Skip to main content
Log in

Lightweight encryption for privacy protection of data transmission in cyber physical systems

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

Cyber-physical system (CPS) devices like connected vehicles, consumer appliances, and many other smart devices are built with limited resources like processors and memory. These devices are used to transmit critical and sensitive data over the Internet, needing utmost privacy protection from any unauthorized access. In this paper, a lightweight secure encryption algorithm is proposed to protect the privacy of highly sensitive communication and imperturbable data transmission. The scheme is built using permutation, followed by a diffusion structure. The permutation uses pseudo-random sequences (PRNS) generated by a 3D Lorenz chaotic map, and the diffusion uses a key stream generated by a newly designed keystream generator (KSG) which uses only bit-shift and XOR operations. The simple and secure design makes the algorithm useful for CPS devices. The analysis of the test results shows that the proposed algorithm is secure enough and potentially capable of defying any known security attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

Data availability

Enquiries about data availability should be directed to the authors.

References

  1. Abdullah, A.: Advanced encryption standard (AES) algorithm to encrypt and decrypt data. Cryptogr. Netw. Secur. 16, 1–11 (2017)

    Google Scholar 

  2. Alassaf, N., Gutub, A., Parah, S.A., Al Ghamdi, M.: Enhancing speed of simon: a light-weight-cryptographic algorithm for IoT applications. Multimedia Tools Appl. 78(23), 32633–32657 (2019)

    Article  Google Scholar 

  3. Ali, T.S., Ali, R.: A new chaos based color image encryption algorithm using permutation substitution and Boolean operation. Multimedia Tools Appl. 79(27), 19853–19873 (2020)

    Article  Google Scholar 

  4. Amorado, R.V., Sison, A.M., Medina, R.P.: Enhanced data encryption standard (DES) algorithm based on filtering and striding techniques. In: Proceedings of the 2019 2nd international conference on information science and systems (pp. 252–256) (2019)

  5. Arpacı, B., Kurt, E., Çelik, K., Ciylan, B.: Colored image encryption and decryption with a new algorithm and a hyperchaotic electrical circuit. J. Electr. Eng. Technol. 15(3), 1413–1429 (2020)

    Article  Google Scholar 

  6. Aruna, S., Usha, G.: S-dac: a novel dynamic substitution boxes using hybrid chaotic system and deoxyribonuceic acid (DNA) coding for counterfeiting side-channel attacks. Pers. Ubiquitous Comput. (2021). https://doi.org/10.1007/s00779-021-01579-4

    Article  Google Scholar 

  7. Beaulieu, R., Shors, D., Smith, J., Treatman-Clark, S., Weeks, B., Wingers, L.: The simon and speck lightweight block ciphers. In Proceedings of the 52nd annual design automation conference, pp. 1–6 (2015)

  8. Hasanzadeh, E., Yaghoobi, M.: A novel color image encryption algorithm based on substitution box and hyper-chaotic system with fractal keys. Multimedia Tools Appl. 79(11), 7279–7297 (2020)

    Article  Google Scholar 

  9. Li, C., Zhao, F., Liu, C., Lei, L., Zhang, J.: A hyperchaotic color image encryption algorithm and security analysis. Secur. Commun. Netw. (2019). https://doi.org/10.1155/2019/8132547

    Article  Google Scholar 

  10. Liu, H., Wen, F., Kadir, A.: Construction of a new 2D Chebyshev-Sine map and its application to color image encryption. Multimedia Tools Appl. 78(12), 15997–16010 (2019)

    Article  Google Scholar 

  11. Mbarek, B., Jabeur, N., et al.: Ecass: an encryption compression aggregation security scheme for secure data transmission in ambient assisted living systems. Pers. Ubiquit. Comput. 23(5), 793–799 (2019)

    Article  Google Scholar 

  12. Moh’d, A., Aslam, N., Phillips, W., Robertson, W., Marzi, H.: Sn-sec: a secure wireless sensor platform with hardware cryptographic primitives. Pers. Ubiquit. Comput. 17(5), 1051–1059 (2013)

    Article  Google Scholar 

  13. Mondal, B.: Cryptographic image scrambling techniques. (2018)

  14. Mondal, B., Kumar, D., Mandal, T.: Security challenges in internet of things. Int. J. Softw. Web Sci. pp. 8–12 (2015)

  15. Mondal, B., Mandal, T.: A secure image encryption scheme based on genetic operations and a new hybrid pseudo random number generator. Multimedia Tools Appl. 79, 1–8 (2020)

    Article  Google Scholar 

  16. Mondal, B., Mandal, T., Khan, D.A., Choudhury, T.: A secure image encryption scheme using chaos and wavelet transformations. Recent Pat. Eng. 12(1), 5–14 (2018)

    Article  Google Scholar 

  17. Mondal, B., Mandal, T., Kumar, P., Biswas, N.: A secure partial encryption scheme based on bit plane manipulation. In 2017 7th International Symposium on Embedded Computing and System Design (ISED), pp. 1–5 (2017)

  18. Nandy, N., Banerjee, D., Pradhan, C.: Color image encryption using DNA based cryptography. Int. J. Inf. Technol. 13(2), 533–540 (2021)

    Google Scholar 

  19. Pammu, A.A., Chong, K.-S., Ho, W.-G., Gwee, B.-H.: Interceptive side channel attack on aes-128 wireless communications for IoT applications. In 2016 IEEE Asia Pacific Conference on Circuits and Systems (APCCAS), pp. 650–653. IEEE (2016)

  20. Pchelintsev, A.: Numerical and physical modeling of the dynamics of the Lorenz system. Numer. Anal. Appl. 7, 159–167 (2014)

    Article  Google Scholar 

  21. Rajesh, S., Paul, V., Menon, V.G., Khosravi, M.R.: A secure and efficient lightweight symmetric encryption scheme for transfer of text files between embedded IoT devices. Symmetry 11(2), 293 (2019)

    Article  Google Scholar 

  22. Sun, Y.-J., Zhang, H., Wang, X.-Y., Wang, M.-X.: Bit-level color image encryption algorithm based on coarse-grained logistic map and fractional chaos. Multimedia Tools Appl. 80(8), 12155–12173 (2021)

    Article  Google Scholar 

  23. Wang, X., Guo, K.: A new image alternate encryption algorithm based on chaotic map. Nonlinear Dyn. 76(4), 1943–1950 (2014)

    Article  MATH  Google Scholar 

  24. Zefreh, E.Z.: An image encryption scheme based on a hybrid model of DNA computing, chaotic systems and hash functions. Multimedia Tools Appl. 79(33), 24993–25022 (2020)

    Article  Google Scholar 

  25. Zhao, Y.: Data encryption system for 5G cloud storage and big data fitness energy metabolism detection. Pers. Ubiquit. Comput. 25, 1–12 (2021)

    Article  Google Scholar 

Download references

Funding

The authors have not disclosed any funding.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Bhaskar Mondal.

Ethics declarations

Competing interests

The authors have not disclosed any competing interests.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Tiwari, D., Mondal, B., Singh, S.K. et al. Lightweight encryption for privacy protection of data transmission in cyber physical systems. Cluster Comput 26, 2351–2365 (2023). https://doi.org/10.1007/s10586-022-03790-1

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10586-022-03790-1

Keywords

Navigation