A lightweight cryptographic algorithm for the transmission of images from road environments in self-driving

Runchen Gao1, Li Shen1, Yuqi Gao2, Rui Guo1
1School of Cyberspace Security, Xi'an University of Posts &Telecommunications, Xi'an, 710121, China
2School of Telecommunication and Information Engineering, Xi'an University of Posts & Telecommunications, Xi'an, 710121, China

Tóm tắt

AbstractWith the large-scale application of 5G in industrial production, the Internet of Things has become an important technology for various industries to achieve efficiency improvement and digital transformation with the help of the mobile edge computing. In the modern industry, the user often stores data collected by IoT devices in the cloud, but the data at the edge of the network involves a large of the sensitive information, which increases the risk of privacy leakage. In order to address these two challenges, we propose a security strategy in the edge computing. Our security strategy combines the Feistel architecture and short comparable encryption based on sliding window (SCESW). Compared to existing security strategies, our proposed security strategy guarantees its security while significantly reducing the computational overhead. And our GRC algorithm can be successfully deployed on a hardware platform.

Từ khóa


Tài liệu tham khảo

Chandramouli R, Bapatla S, Subbalakshmi K, Uma R (2006) Battery power-aware encryption. ACM Trans Inf Syst Security (TISSEC) 9(2):162–180. https://doi.org/10.1145/1151414.1151417

Eisenbarth T. et al. (2012) Compact Implementation and Performance Evaluation of Block Ciphers in ATtiny Devices. In: Mitrokotsa A., Vaudenay S. (eds) Progress in Cryptology - AFRICACRYPT 2012. AFRICACRYPT 2012. Lecture Notes in Computer Science, vol 7374. Springer, Berlin. https://doi.org/10.1007/978-3-642-31410-0_11

Coppersmith D (1994) The data encryption standard (DES) and its strength against attacks. IBM J Res Dev 38(3):243–250. https://doi.org/10.1147/rd.383.0243

Daemen J (1995) Cipher and hash function design strategies based on linear and differential cryptanalysis. In: Ph.D. dissertation, Doctoral Dissertation, March 1995, KU Leuven

Ebrahim M, Chong CW (2013) Secure Force: A low-complexity cryptographic algorithm for Wireless Sensor Network (WSN). In: 2013 IEEE International Conference on Control System, Computing and Engineering, Mindeb, pp 557–562. https://doi.org/10.1007/978-3-642-31410-0_11

Eisenbarth T, Kumar S, Paar C, Poschmann A, Uhsadel L (2007) A survey of lightweight-cryptography implementations. IEEE Design Test Comput 24(6):522–533. https://doi.org/10.1109/MDT.2007.178

Koo WK, Lee H, Kim YH, Lee DH (2008) Implementation and Analysis of New Lightweight Cryptographic Algorithm Suitable for Wireless Sensor Networks. In: 2008 International conference on information security and assurance (isa 2008), Busan, pp 73–76. https://doi.org/10.1109/ISA.2008.53

Meng Q, Ma J, Chen K, Miao Y (2018) J Commun 39(4):167–175

Muhammad U, Irfan AM (2017) Imran. Int J Adv Computr Sci Appl 8(1):402–411

Poettering B (2013) Rijndaelfurious aes-128 implementation for avr devices (2007)