New directly revocable attribute-based encryption scheme and its application in cloud storage environment. Towards secure and flexible EHR sharing in mobile health cloud under static assumptions. Social influence modeling using information theory in mobile social networks. Dynamic trust relationships aware data privacy protection in mobile crowd-sensing. Enhancing privacy and availability for data clustering in intelligent electrical service of IoT. Xiong J, Ren J, Chen L, Yao Z, Lin M, Wu D, Niu B. Secure data uploading scheme for a smart home system. Shen, J., Wang, C., Li, T., Chen, X., Huang, X., & Zhan, Z. An efficient trust negotiation strategy towards the resource-limited mobile commerce environment. Understanding Security Requirements and Challenges in Internet of Things (IoT): A Review. The security issues of the Internet of Things. Neural Computing and Applications, 32, 10979–10993. Hybrid optimization with cryptography encryption for medical image security in Internet of Things. Įlhoseny, M., Shankar, K., Lakshmanaprabu, S. Secure medical data transmission model for IoT-based healthcare systems. The extensive experiments of performance and security assessment show that the proposed cryptographic image scheme is secure enough to withstand all potential cryptanalytic attacks.Įlhoseny, M., Ramírez-González, G., Abu-Elnasr, O. The strength of the proposed image cryptographic scheme is assessed against resistance to the differential attack (UACI and NPCR), statistical attack (histogram analysis, correlation coefficient and information entropy) and sensitivity to the secret key. Here in this work, for each image encryption, a new intelligent session key is generated. Also, a crossover operator is used in encryption rounds for increasing confusion and diffusion. Here logistic-tent map and crossover are used to generate the random session key for each image encryption. So 1-D chaotic map along with a crossover operator is used in this work. Various 1-D chaotic maps are discussed in the literature review, but in some cases, hybrid 1-D chaotic maps have higher performance than simple 1-D chaotic maps. This work proposed a lightweight image encryption algorithm based on a logistic-tent map and crossover operator of a genetic algorithm. The privacy and security become a major issue in front of various researchers working in this field. Due to the increasing demand for IoMT applications in numerous fields such as healthcare, smart city, smart grids, industrial internet, etc.
0 Comments
Leave a Reply. |