- Abbas M. Al-Ghaili ORCID:orcid.org/0000-0001-5982-259216,17,
- Hairoladenan Kasim17,
- Ridha Omar17,
- Zainuddin Hassan17,
- Naif M. Al-Hada ORCID:orcid.org/0000-0002-7318-818518 &
- …
- Jihua Wang18
Part of the book series:Lecture Notes in Computer Science ((LNIP,volume 13051))
Included in the following conference series:
1577Accesses
Abstract
This paper designs a secret key that has the ability to behave in a different way based on plaintext input. This paper proposes two schemes of secret key length which are:\(2^{i}\) and\(2^{i} + 2^{i - 1}\). The aim is to increase unpredictability and privacy of plaintext. A series of algebraic operations has been used to create a specific coefficient by which the relation between plaintext size and key length is adjustable. This design of secret key increases privacy of sensitive data used with energy informatics and smart Energy Internet-of-Things (EIoT) applications. The proposed design has been evaluated in terms of time complexity computation time to generate one secret key and encrypt plaintext. Additionally, results show that the proposed Algebraic Operations-based Secret-Key Design for Encryption Algorithm (ASKEA) has less computation time and complexity than other competitive research works. Privacy and unpredictability of plaintext and secret key could be preserved and achieved.
This is a preview of subscription content,log in via an institution to check access.
Access this chapter
Subscribe and save
- Get 10 units per month
- Download Article/Chapter or eBook
- 1 Unit = 1 Article or 1 Chapter
- Cancel anytime
Buy Now
- Chapter
- JPY 3498
- Price includes VAT (Japan)
- eBook
- JPY 12583
- Price includes VAT (Japan)
- Softcover Book
- JPY 15729
- Price includes VAT (Japan)
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Liu, L., Wang, Q., Wu, Y.: QR code positioning algorithm. In: The 2nd International Conference on Computing and Data Science, Stanford, CA, USA (2021)
Al-Ghaili, A.M., Kasim, H., Othman, M., Hassan, Z.: A New Encryption Scheme Method (ESM) using capsulated-layers conception for verified QR-Tag for IoT-based smart access systems. In: Balas, V.E., Solanki, V.K., Kumar, R., Khari, M. (Eds.) Internet of Things and Big Data Analytics for Smart Generation, Cham, Springer International Publishing, pp. 77–103 (2019)
Ramalho, J.F.C.B. et al.: Super modules-based active QR codes for smart trackability and IoT: a responsive-banknotes case study. npj Flexible Electron.4, (1), 11 (2020)
Liu, Z., Choo, K.K.R., Grossschadl, J.: Securing edge devices in the post-quantum internet of things using lattice-based cryptography. IEEE Commun. Mag.56(2), 158–162 (2018)
Neisse, R., Baldini, G., Steri, G., Ahmad, A., Fourneret, E., Legeard, B.: Improving Internet of Things device certification with policy-based management, In: 2017 Global Internet of Things Summit (GIoTS). Vol. 6–9, pp. 1–6 (2017)
Rane, S., Dubey, A., Parida, T.: Design of IoT based intelligent parking system using image processing algorithms. In: 2017 International Conference on Computing Methodologies and Communication (ICCMC), pp. 1049–1053 (2017)
Xiao-Long, W., Chun-Fu, W., Guo-Dong, L., Qing-Xie, C.: A robot navigation method based on RFID and QR code in the warehouse. In: 2017 Chinese Automation Congress (CAC), vol. 20–22, pp. 7837–7840 (2017)
Ghaffari, M., Ghadiri, N., Manshaei, M.H., Lahijani, M.S.: P4QS: a peer-to-peer privacy preserving query service for location-based mobile applications. IEEE Trans. Veh. Technol.66(10), 9458–9469 (2017)
Sha, K., Yang, T.A., Wei, W., Davari, S.: A survey of edge computing-based designs for IoT security. Digit. Commun. Netw.6(2), 195–202 (2020)
Parikh, S., Dave, D., Patel, R., Doshi, N.: Security and privacy issues in cloud, fog and edge computing. Procedia Comput. Sci.160, 734–739 (2019)
Al-Ghaili, A.M., Kasim, H., Othman, M., Hassan, Z.: Security factors based evaluation of verification algorithm for an IoT access system. In: Saeed, F., Gazem, N., Mohammed, F., Busalim, A. (eds.) Recent Trends in Data Science and Soft Computing, Cham, Springer International Publishing, pp. 384–395, (2019)
