Intelligent security algorithm for UNICODE data privacy and security in IOT

被引:0
|
作者
Balajee Maram
J. M. Gnanasekar
Gunasekaran Manogaran
M. Balaanand
机构
[1] GMR Institute of Technology,Department of CSE
[2] Sri Venkateswara College of Engineering,Department of Computer Science and Engineering
[3] University of California,Department of CSE
[4] V.R.S. College of Engineering and Technology,undefined
关键词
UNICODE; S-box; Hamming distance; Avalanche effect; Balanced output;
D O I
暂无
中图分类号
学科分类号
摘要
Information security algorithms provide praxis for security to the different forms of data. Data are transmitted in different forms like ASCII text, UNICODE text, audio, video, image, etc. Different algorithms have been proposed by various researchers for handling text security. The existing cryptographic algorithms are working on ASCII text. Multilingual data communication is so prevalent in the digital era. In the digital era, many symmetric cryptographic algorithms have been introduced using S-boxes. S-box is a vital component for some cluster of cryptographic algorithms. Some cryptographic algorithms depend on the static S-box, which yields insecurity to the digital data. The existing S-box concept handles ASCII text only. This research paper presents the Substitution box (S-box) that is dynamic and key-dependent. Dynamic and key-dependent S-box wraps the data with high security. This S-box works with UNICODE text which includes UTF-16. It was tested for UNICODE text using python language. It concludes that the novel S-box is suitable for handling UNICODE text and shows better performance.
引用
收藏
页码:3 / 15
页数:12
相关论文
共 50 条
  • [1] Intelligent security algorithm for UNICODE data privacy and security in IOT
    Maram, Balajee
    Gnanasekar, J. M.
    Manogaran, Gunasekaran
    Balaanand, M.
    SERVICE ORIENTED COMPUTING AND APPLICATIONS, 2019, 13 (01) : 3 - 15
  • [2] Intelligent Data Security and Privacy for Smart Cities
    Kenneally, Erin
    IEEE Internet of Things Magazine, 2019, 2 (03): : 7 - 9
  • [3] Data Security and Privacy Challenges in Adopting Solutions For IOT
    Padaki, Sagar
    Supriya, S.
    2016 IEEE INTERNATIONAL CONFERENCE ON INTERNET OF THINGS (ITHINGS) AND IEEE GREEN COMPUTING AND COMMUNICATIONS (GREENCOM) AND IEEE CYBER, PHYSICAL AND SOCIAL COMPUTING (CPSCOM) AND IEEE SMART DATA (SMARTDATA), 2016, : 410 - 415
  • [4] Data Security & Privacy Protection in IoT MGC Systems
    Huijie, Robert Deng
    PROCEEDINGS OF THE 9TH ACM CYBER-PHYSICAL SYSTEM SECURITY WORKSHOP, CPSS 2023, 2023, : 1 - 1
  • [5] IoT Big Data Security and Privacy Versus Innovation
    Sollins, Karen R.
    IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (02) : 1628 - 1635
  • [6] Social IoT Security and Privacy
    Maniveena
    Kalaiselvi
    2023 ADVANCED COMPUTING AND COMMUNICATION TECHNOLOGIES FOR HIGH PERFORMANCE APPLICATIONS, ACCTHPA, 2023,
  • [7] IoT Security and Privacy Issues
    Assiri, Abeer
    Almagwashi, Haya
    2018 1ST INTERNATIONAL CONFERENCE ON COMPUTER APPLICATIONS & INFORMATION SECURITY (ICCAIS' 2018), 2018,
  • [8] Is there a Room for security and Privacy in IoT?
    Tabane, Elias
    Zuva, Tranos
    2016 THIRD INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATION AND ENGINEERING (ICACCE 2016), 2016, : 260 - 264
  • [9] Security and privacy in IoT communication
    Li, Jin
    Liao, Xiaofeng
    Puech, Nicolas
    ANNALS OF TELECOMMUNICATIONS, 2019, 74 (7-8) : 373 - 374
  • [10] Security and privacy in IoT communication
    Jin Li
    Xiaofeng Liao
    Nicolas Puech
    Annals of Telecommunications, 2019, 74 : 373 - 374