Blockchain Enabled Optimal Lightweight Cryptography Based Image Encryption Technique for IIoT

نویسندگان

چکیده

Industrial Internet of Things (IIoT) and Industry 4.0/5.0 offer several interconnections between machinery, equipment, processes, personnel in diverse application areas namely logistics, supply chain, manufacturing, transportation, healthcare. The conventional security-based solutions IIoT environment get degraded due to the third parties. Therefore, recent blockchain technology (BCT) can be employed resolve trust issues eliminate need for this paper presents a novel enabled secure optimal lightweight cryptography based image encryption (BC-LWCIE) technique industry 4.0 environment. In addition, BC-LWCIE involves design an LWC hash function with key generation using chicken swarm optimization (CSO) algorithm. Moreover, CSO algorithm derives fitness maximization peak signal noise ratio (PSNR). stores cryptographic pixel values encrypted BCT ensure secrecy order highlight enhanced security performance technique, series simulations were carried out results demonstrated betterment over techniques.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

APE: Authenticated Permutation-Based Encryption for Lightweight Cryptography

The domain of lightweight cryptography focuses on cryptographic algorithms for extremely constrained devices. It is very costly to avoid nonce reuse in such environments, because this requires either a hardware source of randomness, or non-volatile memory to store a counter. At the same time, a lot of cryptographic schemes actually require the nonce assumption for their security. In this paper,...

متن کامل

Permutation based Image Encryption Technique

Information security is the key in the era of electronic data exchange. Images constitute a large portion of the electronic data. Confidentiality of color images is a difficult process. Most of the image encryption algorithms are complex and compromise on the quality of the image. This paper proposes a new image encryption based on random pixel permutation with the motivation to maintain the qu...

متن کامل

Visual Cryptography Based on an Interferometric Encryption Technique

Sang-Su Lee et al. 373 This paper presents a new method for a visual cryptography scheme that uses phase masks and an interferometer. To encrypt a binary image, we divided it into an arbitrary number of slides and encrypted them using an XOR process with a random key or keys. The phase mask for each encrypted image was fabricated under the proposed phase-assignment rule. For decryption, phase m...

متن کامل

Survey: Image Encryption using Chaotic Cryptography Schemes

Chaotic Encryption Method seems to be much better than traditional encryption methods used today. Chaotic encryption is the new direction of cryptography. It makes use of chaotic system properties such as sensitive to initial condition and loss of information. Many chaos-based encryption methods have been presented and discussed in the last two decades. In order to reach higher performance, the...

متن کامل

Lightweight Encryption for Email

Email encryption techniques have been available for more than a decade, yet none has been widely deployed. The problems of key generation, certification, and distribution have not been pragmatically addressed. We recently proposed a method for implementing a Lightweight Public Key Infrastructure (PKI) for email authentication using recent developments in identitybased cryptography and today’s e...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Intelligent Automation and Soft Computing

سال: 2022

ISSN: ['2326-005X', '1079-8587']

DOI: https://doi.org/10.32604/iasc.2022.024902