One round cipher algorithm for multimedia IoT devices

With the exponential growth in Internet-of-Things (IoT) devices, security and privacy issues have emerged as critical challenges that can potentially compromise their successful deployment in many data-sensitive applications. Hence, there is a pressing need to address these challenges, given that Io...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Multimedia tools and applications 2018-07, Vol.77 (14), p.18383-18413
Hauptverfasser: Noura, Hassan, Chehab, Ali, Sleem, Lama, Noura, Mohamad, Couturier, Raphaël, Mansour, Mohammad M.
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 18413
container_issue 14
container_start_page 18383
container_title Multimedia tools and applications
container_volume 77
creator Noura, Hassan
Chehab, Ali
Sleem, Lama
Noura, Mohamad
Couturier, Raphaël
Mansour, Mohammad M.
description With the exponential growth in Internet-of-Things (IoT) devices, security and privacy issues have emerged as critical challenges that can potentially compromise their successful deployment in many data-sensitive applications. Hence, there is a pressing need to address these challenges, given that IoT systems suffer from different limitations, and IoT devices are constrained in terms of energy and computational power, which renders them extremely vulnerable to attacks. Traditional cryptographic algorithms use a static structure that requires several rounds of computations, which leads to significant overhead in terms of execution time and computational resources. Moreover, the problem is compounded when dealing with multimedia contents, since the associated algorithms have stringent QoS requirements. In this paper, we propose a lightweight cipher algorithm based on a dynamic structure with a single round that consists of simple operations, and that targets multimedia IoT. In this algorithm, a dynamic key is generated and then used to build two robust substitution tables, a dynamic permutation table, and two pseudo-random matrices. This dynamic cipher structure minimizes the number of rounds to a single one, while maintaining a high level of randomness and security. Moreover, the proposed cipher scheme is flexible as the dimensions of the input matrix can be selected to match the devices’ memory capacity. Extensive security tests demonstrated the robustness of the cipher against various kinds of attacks. The speed, simplicity and high-security level, in addition to low error propagation, make of this approach a good encryption candidate for multimedia IoT devices.
doi_str_mv 10.1007/s11042-018-5660-y
format Article
fullrecord <record><control><sourceid>proquest_hal_p</sourceid><recordid>TN_cdi_hal_primary_oai_HAL_hal_02945135v1</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1993520113</sourcerecordid><originalsourceid>FETCH-LOGICAL-c393t-1ae5bdfebcad138811fdbfbaab6fcb172292f9a67f5389212457945904b7710f3</originalsourceid><addsrcrecordid>eNp1kEFLwzAUx4MoOKcfwFvBk4doXtI0zXEMdYPBLvMc0jbZOtpmJu2g396Minjx9B6P3__P44fQI5AXIES8BgCSUkwgxzzLCB6v0Ay4YFgICtdxZznBghO4RXchHAmBjNN0hvi2M4l3Q1clZX06GJ_oZu983R_axDqftEPT162pap2s3S6pzLkuTbhHN1Y3wTz8zDn6fH_bLVd4s_1YLxcbXDLJegza8KKypih1FR_IAWxV2ELrIrNlAYJSSa3UmbCc5ZICTbmQKZckLYQAYtkcPU-9B92ok69b7UfldK1Wi4263AiNPDB-hsg-TezJu6_BhF4d3eC7-J4CKRmnBIBFCiaq9C4Eb-xvLRB1MakmkyqaVBeTaowZOmVCZLu98X-a_w19A-vcdLQ</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1993520113</pqid></control><display><type>article</type><title>One round cipher algorithm for multimedia IoT devices</title><source>SpringerLink Journals - AutoHoldings</source><creator>Noura, Hassan ; Chehab, Ali ; Sleem, Lama ; Noura, Mohamad ; Couturier, Raphaël ; Mansour, Mohammad M.</creator><creatorcontrib>Noura, Hassan ; Chehab, Ali ; Sleem, Lama ; Noura, Mohamad ; Couturier, Raphaël ; Mansour, Mohammad M.</creatorcontrib><description>With the exponential growth in Internet-of-Things (IoT) devices, security and privacy issues have emerged as critical challenges that can potentially compromise their successful deployment in many data-sensitive applications. Hence, there is a pressing need to address these challenges, given that IoT systems suffer from different limitations, and IoT devices are constrained in terms of energy and computational power, which renders them extremely vulnerable to attacks. Traditional cryptographic algorithms use a static structure that requires several rounds of computations, which leads to significant overhead in terms of execution time and computational resources. Moreover, the problem is compounded when dealing with multimedia contents, since the associated algorithms have stringent QoS requirements. In this paper, we propose a lightweight cipher algorithm based on a dynamic structure with a single round that consists of simple operations, and that