Session Key based Image Cryptographic Algorithm using Logistic-Sine Map and Crossover Operator for IoT

260 DOI: 10.37398/JSR.2021.650133 Abstract: Due to the increasing demand for IoT applications in various fields such as healthcare, smart city, smart grids, industrial internet, etc. The privacy and security become a major issue in front of various researchers working in this field. This work proposed a novel image encryption algorithm based on a logisticsine map and crossover operator of a genetic algorithm. Various 1D chaotic maps are discussed in the literature review, but in some cases, hybrid 1-D chaotic maps have higher performance than simple 1-D chaotic maps. So 1-D chaotic map along with a crossover operator is used in this work. Here logistic-sine maps and crossover are used to generate the random session key for each image encryption. Also, a crossover operator is used in encryption rounds for increasing confusion and diffusion. Here in this work, for each image encryption, a new session session key is generated. The proposed algorithm is tested on various parameters for effective randomness. Experimental results show that the proposed algorithm performance is better than existing algorithms in terms of randomness and secure enough to resist all the existing cryptanalytic attacks.

[1]  Shaoen Wu,et al.  Dynamic Trust Relationships Aware Data Privacy Protection in Mobile Crowd-Sensing , 2018, IEEE Internet of Things Journal.

[2]  Jian Shen,et al.  Secure data uploading scheme for a smart home system , 2018, Inf. Sci..

[3]  Zhaoquan Cai,et al.  Towards secure and flexible EHR sharing in mobile health cloud under static assumptions , 2017, Cluster Computing.

[4]  Adnan Fatih Kocamaz,et al.  A chaotic optimization method based on logistic-sine map for numerical function optimization , 2020, Neural Computing and Applications.

[5]  Mohamed Elhoseny,et al.  Hybrid optimization with cryptography encryption for medical image security in Internet of Things , 2018, Neural Computing and Applications.

[6]  Dongqing Xie,et al.  Social influence modeling using information theory in mobile social networks , 2017, Inf. Sci..

[7]  Hao Wang,et al.  New directly revocable attribute-based encryption scheme and its application in cloud storage environment , 2016, Cluster Computing.

[8]  Sufian Hameed,et al.  Understanding Security Requirements and Challenges in Internet of Things (IoT): A Review , 2019, J. Comput. Networks Commun..

[9]  Dongqi Han,et al.  A multidimensional chaotic image encryption algorithm based on the region of interest , 2020, Multimedia Tools and Applications.

[10]  Satyabrata Roy,et al.  IECA: an efficient IoT friendly image encryption technique using programmable cellular automata , 2020, J. Ambient Intell. Humaniz. Comput..

[11]  Bhaskar Mondal,et al.  A secure image encryption scheme based on genetic operations and a new hybrid pseudo random number generator , 2020, Multimedia Tools and Applications.

[12]  Colin Tankard,et al.  The security issues of the Internet of Things , 2015 .

[13]  Guangyi Wang,et al.  A novel parallel image encryption algorithm based on hybrid chaotic maps with OpenCL implementation , 2020, Soft Comput..

[14]  Ahmed Farouk,et al.  Secure Medical Data Transmission Model for IoT-Based Healthcare Systems , 2018, IEEE Access.

[15]  Lei Chen,et al.  Enhancing Privacy and Availability for Data Clustering in Intelligent Electrical Service of IoT , 2019, IEEE Internet of Things Journal.

[16]  Jian-Ping Li,et al.  Medical Image Encryption Based on Hybrid Chaotic DNA Diffusion , 2019, Wireless Personal Communications.

[17]  Bing Zeng,et al.  An efficient trust negotiation strategy towards the resource-limited mobile commerce environment , 2015, Frontiers of Computer Science.