Intelligent security algorithm for UNICODE data privacy and security in IOT

被引:0
|
作者
Balajee Maram
J. M. Gnanasekar
Gunasekaran Manogaran
M. Balaanand
机构
[1] GMR Institute of Technology,Department of CSE
[2] Sri Venkateswara College of Engineering,Department of Computer Science and Engineering
[3] University of California,Department of CSE
[4] V.R.S. College of Engineering and Technology,undefined
关键词
UNICODE; S-box; Hamming distance; Avalanche effect; Balanced output;
D O I
暂无
中图分类号
学科分类号
摘要
Information security algorithms provide praxis for security to the different forms of data. Data are transmitted in different forms like ASCII text, UNICODE text, audio, video, image, etc. Different algorithms have been proposed by various researchers for handling text security. The existing cryptographic algorithms are working on ASCII text. Multilingual data communication is so prevalent in the digital era. In the digital era, many symmetric cryptographic algorithms have been introduced using S-boxes. S-box is a vital component for some cluster of cryptographic algorithms. Some cryptographic algorithms depend on the static S-box, which yields insecurity to the digital data. The existing S-box concept handles ASCII text only. This research paper presents the Substitution box (S-box) that is dynamic and key-dependent. Dynamic and key-dependent S-box wraps the data with high security. This S-box works with UNICODE text which includes UTF-16. It was tested for UNICODE text using python language. It concludes that the novel S-box is suitable for handling UNICODE text and shows better performance.
引用
收藏
页码:3 / 15
页数:12
相关论文
共 50 条
  • [41] Editorial: Special Issue on Security and Privacy of IoT
    Hua Wang
    Zonghua Zhang
    Tarek Taleb
    World Wide Web, 2018, 21 : 1 - 6
  • [42] On Misconception of Hardware and Cost in IoT Security and Privacy
    Pearson, Bryan
    Luo, Lan
    Zhang, Yue
    Dey, Rajib
    Ling, Zhen
    Bassiouni, Mostafa
    Fu, Xinwen
    ICC 2019 - 2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2019,
  • [43] Security and Privacy Issues for Business Intelligence In IOT
    Kagita, Mohan Krishna
    PROCEEDINGS OF 2019 IEEE 12TH INTERNATIONAL CONFERENCE ON GLOBAL SECURITY, SAFETY AND SUSTAINABILITY (ICGS3-2019), 2019, : 116 - +
  • [44] Data-centric security: Integrating data privacy and data security
    Hennessy, S. D.
    Lauer, G. D.
    Zunic, N.
    Gerber, B.
    Nelson, A. C.
    IBM JOURNAL OF RESEARCH AND DEVELOPMENT, 2009, 53 (02)
  • [45] Security and Privacy for Emerging IoT and CPS Domains
    Bertino, Elisa
    Sandhu, Ravi
    Bhavani
    Ray, Indrakshi
    Li, Wenjia
    Gupta, Maanak
    Mittal, Sudip
    CODASPY'22: PROCEEDINGS OF THE TWELVETH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY, 2022, : 336 - 337
  • [46] Security and privacy for IoT and Fog Computing Paradigm
    Rauf, Abdul
    Shaikh, Riaz Ahmed
    Shah, Asadullah
    2018 15TH LEARNING AND TECHNOLOGY CONFERENCE (L&T), 2018, : 96 - 101
  • [47] Internet of Things (IoT): Security and Privacy Threats
    Shaikh, Eman
    Mohiuddin, Iman
    Manzoor, Ayisha
    2019 2ND INTERNATIONAL CONFERENCE ON COMPUTER APPLICATIONS & INFORMATION SECURITY (ICCAIS), 2019,
  • [48] Privacy and Security Best Practices for IoT Solutions
    Anedda, Matteo
    Floris, Alessandro
    Girau, Roberto
    Fadda, Mauro
    Ruiu, Pietro
    Farina, Massimo
    Bonu, Alessandro
    Giusto, Daniele D.
    IEEE ACCESS, 2023, 11 : 129156 - 129172
  • [49] Special Issue on Security and Privacy in Blockchains and the IoT
    Stach, Christoph
    FUTURE INTERNET, 2022, 14 (11):
  • [50] RESEARCH ON SECURITY AND PRIVACY FOR IOT-DOMOTICS
    Cheng, Jinxue
    Lu, Xiaoming
    Qiu, Qin
    Lu, Qing
    2021 ITU KALEIDOSCOPE CONFERENCE: CONNECTING PHYSICAL AND VIRTUAL WORLDS (ITU K), 2021, : 75 - 84