targets multimedia IoT. In this algorithm, a dynamic key is generated and then used to build two robust substitution tables, a dynamic permutation table, and two pseudo-random matrices. This dynamic cipher structure minimizes the number of rounds to a single one, while maintaining a high level of randomness and security. Moreover, the proposed cipher scheme is flexible as the dimensions of the input matrix can be selected to match the devices’ memory capacity. Extensive security tests demonstrated the robustness of the cipher against various kinds of attacks. The speed, simplicity and high-security level, in addition to low error propagation, make of this approach a good encryption candidate for multimedia IoT devices.</description><identifier>ISSN: 1380-7501</identifier><identifier>EISSN: 1573-7721</identifier><identifier>DOI: 10.1007/s11042-018-5660-y</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Algorithms ; Computation ; Computer Communication Networks ; Computer Science ; Cryptography ; Cryptography and Security ; Data Structures and Information Theory ; Distributed, Parallel, and Cluster Computing ; Emerging Technologies ; Encryption ; Internet of Things ; Levels ; Memory devices ; Modeling and Simulation ; Multiagent Systems ; Multimedia ; Multimedia Information Systems ; Permutations ; Security ; Software Engineering ; Special Purpose and Application-Based Systems ; Ubiquitous Computing</subject><ispartof>Multimedia tools and applications, 2018-07, Vol.77 (14), p.18383-18413</ispartof><rights>Springer Science+Business Media, LLC, part of Springer Nature 2018</rights><rights>Multimedia Tools and Applications is a copyright of Springer, (2018). All Rights Reserved.</rights><rights>Distributed under a Creative Commons Attribution 4.0 International License</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c393t-1ae5bdfebcad138811fdbfbaab6fcb172292f9a67f5389212457945904b7710f3</citedby><cites>FETCH-LOGICAL-c393t-1ae5bdfebcad138811fdbfbaab6fcb172292f9a67f5389212457945904b7710f3</cites><orcidid>0000-0003-1490-9592</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s11042-018-5660-y$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s11042-018-5660-y$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>230,314,780,784,885,27924,27925,41488,42557,51319</link.rule.ids><backlink>$$Uhttps://hal.science/hal-02945135$$DView record in HAL$$Hfree_for_read</backlink></links><search><creatorcontrib>Noura, Hassan</creatorcontrib><creatorcontrib>Chehab, Ali</creatorcontrib><creatorcontrib>Sleem, Lama</creatorcontrib><creatorcontrib>Noura, Mohamad</creatorcontrib><creatorcontrib>Couturier, Raphaël</creatorcontrib><creatorcontrib>Mansour, Mohammad M.</creatorcontrib><title>One round cipher algorithm for multimedia IoT devices</title><title>Multimedia tools and applications</title><addtitle>Multimed Tools Appl</addtitle><description>With the exponential growth in Internet-of-Things (IoT) devices, security and privacy issues have emerged as critical challenges that can potentially compromise their successful deployment in many data-sensitive applications. Hence, there is a pressing need to address these challenges, given that IoT systems suffer from different limitations, and IoT devices are constrained in terms of energy and computational power, which renders them extremely vulnerable to attacks. Traditional cryptographic algorithms use a static structure that requires several rounds of computations, which leads to significant overhead in terms of execution time and computational resources. Moreover, the problem is compounded when dealing with multimedia contents, since the associated algorithms have stringent QoS requirements. In this paper, we propose a lightweight cipher algorithm based on a dynamic structure with a single round that consists of simple operations, and that targets multimedia IoT. In this algorithm, a dynamic key is generated and then used to build two robust substitution tables, a dynamic permutation table, and two pseudo-random matrices. This dynamic cipher structure minimizes the number of rounds to a single one, while maintaining a high level of randomness and security. Moreover, the proposed cipher scheme is flexible as the dimensions of the input matrix can be selected to match the devices’ memory capacity. Extensive security tests demonstrated the robustness of the cipher against various kinds of attacks. The speed, simplicity and high-security level, in addition to low error propagation, make of this approach a good encryption candidate for multimedia IoT devices.