Skip to main content
Log in

Session Key Based an Efficient Cryptographic Scheme of Images for Securing Internet of Things

  • Original Research
  • Published:
SN Computer Science Aims and scope Submit manuscript

Abstract

Nowadays, the majority of mobile phone conversations take the form of photos. A strong encryption mechanism is required to shield the photographs from hackers. The novel random key-based picture encryption technique proposed in this study is safe. For each image encryption, a different session key is produced using this method. In this case, a hybrid pseudo-random number generator is used to create the session key. To encrypt an image, the suggested approach combines 64-bit plaintext and a 96-bit key, of which 64 bits are generated using a symmetric key, and the remaining 32 bits are added randomly using a hybrid pseudo-random number generator. At the encryption stage of this work, a further process called the 2-point crossover function is applied to further secure keys. This work does not require remembering and extracting session keys to generate subsequent session keys while keys are changing during each transmission. The implemented algorithm is tested on IoT devices for securing them. The experimental findings demonstrate that the suggested scheme performs better than the current scheme on a number of criteria.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

Data Availability

The author confirm that the data supporting the findings of this study are available within the article and its supplementarymaterials. All data is available in open source, however, as per the requirements the author may provide.

References

  1. Usman M, Ahmed I, Aslam M, Khan S, Shah U. SIT: a lightweight encryption algorithm for secure Internet of Things. (IJACSA) Int J Adv Comput Sci Appl. 2017;8(1):402–411.

  2. Stalin S, Maheshwary P, Shukla P, Maheshwari M, Gour B, Khare A. Fast and secure medical image encryption based on non linear 4D logistic map and DNA sequences (NL4DLM_DNA). J Med Syst. 43:2019.

  3. Zhang X, Zhou H, Zhou Z, Wang L, Li C. An image encryption algorithm based on hyper-chaotic system and genetic algorithm. Qiao J, et al. (eds) Bio-inspired computing: theories and applications. BIC-TA 2018. Communications in computer and information science, vol 952. Singapore: Springer.

  4. Guesmi R, Farah M, Kachouri A, Samet M. Hash key-based image encryption using crossover operator and chaos. Multimed Tools Appl. 2016;75(8):4753–69.

    Article  MATH  Google Scholar 

  5. Samhita P, Prasad P, Patro K, Acharya B. A secure chaos-based image encryption and decryption using crossover and mutation operator. IJCTA. 2016;9(34):17–28.

    Google Scholar 

  6. Wang X, Feng L, Li R, Zhang F. A fast image encryption algorithm based on non-adjacent dynamically coupled map lattice model. Nonlinear Dyn. 2019;95:2797–824.

    Article  MATH  Google Scholar 

  7. Tang J, Yu Z, Liu L. A delay coupling method to reduce the dynamical degradation of digital chaotic maps and its application for image encryption. Multimed Tools Appl. 2019;78:24765–88.

    Article  Google Scholar 

  8. Talhaoui MZ, Wang X, Midoun MA. Fast image encryption algorithm with high security level using the Bülban chaotic map. J Real-Time Image Process. 2020. https://doi.org/10.1007/s11554-020-00948-1.

    Article  Google Scholar 

  9. Liu Y, Zhang J, Han D, Wu P, Sun Y, Moon YS. A multidimensional chaotic image encryption algorithm based on the region of interest. Multimed Tools Appl. 2020. https://doi.org/10.1007/s11042-020-08645-8.

    Article  Google Scholar 

  10. Li R. Fingerprint-related chaotic image encryption scheme based on blockchain framework. Multimed Tools Appl. 2020. https://doi.org/10.1007/s11042-020-08802-z.

    Article  Google Scholar 

  11. Dagadu JC, Li J, Aboagye E. Medical image encryption based on hybrid chaotic DNA diffusion. Wirel Pers Commun. 2019. https://doi.org/10.1007/s11277-019-06420-z.

    Article  Google Scholar 

  12. Liu H, Zhao B, Huang L. A novel quantum image encryption algorithm based on crossover operation and mutation operation. Multimed Tools Appl. 2019. https://doi.org/10.1007/s11042-019-7186-3.

    Article  Google Scholar 

  13. Zhu H, Zhao C, Zhang X. A novel image encryption-compression scheme using hyper-chaos and Chinese remainder theorem. Signal Process. 2013;28(6):670–80.

