Skip to main content

A New Lightweight Encryption Approach for Correlated Content Exchange in Internet of Things

  • Conference paper
  • First Online:
Book cover Future Network Systems and Security (FNSS 2019)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1113))

Included in the following conference series:

  • 624 Accesses

Abstract

So far, many cryptography systems adapted to Internet of Things (IoT) paradigm have been introduced. However, in these approaches, the constraint of images exchange has not been taken into consideration. In fact, image content is characterized by the correlation between its elements e.g. pixels. Correlation impacts negatively the security. Actually, using correlation, one can disclose data content once he/she has recognized a part of it. In this paper, we introduce a new cryptography system that takes into consideration correlation issue. Furthermore, our system allows reducing significantly memory use and time consumption, which are critical factor in IoT dedicated cryptosystems.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Bogdanov, A., et al.: PRESENT: an ultra-lightweight block cipher. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol. 4727, pp. 450–466. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-74735-2_31

    Chapter  Google Scholar 

  2. Izadi, M., Sadeghiyan, B., Sadeghian, S.S., Khanooki, H.A.: MIBS: a new lightweight block cipher. In: Garay, Juan A., Miyaji, A., Otsuka, A. (eds.) CANS 2009. LNCS, vol. 5888, pp. 334–348. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-10433-6_22

    Chapter  Google Scholar 

  3. Zhang, W., Bao, Z., Lin, D., Rijmen, V., Bohan, Y., Ingrid, V.: RECTANGLE: a bit-slice ultra-lightweight block cipher suitable for multiple platforms. IACR Cryptol. ePrint Arch. 2014, 84 (2014)

    Google Scholar 

  4. Guo, J., Peyrin, T., Poschmann, A., Robshaw, M.: The LED block cipher. In: Preneel, B., Takagi, T. (eds.) CHES 2011. LNCS, vol. 6917, pp. 326–341. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-23951-9_22

    Chapter  Google Scholar 

  5. Suzaki, T., Minematsu, K., Morioka, S., Kobayashi, E.: TWINE: a lightweight block cipher for multiple platforms. In: Knudsen, L.R., Wu, H. (eds.) SAC 2012. LNCS, vol. 7707, pp. 339–354. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-35999-6_22

    Chapter  Google Scholar 

  6. Shirai, T., Shibutani, K., Akishita, T., Moriai, S., Iwata, T.: The 128-bit blockcipher clefia (extended abstract). In: Biryukov, A. (ed.) FSE 2007. LNCS, vol. 4593, pp. 181–195. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-74619-5_12

    Chapter  Google Scholar 

  7. Banik, S., Bogdanov, A., Isobe, T., Shibutani, K., Hiwatari, H., Akishita, T., Regazzoni, F.: Midori: a block cipher for low energy. In: Iwata, T., Cheon, J.H. (eds.) ASIACRYPT 2015. LNCS, vol. 9453, pp. 411–436. Springer, Heidelberg (2015). https://doi.org/10.1007/978-3-662-48800-3_17

    Chapter  Google Scholar 

  8. Baysal, A., Şahin, S.: RoadRunneR: a small and fast bitslice block cipher for low cost 8-bit processors. In: Güneysu, T., Leander, G., Moradi, A. (eds.) LightSec 2015. LNCS, vol. 9542, pp. 58–76. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-29078-2_4

    Chapter  MATH  Google Scholar 

  9. Yang, G., Zhu, B., Suder, V., Aagaard, Mark D., Gong, G.: The Simeck family of lightweight block ciphers. In: Güneysu, T., Handschuh, H. (eds.) CHES 2015. LNCS, vol. 9293, pp. 307–329. Springer, Heidelberg (2015). https://doi.org/10.1007/978-3-662-48324-4_16

    Chapter  Google Scholar 

  10. Kölbl, S., Roy, A.: A brief comparison of simon and simeck. IACR Cryptology ePrint Archive (2015)

    Google Scholar 

  11. Claude, G.: Initiation aux Methodes Statistiques en Sciences Sociales. Chapitre6 (1998). available at http://grasland.script.univ-paris-diderot.fr/STAT98/stat98_6/stat98_6.htm. Accessed 01 July 2016

  12. Stéphane, J.: Protection cryptographique des bases de données: conception et cryptanalyse. PhD. Dissertation, Université Pierre et Marie Curie - Paris VI, (2012)

    Google Scholar 

  13. Soleymani, A., Nordin, M.J., Sundararajan, E.A.: Chaotic cryptosystem for image based on Henon and arnold cat map. Sci. World J. 2014, 21 (2014)

    Google Scholar 

  14. Rijmen, V.: Efficient Implementation of the Rijndael S-box. J. Katholieke Universiteit Leuven (2000)

    Google Scholar 

  15. Skórski, M.: Shannon entropy versus renyi entropy from a cryptographic viewpoint. In: Groth, J. (ed.) IMACC 2015. LNCS, vol. 9496, pp. 257–274. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-27239-9_16

    Chapter  Google Scholar 

  16. Ahmad, M., Alsharari, H.D., Nizam, M.: Security improvement of an image encryption based on mPixel-chaotic-shuffle and pixel-chaotic-diffusion. Eur. J. Sci. Res. (2013)

    Google Scholar 

  17. Behnia, S., Akhshani, A., Ahadpour, S., Mahmodi, H., Akhavan, A.: A fast chaotic encryptions cheme based on piece wise nonlinear chaotic maps. Phys. Lett. A 366, 391–396 (2007)

    Article  Google Scholar 

  18. Jean, D.D.N.: Evaluation d’un algorithme de cryptage chaotique des images basé sur le modèle du perceptron, Report, Université de Ngoundéré (2012)

    Google Scholar 

  19. Wu, Y., Noonan, J.P., Agaian, S.: NPCR and UACI Randomness Tests for Image Encryption. J. Sel. Areas Telecommun. (JSAT) 1, 31–38 (2011)

    Google Scholar 

  20. Manifavas, C., Hatzivasilis, G., Fysarakis, K., Rantos, K.: Lightweight cryptography for embedded systems – a comparative analysis. In: Garcia-Alfaro, J., Lioudakis, G., Cuppens-Boulahia, N., Foley, S., Fitzgerald, William M. (eds.) DPM/SETOP-2013. LNCS, vol. 8247, pp. 333–349. Springer, Heidelberg (2014). https://doi.org/10.1007/978-3-642-54568-9_21

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Layth Sliman .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Omrani, T., Sliman, L. (2019). A New Lightweight Encryption Approach for Correlated Content Exchange in Internet of Things. In: Doss, R., Piramuthu, S., Zhou, W. (eds) Future Network Systems and Security. FNSS 2019. Communications in Computer and Information Science, vol 1113. Springer, Cham. https://doi.org/10.1007/978-3-030-34353-8_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-34353-8_12

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-34352-1

  • Online ISBN: 978-3-030-34353-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics