Blockchain Enabled Optimal Lightweight Cryptography Based Image Encryption Technique for IIoT
نویسندگان
چکیده
Industrial Internet of Things (IIoT) and Industry 4.0/5.0 offer several interconnections between machinery, equipment, processes, personnel in diverse application areas namely logistics, supply chain, manufacturing, transportation, healthcare. The conventional security-based solutions IIoT environment get degraded due to the third parties. Therefore, recent blockchain technology (BCT) can be employed resolve trust issues eliminate need for this paper presents a novel enabled secure optimal lightweight cryptography based image encryption (BC-LWCIE) technique industry 4.0 environment. In addition, BC-LWCIE involves design an LWC hash function with key generation using chicken swarm optimization (CSO) algorithm. Moreover, CSO algorithm derives fitness maximization peak signal noise ratio (PSNR). stores cryptographic pixel values encrypted BCT ensure secrecy order highlight enhanced security performance technique, series simulations were carried out results demonstrated betterment over techniques.
منابع مشابه
APE: Authenticated Permutation-Based Encryption for Lightweight Cryptography
The domain of lightweight cryptography focuses on cryptographic algorithms for extremely constrained devices. It is very costly to avoid nonce reuse in such environments, because this requires either a hardware source of randomness, or non-volatile memory to store a counter. At the same time, a lot of cryptographic schemes actually require the nonce assumption for their security. In this paper,...
متن کاملPermutation based Image Encryption Technique
Information security is the key in the era of electronic data exchange. Images constitute a large portion of the electronic data. Confidentiality of color images is a difficult process. Most of the image encryption algorithms are complex and compromise on the quality of the image. This paper proposes a new image encryption based on random pixel permutation with the motivation to maintain the qu...
متن کاملVisual Cryptography Based on an Interferometric Encryption Technique
Sang-Su Lee et al. 373 This paper presents a new method for a visual cryptography scheme that uses phase masks and an interferometer. To encrypt a binary image, we divided it into an arbitrary number of slides and encrypted them using an XOR process with a random key or keys. The phase mask for each encrypted image was fabricated under the proposed phase-assignment rule. For decryption, phase m...
متن کاملSurvey: Image Encryption using Chaotic Cryptography Schemes
Chaotic Encryption Method seems to be much better than traditional encryption methods used today. Chaotic encryption is the new direction of cryptography. It makes use of chaotic system properties such as sensitive to initial condition and loss of information. Many chaos-based encryption methods have been presented and discussed in the last two decades. In order to reach higher performance, the...
متن کاملLightweight Encryption for Email
Email encryption techniques have been available for more than a decade, yet none has been widely deployed. The problems of key generation, certification, and distribution have not been pragmatically addressed. We recently proposed a method for implementing a Lightweight Public Key Infrastructure (PKI) for email authentication using recent developments in identitybased cryptography and today’s e...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Intelligent Automation and Soft Computing
سال: 2022
ISSN: ['2326-005X', '1079-8587']
DOI: https://doi.org/10.32604/iasc.2022.024902