</description><subject>Algorithms</subject><subject>Computation</subject><subject>Computer Communication Networks</subject><subject>Computer Science</subject><subject>Cryptography</subject><subject>Cryptography and Security</subject><subject>Data Structures and Information Theory</subject><subject>Distributed, Parallel, and Cluster Computing</subject><subject>Emerging Technologies</subject><subject>Encryption</subject><subject>Internet of Things</subject><subject>Levels</subject><subject>Memory devices</subject><subject>Modeling and Simulation</subject><subject>Multiagent Systems</subject><subject>Multimedia</subject><subject>Multimedia Information Systems</subject><subject>Permutations</subject><subject>Security</subject><subject>Software Engineering</subject><subject>Special Purpose and Application-Based Systems</subject><subject>Ubiquitous Computing</subject><issn>1380-7501</issn><issn>1573-7721</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2018</creationdate><recordtype>article</recordtype><sourceid>8G5</sourceid><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><sourceid>GUQSH</sourceid><sourceid>M2O</sourceid><recordid>eNp1kEFLwzAUx4MoOKcfwFvBk4doXtI0zXEMdYPBLvMc0jbZOtpmJu2g396Minjx9B6P3__P44fQI5AXIES8BgCSUkwgxzzLCB6v0Ay4YFgICtdxZznBghO4RXchHAmBjNN0hvi2M4l3Q1clZX06GJ_oZu983R_axDqftEPT162pap2s3S6pzLkuTbhHN1Y3wTz8zDn6fH_bLVd4s_1YLxcbXDLJegza8KKypih1FR_IAWxV2ELrIrNlAYJSSa3UmbCc5ZICTbmQKZckLYQAYtkcPU-9B92ok69b7UfldK1Wi4263AiNPDB-hsg-TezJu6_BhF4d3eC7-J4CKRmnBIBFCiaq9C4Eb-xvLRB1MakmkyqaVBeTaowZOmVCZLu98X-a_w19A-vcdLQ</recordid><startdate>20180701</startdate><enddate>20180701</enddate><creator>Noura, Hassan</creator><creator>Chehab, Ali</creator><creator>Sleem, Lama</creator><creator>Noura, Mohamad</creator><creator>Couturier, Raphaël</creator><creator>Mansour, Mohammad M.</creator><general>Springer US</general><general>Springer Nature B.V</general><general>Springer Verlag</general><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7SC</scope><scope>7WY</scope><scope>7WZ</scope><scope>7XB</scope><scope>87Z</scope><scope>8AL</scope><scope>8AO</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>8FL</scope><scope>8G5</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BEZIV</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>FRNLG</scope><scope>F~G</scope><scope>GNUQQ</scope><scope>GUQSH</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K60</scope><scope>K6~</scope><scope>K7-</scope><scope>L.-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0C</scope><scope>M0N</scope><scope>M2O</scope><scope>MBDVC</scope><scope>P5Z</scope><scope>P62</scope><scope>PQBIZ</scope><scope>PQBZA</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>Q9U</scope><scope>1XC</scope><scope>VOOES</scope><orcidid>https://orcid.org/0000-0003-1490-9592</orcidid></search><sort><creationdate>20180701</creationdate><title>One round cipher algorithm for multimedia IoT devices</title><author>Noura, Hassan ; Chehab, Ali ; Sleem, Lama ; Noura, Mohamad ; Couturier, Raphaël ; Mansour, Mohammad M.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c393t-1ae5bdfebcad138811fdbfbaab6fcb172292f9a67f5389212457945904b7710f3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2018</creationdate><topic>Algorithms</topic><topic>Computation</topic><topic>Computer Communication Networks</topic><topic>Computer Science</topic><topic>Cryptography</topic><topic>Cryptography and Security</topic><topic>Data Structures and Information Theory</topic><topic>Distributed, Parallel, and Cluster Computing</topic><topic>Emerging Technologies</topic><topic>Encryption</topic><topic>Internet of Things</topic><topic>Levels</topic><topic>Memory devices</topic><topic>Modeling and Simulation</topic><topic>Multiagent Systems</topic><topic>Multimedia</topic><topic>Multimedia Information Systems</topic><topic>Permutations</topic><topic>Security</topic><topic>Software Engineering</topic><topic>Special Purpose and Application-Based Systems</topic><topic>Ubiquitous Computing</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Noura, Hassan</creatorcontrib><creatorcontrib>Chehab, Ali</creatorcontrib><creatorcontrib>Sleem, Lama</creatorcontrib><creatorcontrib>Noura, Mohamad</creatorcontrib><creatorcontrib>Couturier, Raphaël</creatorcontrib><creatorcontrib>Mansour, Mohammad M.</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>Computer and Information Systems Abstracts</collection><collection>Access via ABI/INFORM (ProQuest)</collection><collection>ABI/INFORM Global (PDF only)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>ABI/INFORM Global (Alumni Edition)</collection><collection>Computing Database (Alumni Edition)</collection><collection>ProQuest Pharma Collection</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection (Alumni Edition)</collection><collection>Research Library (Alumni Edition)</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Business Premium Collection</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>Business Premium Collection (Alumni)</collection><collection>ABI/INFORM Global (Corporate)</collection><collection>ProQuest Central Student</collection><collection>Research Library Prep</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Business Collection (Alumni Edition)</collection><collection>ProQuest Business Collection</collection><collection>Computer Science Database</collection><collection>ABI/INFORM Professional Advanced</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ABI/INFORM Global</collection><collection>Computing Database</collection><collection>Research Library</collection><collection>Research Library (Corporate)</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest One Business</collection><collection>ProQuest One Business (Alumni)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest Central Basic</collection><collection>Hyper Article en Ligne (HAL)</collection><collection>Hyper Article en Ligne (HAL) (Open Access)</collection><jtitle>Multimedia tools and applications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Noura, Hassan</au><au>Chehab, Ali</au><au>Sleem, Lama</au><au>Noura, Mohamad</au><au>Couturier, Raphaël</au><au>Mansour, Mohammad M.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>One round cipher algorithm for multimedia IoT devices</atitle><jtitle>Multimedia tools and applications</jtitle><stitle>Multimed Tools Appl</stitle><date>2018-07-01</date><risdate>2018</risdate><volume>77</volume><issue>14</issue><spage>18383</spage><epage>18413</epage><pages>18383-18413</pages><issn>1380-7501</issn><eissn>1573-7721</eissn><abstract>With the exponential growth in Internet-of-Things (IoT) devices, security and privacy issues have emerged as critical challenges that can potentially compromise their successful deployment in many data-sensitive applications. Hence, there is a pressing need to address these challenges, given that IoT systems suffer from different limitations, and IoT devices are constrained in terms of energy and computational power, which renders them extremely vulnerable to attacks. Traditional cryptographic algorithms use a static structure that requires several rounds of computations, which leads to significant overhead in terms of execution time and computational resources. Moreover, the problem is compounded when dealing with multimedia contents, since the associated algorithms have stringent QoS requirements. In this paper, we propose a lightweight cipher algorithm based on a dynamic structure with a single round that consists of simple operations, and that targets multimedia IoT. In this algorithm, a dynamic key is generated and then used to build two robust substitution tables, a dynamic permutation table, and two pseudo-random matrices. This dynamic cipher structure minimizes the number of rounds to a single one, while maintaining a high level of randomness and security. Moreover, the proposed cipher scheme is flexible as the dimensions of the input matrix can be selected to match the devices’ memory capacity. Extensive security tests demonstrated the robustness of the cipher against various kinds of attacks. The speed, simplicity and high-security level, in addition to low error propagation, make of this approach a good encryption candidate for multimedia IoT devices.</abstract><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s11042-018-5660-y</doi><tpages>31</tpages><orcidid>https://orcid.org/0000-0003-1490-9592</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 1380-7501
ispartof Multimedia tools and applications, 2018-07, Vol.77 (14), p.18383-18413
issn 1380-7501
1573-7721
language eng
recordid cdi_hal_primary_oai_HAL_hal_02945135v1
source SpringerLink Journals - AutoHoldings
subjects Algorithms
Computation
Computer Communication Networks
Computer Science
Cryptography
Cryptography and Security
Data Structures and Information Theory
Distributed, Parallel, and Cluster Computing
Emerging Technologies
Encryption
Internet of Things
Levels
Memory devices
Modeling and Simulation
Multiagent Systems
Multimedia
Multimedia Information Systems
Permutations
Security
Software Engineering
Special Purpose and Application-Based Systems
Ubiquitous Computing
title One round cipher algorithm for multimedia IoT devices
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-26T14%3A38%3A45IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_hal_p&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=One%20round%20cipher%20algorithm%20for%20multimedia%20IoT%20devices&rft.jtitle=Multimedia%20tools%20and%20applications&rft.au=Noura,%20Hassan&rft.date=2018-07-01&rft.volume=77&rft.issue=14&rft.spage=18383&rft.epage=18413&rft.pages=18383-18413&rft.issn=1380-7501&rft.eissn=1573-7721&rft_id=info:doi/10.1007/s11042-018-5660-y&rft_dat=%3Cproquest_hal_p%3E1993520113%3C/proquest_hal_p%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1993520113&rft_id=info:pmid/&rfr_iscdi=true