We are witnessing the era of Internet of Things (IoT), where its applications such as smart cities and smart homes catch sensitive data gathered mostly by IoT surveillance cameras among other sensors or devices. Therefore, security and privacy protection is a key concern during transmitting such sensitive data across the IoT network to be processed and stored on Cloud. In this paper, we proposed a lightweight encryption model that complies with the limited resources of IoT devices in terms of process and memory. Also, the encryption model also provides a high level of security for the transmitted data through a constant change of the key used for encrypting of transmitted IoT data. In addition, the key size used to encrypt transmitted data in the proposed model is large enough which makes it hard to break by the attackers. The experimental results show outstanding results with an average of 150.5 ms of encryption time for a key size 80 bits where the key size is relatively large and with an average PSNR of 7.13 compared to other algorithms.
Published in | Advances (Volume 5, Issue 3) |
DOI | 10.11648/j.advances.20240503.13 |
Page(s) | 84-92 |
Creative Commons |
This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited. |
Copyright |
Copyright © The Author(s), 2024. Published by Science Publishing Group |
Image Cryptography, IOT, Privacy and Security Preservation, Devices
[1] | Mehmood, M. Sajjad, W. Ejaz, and S. W. Baik, Saliency-directed prioritization of visual data in wireless surveillance networks, Information Fusion, vol. 24, pp. 16–30, 2015. |
[2] | T. Yu, V. Sekar, S. Seshan, Y. Agarwal, and C. Xu, Handling a trillion (unfixable) flaws on a billion devices: Rethinking network security for the internet-of-things, in Proceedings of the 14th ACM Workshop on Hot Topics in Networks, 2015, pp. 1–7. |
[3] | M.-H. Maras, Internet of Things: security and privacy implications, International Data Privacy Law, vol. 5, no. 2, p. 99, 2015. |
[4] | F. Al-Turjman, H. Zahmatkesh, and R. Shahroze, An overview of security and privacy in smart cities’ IoT communications, Transactions on Emerging Telecommunications Technologies, no. June, pp. 1–19, 2019, |
[5] | K. Zhang, J. Ni, K. Yang, X. Liang, J. Ren, and X. S. Shen, Security and privacy in smart city applications: Challenges and solutions, IEEE Communications Magazine, vol. 55, no. 1, pp. 122–129, 2017. |
[6] | Y. He, F. R. Yu, N. Zhao, V. C. M. Leung, and H. Yin, Software-defined networks with mobile edge computing and caching for smart cities: A big data deep reinforcement learning approach, IEEE Communications Magazine vol.55, no. 12, pp. 31-37, 2017 |
[7] | Z. Maamar, T. Baker, M. Sellami, M. Asim, E. Uglianin, and N. Faci, Cloud Vs edge: who serves the Internet of Things better?, Internet Technology Letters, vol. 1, no. 5, p. e66, 2018. |
[8] | R. Mahmud, R. Kotagiri, and R. Buyya, Fog computing: A taxonomy, survey and future directions, in Internet of everything, Supringer, 2018, pp. 103-130. |
[9] | B. Al-Shargabi, S. Al-Jawarneh, and S. M. A. Hayajneh, A cloudlet based security and trust model for e-government web services, Journal of Theoretical and Applied Information Technology, vol. 98, no. 1, pp. 27–37, 2020. |
[10] | N. Li, D. Liu, and S. Nepal, Lightweight mutual authentication for IoT and its applications, IEEE Transactions on Sustainable Computing, vol. 2, no. 4, pp. 359–370, 2017. |
[11] | B. Al-Shargabi and O. Sabri, A study of Adopting Cloud Computing from Enterprise Perspective using Delone and Mclean IS Success Model, International Journal of Computer Science and Information Security, vol. 14, p. 32, 2016. |
[12] | D. Chialva and A. Dooms, Conditionals in homomorphic encryption and machine learning applications, arXiv preprint arXiv: 1810.12380, 2018. |
[13] | H. Abualese, T. Al-Rousan, and B. Al-Shargabi, A New Trust Framework for E-Government in Cloud of Things, International Journal of Electronics and Telecommunications, vol. 65, no. 3, pp. 397–405, 2019, |
[14] | [S. R. Masadeh, H. A. Al-Sewadi, and M. A. F. Al-Husainy, Embedded key cryptosystem for cloud computing applications, in Proceedings of the 2nd International Conference on Future Networks and Distributed Systems, 2018, pp. 1–7. |
[15] | X. Zhang, S. H. Seo, and C. Wang, A Lightweight Encryption Method for Privacy Protection in Surveillance Videos, IEEE Access, vol. 6, pp. 18074–18087, 2018, |
[16] | C. Wampler, S. Uluagac, and R. Beyah, Information leakage in encrypted ip video traffic, in 2015 IEEE Global Communications Conference (GLOBECOM), 2015, pp. 1–7. |
[17] | N. Mekki, M. Hamdi, T. Aguili, and T. H. Kim, A real-time chaotic encryption for multimedia data and application to secure surveillance framework for IoT system, Proceedings - 2018 International Conference on Advanced Communication Technologies and Networking, CommNet 2018, pp. 1–10, 2018, |
[18] | A. Adeel, J. Ahmad, and A. Hussain, Real-Time Lightweight Chaotic Encryption for 5G IoT Enabled Lip-Reading Driven Secure Hearing-Aid, pp. 1–14, 2018. |
[19] | S. Aljawarneh, M. B. Yassein, and W. A. Talafha, A resource-efficient encryption algorithm for multimedia big data, Multimedia Tools and Applications, vol. 76, no. 21, pp. 22703–22724, 2017, |
[20] | V. A. Memos, K. E. Psannis, Y. Ishibashi, B.-G. Kim, and B. B. Gupta, An efficient algorithm for media-based surveillance system (EAMSuS) in IoT smart city framework, Future Generation Computer Systems, vol. 83, pp. 619–628, 2018. |
[21] | R. A. Shaikh, H. Jameel, B. J. d’Auriol, H. Lee, S. Lee, and Y.-J. Song, Achieving network level privacy in wireless sensor networks, Sensors, vol. 10, no. 3, pp. 1447–1472, 2010. |
[22] | D. Christin, A. Reinhardt, P. S. Mogre, and R. Steinmetz, Wireless sensor networks and the internet of things: selected challenges, Proceedings of the 8th GI/ITG KuVS Fachgespräch Drahtlose sensornetze, pp. 31–34, 2009. |
[23] | C. Wang, J. Shen, Q. Liu, Y. Ren, and T. Li, A Novel Security Scheme Based on Instant Encrypted Transmission for Internet of Things, Security and Communication Networks, vol. 2018, 2018, |
[24] | K. Muhammad, R. Hamza, J. Ahmad, J. Lloret, H. Wang, and S. W. Baik, Secure surveillance framework for Mohammed Abbas Fadhil Al-Husainy et al., International Journal of Advanced Trends in Computer Science and Engineering, 9 (2), March - April 2020, 1840 – 1847 1847 IoT systems using probabilistic image encryption, IEEE Transactions on Industrial Informatics, vol. 14, no. 8, pp. 3679–3689, 2018, |
[25] | S. Ullah, L. Marcenaro, and B. Rinner, Secure smart cameras by aggregate-signcryption with decryption fairness for multi-receiver IoT applications, Sensors (Switzerland), vol. 19, no. 2, 2019, |
[26] | L. Pang, M. Kou, M. Wei, and H. Li, Anonymous Certificateless Multi-Receiver Signcryption Scheme Without Secure Channel, IEEE Access, vol. 7, pp. 84091–84106, 2019, |
[27] | M. A. F. Al-Husainy and H. A. A. Al-Sewadi, Implementing Binary Search Tree Concept for Image Cryptography, International Journal of Advanced Science and Technology, Vol. 130, pp. 21- 32, 2019. |
APA Style
Naz, I., Illahi, R., Shahzadi, N., Ahmad, H. G. U. (2024). Lightweight Encryption Model for IOT Security and Privacy Protection. Advances, 5(3), 84-92. https://doi.org/10.11648/j.advances.20240503.13
ACS Style
Naz, I.; Illahi, R.; Shahzadi, N.; Ahmad, H. G. U. Lightweight Encryption Model for IOT Security and Privacy Protection. Advances. 2024, 5(3), 84-92. doi: 10.11648/j.advances.20240503.13
@article{10.11648/j.advances.20240503.13, author = {Iqra Naz and Rehmat Illahi and Neelam Shahzadi and Hafiz Gulfam Umer Ahmad}, title = {Lightweight Encryption Model for IOT Security and Privacy Protection }, journal = {Advances}, volume = {5}, number = {3}, pages = {84-92}, doi = {10.11648/j.advances.20240503.13}, url = {https://doi.org/10.11648/j.advances.20240503.13}, eprint = {https://article.sciencepublishinggroup.com/pdf/10.11648.j.advances.20240503.13}, abstract = {We are witnessing the era of Internet of Things (IoT), where its applications such as smart cities and smart homes catch sensitive data gathered mostly by IoT surveillance cameras among other sensors or devices. Therefore, security and privacy protection is a key concern during transmitting such sensitive data across the IoT network to be processed and stored on Cloud. In this paper, we proposed a lightweight encryption model that complies with the limited resources of IoT devices in terms of process and memory. Also, the encryption model also provides a high level of security for the transmitted data through a constant change of the key used for encrypting of transmitted IoT data. In addition, the key size used to encrypt transmitted data in the proposed model is large enough which makes it hard to break by the attackers. The experimental results show outstanding results with an average of 150.5 ms of encryption time for a key size 80 bits where the key size is relatively large and with an average PSNR of 7.13 compared to other algorithms. }, year = {2024} }
TY - JOUR T1 - Lightweight Encryption Model for IOT Security and Privacy Protection AU - Iqra Naz AU - Rehmat Illahi AU - Neelam Shahzadi AU - Hafiz Gulfam Umer Ahmad Y1 - 2024/09/29 PY - 2024 N1 - https://doi.org/10.11648/j.advances.20240503.13 DO - 10.11648/j.advances.20240503.13 T2 - Advances JF - Advances JO - Advances SP - 84 EP - 92 PB - Science Publishing Group SN - 2994-7200 UR - https://doi.org/10.11648/j.advances.20240503.13 AB - We are witnessing the era of Internet of Things (IoT), where its applications such as smart cities and smart homes catch sensitive data gathered mostly by IoT surveillance cameras among other sensors or devices. Therefore, security and privacy protection is a key concern during transmitting such sensitive data across the IoT network to be processed and stored on Cloud. In this paper, we proposed a lightweight encryption model that complies with the limited resources of IoT devices in terms of process and memory. Also, the encryption model also provides a high level of security for the transmitted data through a constant change of the key used for encrypting of transmitted IoT data. In addition, the key size used to encrypt transmitted data in the proposed model is large enough which makes it hard to break by the attackers. The experimental results show outstanding results with an average of 150.5 ms of encryption time for a key size 80 bits where the key size is relatively large and with an average PSNR of 7.13 compared to other algorithms. VL - 5 IS - 3 ER -