    Google Scholar 

  14. Wang Y, YiZhao QZ, Lin Z. Image encryption using partitioned cellular automata. Neurocomputing. 2018;275:1318–32.

    Article  Google Scholar 

  15. Rostami MJ, Shahba A, Saryazdi S, Nezamabadi-pour H. A novel parallel image encryption with chaotic windows based on logistic map. Comput Electr Eng. 2017;62:384–400.

    Article  Google Scholar 

  16. Khan HN, Chaudhury A, Das A, Chaudhary A. An ultra robust session key based image cryptography. Microsyst Technol. 2019. https://doi.org/10.1007/s00542-019-04518-9.

    Article  Google Scholar 

  17. Ahmed T, Rahman MM. The hybrid pseudo random number generator. Int J Hybrid Inf Technol. 2016;9(7):299–312.

    Google Scholar 

  18. Barker E, Roginsky A. Transitions: recommendation for transitioning the use of cryptographic algorithms and key lengths. NIST Special Publication 800-131A; 2011.

  19. Chakrabarti P, Bhuyan B, Chowdhuri A, Bhunia CT. A novel approach towards realizing optimum data transfer and automatic variable key (AVK). Int J Comput Sci Netw Secur. 2008;8(5):241–50.

    Google Scholar 

  20. Sreelaja N, Pai G, Vijayalakshmi A. Stream cipher for binary image encryption using ant colony optimization based key generation. Appl Soft Comput. 2012;9:2879–95.

    Article  Google Scholar 

  21. Goswami, Subhra R, Chakraborty SK, Bhunia A, Bhunia CT. New approach towards generation of automatic variable key to achieve perfect security. In: 2013 10th international conference on information technology: new generations. IEEE; 2013. p. 489–91.

  22. Eisenbarth T, Gong Z, Uneysu TG, Heyse S, Indesteege S, Kerckhof S, Koeune F, Nad T, Plos T, et al. Compact implementation and performance evaluation of block ciphers in attiny devices. In: International conference on cryptology in Africa. Springer; 2012. p. 1072–187.

  23. Eisenbarth T, Gong Z, Guneysu T, Heyse S. Compact implementation and performance evaluation of block ciphers in attiny devices. In: International conference on cryptology in Africa. Springer; 2012. p. 172–87.

  24. Koo WK, Lee H, Kim YH, Lee DH. Implementation and analysis of new lightweight cryptographic algorithm suitable for wireless sensor networks. In: ISA 2008. international conference on information security and assurance, 2008. IEEE; 2008. p. 73–6.

  25. Eisenbarth T, Kumar S, Paar C, Poschmann A, Uhsadel L. A survey of lightweight-cryptography implementations. IEEE Des Test Comput. 2007;24(6):522–33.

    Article  Google Scholar 

  26. Walport m. The Internet of Things: making the most of the second digital revolution, a report by the UK government chief scientific adviser. Techical report. 2014. https://www.gov.uk/government/uploads/system/uploads/attachmentdata/file/409774/14-1230-internet-of-things-review.pdf. Accessed 22 June 2017.

  27. The Internet of Things: five critical questions, McKinsey Global Institute. 2015. http://www.mckinsey.com/industries/high-tech/our-insights/the-internet-of-things-five-critical-questions. Accessed 22 June 2017.

  28. A partnership to secure and protect the emerging Internet of Things, National Science Foundation. 2015. http://nsf.gov/news/newssumm.jsp?cntnid=136104&org=NSF. Accessed 22 June 2017.

  29. European Research Cluster on the Internet of Things. http://www.internet-of-things-research.eu/. Accessed 22 June 2017.

Download references

Funding

There is no funding grant for this manuscript.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Abhinav Vidwans.

Ethics declarations

Conflict of interest

The authors have no affiliation with any organization with a direct or indirect financial interest in the subject matter discussed in the manuscript.

Research involving human participants and/or animals

Human participants.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This article is part of the topical collection “Machine Intelligence and Smart Systems” guest edited by Manish Gupta and Shikha Agrawal.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Vidwans, A., Ramaiya, M. Session Key Based an Efficient Cryptographic Scheme of Images for Securing Internet of Things. SN COMPUT. SCI. 4, 527 (2023). https://doi.org/10.1007/s42979-023-01952-5

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s42979-023-01952-5

Keywords

Navigation