[go: up one dir, main page]

Skip to main content

Algebraic Operations-Based Secret-Key Design for Encryption Algorithm (ASKEA) for Energy Informatics and Smart Internet of Things (IoT) Applications

  • Conference paper
  • First Online:
Advances in Visual Informatics (IVIC 2021)

Abstract

This paper designs a secret key that has the ability to behave in a different way based on plaintext input. This paper proposes two schemes of secret key length which are: \(2^{i}\) and \(2^{i} + 2^{i - 1}\). The aim is to increase unpredictability and privacy of plaintext. A series of algebraic operations has been used to create a specific coefficient by which the relation between plaintext size and key length is adjustable. This design of secret key increases privacy of sensitive data used with energy informatics and smart Energy Internet-of-Things (EIoT) applications. The proposed design has been evaluated in terms of time complexity computation time to generate one secret key and encrypt plaintext. Additionally, results show that the proposed Algebraic Operations-based Secret-Key Design for Encryption Algorithm (ASKEA) has less computation time and complexity than other competitive research works. Privacy and unpredictability of plaintext and secret key could be preserved and achieved.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 89.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Liu, L., Wang, Q., Wu, Y.: QR code positioning algorithm. In: The 2nd International Conference on Computing and Data Science, Stanford, CA, USA (2021)

    Google Scholar 

  2. Al-Ghaili, A.M., Kasim, H., Othman, M., Hassan, Z.: A New Encryption Scheme Method (ESM) using capsulated-layers conception for verified QR-Tag for IoT-based smart access systems. In: Balas, V.E., Solanki, V.K., Kumar, R., Khari, M. (Eds.) Internet of Things and Big Data Analytics for Smart Generation, Cham, Springer International Publishing, pp. 77–103 (2019)

    Google Scholar 

  3. Ramalho, J.F.C.B. et al.: Super modules-based active QR codes for smart trackability and IoT: a responsive-banknotes case study. npj Flexible Electron. 4, (1), 11 (2020)

    Google Scholar 

  4. Liu, Z., Choo, K.K.R., Grossschadl, J.: Securing edge devices in the post-quantum internet of things using lattice-based cryptography. IEEE Commun. Mag. 56(2), 158–162 (2018)

    Article  Google Scholar 

  5. Neisse, R., Baldini, G., Steri, G., Ahmad, A., Fourneret, E., Legeard, B.: Improving Internet of Things device certification with policy-based management, In: 2017 Global Internet of Things Summit (GIoTS). Vol. 6–9, pp. 1–6 (2017)

    Google Scholar 

  6. Rane, S., Dubey, A., Parida, T.: Design of IoT based intelligent parking system using image processing algorithms. In: 2017 International Conference on Computing Methodologies and Communication (ICCMC), pp. 1049–1053 (2017)

    Google Scholar 

  7. Xiao-Long, W., Chun-Fu, W., Guo-Dong, L., Qing-Xie, C.: A robot navigation method based on RFID and QR code in the warehouse. In: 2017 Chinese Automation Congress (CAC), vol. 20–22, pp. 7837–7840 (2017)

    Google Scholar 

  8. Ghaffari, M., Ghadiri, N., Manshaei, M.H., Lahijani, M.S.: P4QS: a peer-to-peer privacy preserving query service for location-based mobile applications. IEEE Trans. Veh. Technol. 66(10), 9458–9469 (2017)

    Article  Google Scholar 

  9. Sha, K., Yang, T.A., Wei, W., Davari, S.: A survey of edge computing-based designs for IoT security. Digit. Commun. Netw. 6(2), 195–202 (2020)

    Article  Google Scholar 

  10. Parikh, S., Dave, D., Patel, R., Doshi, N.: Security and privacy issues in cloud, fog and edge computing. Procedia Comput. Sci. 160, 734–739 (2019)

    Article  Google Scholar 

  11. Al-Ghaili, A.M., Kasim, H., Othman, M., Hassan, Z.: Security factors based evaluation of verification algorithm for an IoT access system. In: Saeed, F., Gazem, N., Mohammed, F., Busalim, A. (eds.) Recent Trends in Data Science and Soft Computing, Cham, Springer International Publishing, pp. 384–395, (2019)

    Google Scholar 

  12. Tkachenko, I., Puech, W., Destruel, C., Strauss, O., Gaudin, J.M., Guichard, C.: Two-Level QR code for private message sharing and document authentication. IEEE Trans. Inf. Forensics Secur. 11(3), 571–583 (2016)

    Article  Google Scholar 

  13. Lin, S.S., Hu, M.C., Lee, C.H., Lee, T.Y.: Efficient QR code beautification with high quality visual content. IEEE Trans. Multimedia 17(9), 1515–1524 (2015)

    Article  Google Scholar 

  14. Lin, P.Y.: Distributed secret sharing approach with cheater prevention based on QR code. IEEE Trans. Industr. Inf. 12(1), 384–392 (2016)

    Google Scholar 

  15. Nazemzadeh, P., Fontanelli, D., Macii, D., Palopoli, L.: Indoor localization of mobile robots through QR code detection and dead reckoning data fusion. IEEE/ASME Trans. Mechatron. 22(6), 2588–2599 (2017)

    Article  Google Scholar 

  16. Kirkham, T., Armstrong, D., Djemame, K., Jiang, M.: Risk driven Smart Home resource management using cloud services. Futur. Gener. Comput. Syst. 38, 13–22 (2014)

    Article  Google Scholar 

  17. Chen, Y.H., Tsai, M.J., Fu, L.C., Chen, C.H., Wu, C.L., Zeng, Y.C.: Monitoring elder’s living activity using ambient and body sensor network in smart home. In: 2015 IEEE International Conference on Systems, Man, and Cybernetics, pp. 2962–2967 (2015)

    Google Scholar 

  18. Kanaris, L., Kokkinis, A., Fortino, G., Liotta, A., Stavrou, S.: Sample size determination algorithm for fingerprint-based indoor localization systems. Comput. Netw. 101, 169–177 (2016)

    Article  Google Scholar 

  19. Gentili, M., Sannino, R., Petracca, M.: BlueVoice: voice communications over Bluetooth Low Energy in the Internet of Things scenario. Comput. Commun. 89–90, 51–59 (2016)

    Article  Google Scholar 

Download references

Acknowledgement

This research work is funded by Universiti Tenaga Nasional (UNITEN) with Grant Code: (J510050002/2021048).

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Abbas M. Al-Ghaili or Naif M. Al-Hada .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Al-Ghaili, A.M., Kasim, H., Omar, R., Hassan, Z., Al-Hada, N.M., Wang, J. (2021). Algebraic Operations-Based Secret-Key Design for Encryption Algorithm (ASKEA) for Energy Informatics and Smart Internet of Things (IoT) Applications. In: Badioze Zaman, H., et al. Advances in Visual Informatics. IVIC 2021. Lecture Notes in Computer Science(), vol 13051. Springer, Cham. https://doi.org/10.1007/978-3-030-90235-3_51

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-90235-3_51

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-90234-6

  • Online ISBN: 978-3-030-90235-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics