A Lightweight Image Encryption And Blowfish Decryption For The Secure Internet Of Things

As an innovative technology of the future, the Internet of Things (IoT) is expected to connect billions of users. Increased connectivity is expected to generate mountains of data and data protection can be a threat. Architectural tools, in principle, are smaller in size and low in strength. Due to their sophistication, traditional encryption algorithms are often computationally ineffective and require multiple rounds of coding, effectively wasting restricted device resources. But a less complex algorithm will jeopardize required honesty. In this article we propose a lightweight coding algorithm called Stable IoT (SIT). It is a 64-bit block encryption that requires a 64-bit key to encrypt data. Low complexity coding symmetry algorithm called Stable Power with Affine Shift. The coding component can be implemented using a simple syntax consisting of only basic mathematical operations (AND, OR, XOR, XNOR, SHIFTING, SWAPPING). This will help reduce the encoder, as the more complex key expansion method is only done in decryption. The purpose of this document is to conduct a security review and evaluate the performance of the proposed algorithm. The design of the algorithm is a combination of emotion and a unified switch-switch network. Simulation testing reveals that the algorithm provides adequate protection in only five rounds of encryption. The algorithm is hardware-implemented with a low-cost 8-bit microcontroller and the effects of code size, memory consumption, and encryption / decoding execution cycles are contrasted with reference encryption algorithms.

[1]  Clinton Aigbavboa,et al.  Assessment of Encryption and Decryption Schemes for Secure Data Transmission in Healthcare Systems , 2019, 2019 IEEE AFRICON.

[2]  Amandeep Kaur,et al.  A Random Selective Block Encryption Technique for Secure Image Cryptography Using Blowfish Algorithm , 2018, 2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT).

[3]  Reinhardt Euler,et al.  A flexible encryption technique for the internet of things environment , 2020, Ad Hoc Networks.

[4]  Alaa Hamid Mohammed,et al.  The Method Of Calibration Compensation For Fiber Nonlinearity- A Review , 2020, 2020 International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA).

[5]  Alaa Hamid Mohammed,et al.  A Review Software Defined Networking for Internet of Things , 2020, 2020 International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA).

[6]  Mustafa Maad Hamdi,et al.  An Optimum Design of Square Microstrip Patch Antenna Based on Fuzzy Logic Rules , 2020, 2020 International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA).

[7]  Oguz Bayat,et al.  Rayleigh Leistungs Relation and Rician Fading Channels in Qam Using Simulink Environment , 2020, 2020 International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA).

[8]  Alaa Hamid Mohammed,et al.  Hybrid Method Using EDMS & Gabor for Shape and Texture , 2020, 2020 International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA).

[9]  Alaa Hamid Mohammed,et al.  The Probe into Reflection Mobile Radio Propagation , 2020, 2020 International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA).

[10]  Manju Suresh,et al.  Hardware Implementation of Blowfish Algorithm for the Secure Data Transmission in Internet of Things , 2016 .

[11]  Sefer Kurnaz,et al.  Performance Evaluation of Three Mobile Ad-hoc Network Routing Protocols in Different Environments , 2020, 2020 International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA).

[12]  Syed Hassan Ahmed,et al.  Speeding Up the Internet of Things: LEAIoT: A Lightweight Encryption Algorithm Toward Low-Latency Communication for the Internet of Things , 2018, IEEE Consumer Electronics Magazine.

[13]  Yi Ding,et al.  DeepEDN: A Deep-Learning-Based Image Encryption and Decryption Network for Internet of Medical Things , 2020, IEEE Internet of Things Journal.

[14]  Saad A. Makki,et al.  Modified Blowfish Algorithm for Internet of Things Devices using new 4-Dimensional Chaotic System , 2019, 2019 International Conference on Intelligent Computing and Control Systems (ICCS).

[15]  Santosh Kumar Sharma,et al.  Integrated Cryptography for Internet of Things Using TBF Approach , 2019 .

[16]  Seyed Mahdi Jameii,et al.  Improving the security of internet of things using encryption algorithms , 2017, 2017 International Conference on IoT and Application (ICIOT).

[17]  Alaa Hamid Mohammed,et al.  Secure Pin Authentication in Java Smart Card Using Honey Encryption , 2020, 2020 International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA).

[18]  Osama A. Khashan,et al.  Edge-based lightweight selective encryption scheme for digital medical images , 2020, Multimedia Tools and Applications.