Efficient Lightweight Encryption Algorithm for Smart Video Applications

by   Amna Shifa, et al.

The future generation networks: Internet of things (IoT), in combination with the advanced computer vision techniques poses new challenges for securing videos for end-users. The visual devices generally have constrained resources in respects to their low computation power, small memory with limited power supply. Therefore, to facilitate the video security in smart environment, lightweight security schemes are required instead of inefficient existing traditional cryptography algorithms. This research paper provides the solution to overcome such problems. A novel lightweight cipher algorithm is proposed here which targets multimedia in IoT with an in-house name EXPer i.e. Extended permutation with eXclusive OR (XOR). EXPer is a symmetric stream cipher that consists of simple XOR and left shift operations with three keys of 128 bits. The proposed cipher algorithm has been tested on various sample videos. Comparison of proposed algorithm has been made with the traditional cipher algorithms XOR and Advanced Encryption Standard (AES). Visual results confirm that EXPer provides security level equivalent to the AES algorithm with less computational cost than AES. Therefore, it can easily be perceived that the EXPer is a better replacement of AES for securing real-time video applications in IoT.


Enhancing AES Using Chaos and Logistic Map-Based Key Generation Technique for Securing IoT-Based Smart Home

The Internet of Things (IoT) has brought new ways for humans and machine...

Pretty Modular Symmetric Encryption (PMSE), compact algorithm for "embedded cryptography" with quite low computational cost

Nowadays, the dataflux shared between IOT systems must be secured from 8...

Lightweight Cryptography for IoT: A State-of-the-Art

With the emergence of 5G, Internet of Things (IoT) has become a center o...

Computer and Network Security

In the era of Internet of Things and with the explosive worldwide growth...

Securing IIoT using Defence-in-Depth: Towards an End-to-End Secure Industry 4.0

Industry 4.0 uses a subset of the IoT, named Industrial IoT (IIoT), to a...

Smart-Lock Security Re-engineered using Cryptography and Steganography

After the rise of E-commerce, social media and messenger bots, rapid dev...

Lightweight Joint Compression-Encryption-Authentication-Integrity Framework Based on Arithmetic Coding

Arithmetic Coding is an efficient lossless compression scheme applied fo...

Please sign up or login with your details

Forgot password? Click here to reset