LICCA: a lightweight image cipher using 3-D cellular automata

The rapid rise of Internet of Technology (IoT) applications in the twenty-first century is characterized by the frequent transmission of sensitive multimedia data. Such transmissions are vulnerable to security threats, putting the data at risk. Handling security aspects becomes especially important when dealing with sensitive data exchanges. It should be emphasized, however, that sensor devices are resource constrained, limiting the use of standard ciphers at the device level. Because CA are easy to implement in hardware, give a huge key space, and can generate extremely random sequences computationally faster, they can be utilized to create lightweight ciphers for data confidentiality. In this paper, a color image cipher based on 3-D von Neumann CA is proposed for IoT applications. It has succeeded in achieving significantly faster execution speeds, lower energy consumption, and a bigger key space than previous methods. The cipher images also exhibit a consistently distributed histogram and correlation coefficient map, high information entropy values, and passed the NIST and DIEHARD randomness tests. Furthermore, the LICCA’s efficacy against cyber-attacks has been demonstrated by numerous standard cryptanalysis attacks and other critical studies. Its suitability for IoT applications has been verified by experimental results.

[1]  Parikshit N. Mahalle,et al.  Lightweight Key Management for Adaptive Addressing in Next Generation Internet , 2017, Int. J. Ambient Comput. Intell..

[2]  Rasul Enayatifar,et al.  Index-based permutation-diffusion in multiple-image encryption using DNA sequence , 2019, Optics and Lasers in Engineering.

[3]  Abhijit Mitra,et al.  A chaos based partial image encryption scheme , 2014, 2014 2nd International Conference on Business and Information Management (ICBIM).

[4]  Li-Hua Gong,et al.  Multi-image compression-encryption scheme based on quaternion discrete fractional Hartley transform and improved pixel adaptive diffusion , 2020, Signal Process..

[5]  C. Sanchez-Avila,et al.  The Rijndael block cipher (AES proposal) : a comparison with DES , 2001, Proceedings IEEE 35th Annual 2001 International Carnahan Conference on Security Technology (Cat. No.01CH37186).

[6]  Abdelsalam Helal,et al.  Scalable Cloud–Sensor Architecture for the Internet of Things , 2016, IEEE Internet of Things Journal.

[7]  Lihua Gong,et al.  Quantum image encryption based on generalized Arnold transform and double random-phase encoding , 2015, Quantum Information Processing.

[8]  Khaled Salah,et al.  IoT security: Review, blockchain solutions, and open challenges , 2017, Future Gener. Comput. Syst..

[9]  Yiran Chen,et al.  Color image compression and encryption scheme based on compressive sensing and double random encryption strategy , 2020, Signal Process..

[10]  Congxu Zhu,et al.  A novel image encryption scheme based on improved hyperchaotic sequences , 2012 .

[11]  Xiao Liu,et al.  A novel chaos-based bit-level permutation scheme for digital image encryption , 2011 .

[12]  Jyotirmoy Karjee,et al.  A Lightweight Cellular Automata Based Encryption Technique for IoT Applications , 2019, IEEE Access.

[13]  E. Makri,et al.  Privacy-Friendly Wi-Fi-Based Occupancy Estimation with Minimal Resources , 2018, Int. J. Ambient Comput. Intell..

[14]  Jian Wang,et al.  Quantum Image Encryption Algorithm Based on Quantum Key Image , 2019 .

[15]  Li-Hua Gong,et al.  Novel quantum image compression and encryption algorithm based on DQWT and 3D hyper-chaotic Henon map , 2020, Quantum Information Processing.

[16]  Nasir Ghani,et al.  Demystifying IoT Security: An Exhaustive Survey on IoT Vulnerabilities and a First Empirical Look on Internet-Scale IoT Exploitations , 2019, IEEE Communications Surveys & Tutorials.

[17]  Ramdane Maamri,et al.  Securing Ambient Agents Groups by Using Verification, Judgment and Surveillance , 2013, Int. J. Ambient Comput. Intell..

[18]  R. Parvaz,et al.  2D Hybrid chaos map for image security transform based on framelet and cellular automata , 2018, Inf. Sci..

[19]  Fawad Ahmed,et al.  Image Encryption Using Dynamic S-Box Substitution in the Wavelet Domain , 2020, Wireless Personal Communications.

[20]  Bhaskar Mondal,et al.  A secure image encryption scheme based on cellular automata and chaotic skew tent map , 2019, J. Inf. Secur. Appl..

[21]  Henk C. A. van Tilborg,et al.  Encyclopedia of Cryptography and Security, 2nd Ed , 2005 .

[22]  Mohammad Hossein Moattar,et al.  Color image encryption based on hybrid hyper-chaotic system and cellular automata , 2017 .

[23]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[24]  Dong-Yun Bai,et al.  Passive-state preparation in continuous-variable measurement-device-independent quantum key distribution , 2019, Quantum Information Processing.

[25]  He Lei,et al.  Novel quantum image encryption using one-dimensional quantum cellular automata , 2016, Inf. Sci..

[26]  Hegui Zhu,et al.  2D Logistic-Modulated-Sine-Coupling-Logistic Chaotic Map for Image Encryption , 2019, IEEE Access.

[27]  Shahzad A. Malik,et al.  Fog/Edge Computing-Based IoT (FECIoT): Architecture, Applications, and Research Issues , 2019, IEEE Internet of Things Journal.

[28]  A. V. Deshpande,et al.  Trust Management Model based on Fuzzy Approach for Ubiquitous Computing , 2016, Int. J. Ambient Comput. Intell..

[29]  Chin-Feng Lai,et al.  A DNA Computation-Based Image Encryption Scheme for Cloud CCTV Systems , 2019, IEEE Access.

[30]  David B. Fogel,et al.  An introduction to simulated evolutionary optimization , 1994, IEEE Trans. Neural Networks.

[31]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[32]  S. Wolfram,et al.  Two-dimensional cellular automata , 1985 .

[33]  Antonio Puliafito,et al.  Blockchain and IoT Integration: A Systematic Survey , 2018, Sensors.

[34]  Rasul Enayatifar,et al.  A new permutation-diffusion-based image encryption technique using cellular automata and DNA sequence , 2020 .

[35]  Arafat J. Al-Dweik,et al.  Chaotic Encryption Algorithm With Key Controlled Neural Networks for Intelligent Transportation Systems , 2019, IEEE Access.

[36]  Lijun Wu,et al.  A three-dimensional bit-level image encryption algorithm with Rubik's cube method , 2021, Math. Comput. Simul..

[37]  Yicong Zhou,et al.  Sine Chaotification Model for Enhancing Chaos and Its Hardware Implementation , 2019, IEEE Transactions on Industrial Electronics.

[38]  Rupali Syal,et al.  Microvascular Complications in Type-2 Diabetes: A Review of Statistical Techniques and Machine Learning Models , 2020, Wireless Personal Communications.

[39]  Chang'e Dong,et al.  Color image encryption using one-time keys and coupled chaotic systems , 2014, Signal Process. Image Commun..

[40]  Satyabrata Das,et al.  A Secure and Efficient Color Image Encryption Scheme based on Two Chaotic Systems and Advanced Encryption Standard , 2018, 2018 International Conference on Advances in Computing, Communications and Informatics (ICACCI).

[41]  Syam Sankar,et al.  Colour image encryption algorithm combining, Arnold map, DNA sequence operation, and a Mandelbrot set , 2020, J. Inf. Secur. Appl..

[42]  X. Tong,et al.  A new algorithm of the combination of image compression and encryption technology based on cross chaotic map , 2013 .

[43]  Zhiliang Zhu,et al.  An image encryption algorithm based on compound homogeneous hyper-chaotic system , 2017, Nonlinear Dynamics.

[44]  Jorge Sá Silva,et al.  Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues , 2015, IEEE Communications Surveys & Tutorials.

[45]  Nilanjan Dey,et al.  Symmetric Key Encryption Technique: A Cellular Automata Based Approach , 2018 .

[46]  S. Wolfram Statistical mechanics of cellular automata , 1983 .

[47]  Satyabrata Roy,et al.  IECA: an efficient IoT friendly image encryption technique using programmable cellular automata , 2020, J. Ambient Intell. Humaniz. Comput..

[48]  Sung Wook Baik,et al.  Secure Surveillance Framework for IoT Systems Using Probabilistic Image Encryption , 2018, IEEE Transactions on Industrial Informatics.

[49]  John von Neumann,et al.  Theory Of Self Reproducing Automata , 1967 .

[50]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[51]  Xinyu Yang,et al.  A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications , 2017, IEEE Internet of Things Journal.

[52]  Abdul Hanan Abdullah,et al.  A novel chaotic based image encryption using a hybrid model of deoxyribonucleic acid and cellular automata , 2015 .

[53]  Zhiliang Zhu,et al.  A fast image encryption scheme with a novel pixel swapping-based confusion approach , 2014, Nonlinear Dynamics.

[54]  Parimal Pal Chaudhuri,et al.  Theory and Applications of Cellular Automata in Cryptography , 1994, IEEE Trans. Computers.

[55]  Vipin Jain,et al.  A novel symmetric key encryption technique using Cellular Automata , 2015, 2015 International Conference on Green Computing and Internet of Things (ICGCIoT).

[56]  Satyabrata Roy,et al.  IESCA: An efficient image encryption scheme using 2-D cellular automata , 2021, J. Inf. Secur. Appl..

[57]  Yiran Chen,et al.  An image encryption algorithm based on chaotic system and compressive sensing , 2018, Signal Process..

[58]  Jun Jin,et al.  An image encryption based on elementary cellular automata , 2012 .

[59]  Pi Li,et al.  A new color image encryption scheme based on 2DNLCML system and genetic operations , 2020, Optics and Lasers in Engineering.

[60]  M. Yaghoobi,et al.  A new image encryption method: parallel sub-image encryption with hyper chaos , 2011, Nonlinear Dynamics.

[61]  Feng Xu,et al.  Image encryption based on non-affine and balanced cellular automata , 2014, Signal Process..

[62]  Tariq Shah,et al.  Algebra-chaos amalgam and DNA transform based multiple digital image encryption , 2020, J. Inf. Secur. Appl..

[63]  Longfei Wu,et al.  A Survey on Security and Privacy Issues in Internet-of-Things , 2017, IEEE Internet of Things Journal.

[64]  Xing-yuan Wang,et al.  Lossless chaotic color image cryptosystem based on DNA encryption and entropy , 2017, Nonlinear Dynamics.

[65]  Xingyuan Wang,et al.  A novel image encryption algorithm using chaos and reversible cellular automata , 2013, Commun. Nonlinear Sci. Numer. Simul..

[66]  Pabitra Pal Choudhury,et al.  Characterisation of a particular hybrid transformation of two-dimensional cellular automata , 1999 .

[67]  Subhasish Mitra,et al.  VLSI architecture of a cellular automata machine , 1997 .

[68]  Arun Kumar Sangaiah,et al.  SMSH: Secure Surveillance Mechanism on Smart Healthcare IoT System With Probabilistic Image Encryption , 2020, IEEE Access.

[69]  Satyabrata Roy,et al.  IEVCA: An efficient image encryption technique for IoT applications using 2-D Von-Neumann cellular automata , 2020, Multimedia Tools and Applications.

[70]  Howard C. Card,et al.  Group Properties of Cellular Automata and VLSI Applications , 1986, IEEE Transactions on Computers.

[71]  Huishan Wu,et al.  An Asymmetric Image Encryption Algorithm Based on a Fractional-Order Chaotic System and the RSA Public-Key Cryptosystem , 2020, Int. J. Bifurc. Chaos.