNALS OF OPERATIONS RESEARCH, 2023, 326 (SUPPL 1) : 79 - 79