Tkachenko, I., Puech, W., Destruel, C., Strauss, O., Gaudin, J.M., Guichard, C.: Two-Level QR code for private message sharing and document authentication. IEEE Trans. Inf. Forensics Secur.11(3), 571–583 (2016)
Lin, S.S., Hu, M.C., Lee, C.H., Lee, T.Y.: Efficient QR code beautification with high quality visual content. IEEE Trans. Multimedia17(9), 1515–1524 (2015)
Lin, P.Y.: Distributed secret sharing approach with cheater prevention based on QR code. IEEE Trans. Industr. Inf.12(1), 384–392 (2016)
Nazemzadeh, P., Fontanelli, D., Macii, D., Palopoli, L.: Indoor localization of mobile robots through QR code detection and dead reckoning data fusion. IEEE/ASME Trans. Mechatron.22(6), 2588–2599 (2017)
Kirkham, T., Armstrong, D., Djemame, K., Jiang, M.: Risk driven Smart Home resource management using cloud services. Futur. Gener. Comput. Syst.38, 13–22 (2014)
Chen, Y.H., Tsai, M.J., Fu, L.C., Chen, C.H., Wu, C.L., Zeng, Y.C.: Monitoring elder’s living activity using ambient and body sensor network in smart home. In: 2015 IEEE International Conference on Systems, Man, and Cybernetics, pp. 2962–2967 (2015)
Kanaris, L., Kokkinis, A., Fortino, G., Liotta, A., Stavrou, S.: Sample size determination algorithm for fingerprint-based indoor localization systems. Comput. Netw.101, 169–177 (2016)
Gentili, M., Sannino, R., Petracca, M.: BlueVoice: voice communications over Bluetooth Low Energy in the Internet of Things scenario. Comput. Commun.89–90, 51–59 (2016)
Acknowledgement
This research work is funded by Universiti Tenaga Nasional (UNITEN) with Grant Code: (J510050002/2021048).
Author information
Authors and Affiliations
Institute of Informatics and Computing in Energy (IICE), Universiti Tenaga Nasional (UNITEN), 43000, Kajang, Selangor, Malaysia
Abbas M. Al-Ghaili
College of Computing and Informatics (CCI), UNITEN, 43000, Kajang, Selangor, Malaysia
Abbas M. Al-Ghaili, Hairoladenan Kasim, Ridha Omar & Zainuddin Hassan
Shandong Key Laboratory of Biophysics, Institute of Biophysics, Dezhou University, Dezhou, 253023, China
Naif M. Al-Hada & Jihua Wang
- Abbas M. Al-Ghaili
You can also search for this author inPubMed Google Scholar
- Hairoladenan Kasim
You can also search for this author inPubMed Google Scholar
- Ridha Omar
You can also search for this author inPubMed Google Scholar
- Zainuddin Hassan
You can also search for this author inPubMed Google Scholar
- Naif M. Al-Hada
You can also search for this author inPubMed Google Scholar
- Jihua Wang
You can also search for this author inPubMed Google Scholar
Corresponding authors
Correspondence toAbbas M. Al-Ghaili orNaif M. Al-Hada.
Editor information
Editors and Affiliations
Universiti Tenaga Nasional, Selangor, Malaysia
Halimah Badioze Zaman
Dublin City University, Dublin, Ireland
Alan F. Smeaton
National Central University, Jhongli, Taiwan
Timothy K. Shih
Queen Mary University of London, London, UK
Sergio Velastin
Toyo University, Tokyo, Japan
Tada Terutoshi
University of Southern Denmark, Odense, Denmark
Bo Nørregaard Jørgensen
Universiti Tenaga Nasional, Selangor, Malaysia
Hazleen Aris
Universiti Tenaga Nasional, Selangor, Malaysia
Nazrita Ibrahim
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this paper
Cite this paper
Al-Ghaili, A.M., Kasim, H., Omar, R., Hassan, Z., Al-Hada, N.M., Wang, J. (2021). Algebraic Operations-Based Secret-Key Design for Encryption Algorithm (ASKEA) for Energy Informatics and Smart Internet of Things (IoT) Applications. In: Badioze Zaman, H.,et al. Advances in Visual Informatics. IVIC 2021. Lecture Notes in Computer Science(), vol 13051. Springer, Cham. https://doi.org/10.1007/978-3-030-90235-3_51
Download citation
Published:
Publisher Name:Springer, Cham
Print ISBN:978-3-030-90234-6
Online ISBN:978-3-030-90235-3
eBook Packages:Computer ScienceComputer Science (R0)
Share this paper
Anyone you share the following link with will be able to read this content:
Sorry, a shareable link is not currently available for this article.
Provided by the Springer Nature SharedIt content-sharing initiative