A Lightweight Symmetric DNA Encryption Algorithm Inspired by Protein Synthesis (SDEAP) for IoT Devices

被引:0
|
作者
Djaa, Djihad [1 ]
Mekkaoui, Kheireddine [2 ]
Boukli-hacene, Sofiane [1 ]
机构
[1] Univ Djillali Liabes Sidi Bel Abbes, Evolutionary Engn & Distributed Informat Syst Lab, Sidi Bel Abbes 22000, Algeria
[2] Univ Saida, Dept Comp Sci, Saida 20000, Algeria
关键词
IoT; lightweight cryptography; symmetric key; encryption; DNA cryptography; Contiki-Cooja simulator;
D O I
10.4316/AECE.2025.01009
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
and confidentiality of data generated and exchanged between IoT devices is essential and becomes an important issue that needs further research. IoT resource- constrained devices are often characterized by a limited computation, small memory size and limited battery. So it is difficult to use traditional encryption methods that require more computational power. In this paper, aAnew lightweight symmetric DNA encryption algorithm inspired by protein synthesis (SDEAP) is proposed. It is inspired by central dogma of molecular biology and uses the randomness of DNA chromosomes to extract a strong OTP key. We exploited features found during protein synthesis to design an algorithm containing simple steps with complex security levels, making the resulting ciphertext difficult to decipher. Plaintext and key are both converted into proteins. Then aAnew XOR operation between proteins is performed to produce ciphertext in protein form. Unlike other works we propose another encryption level to transmit securely the generated keys with ciphertext in an optimal size message. Cooja simulator available in Contiki OS is used to simulate SDEAP in IoT environment. The findings show the effectiveness of SDEAP in terms of time and power consumption that is less by 60% and 93%, compared to SIMON and PRESENT respectively.
引用
收藏
页码:79 / 90
页数:12
相关论文
共 50 条
  • [41] A post-quantum lattice based lightweight authentication and code-based hybrid encryption scheme for IoT devices
    Kumari, Swati
    Singh, Maninder
    Singh, Raman
    Tewari, Hitesh
    COMPUTER NETWORKS, 2022, 217
  • [42] Information hiding method for long distance transmission in multi-channel IOT based on symmetric encryption algorithm
    Jia, Jun
    Zhang, Guojiang
    Hu, Chengbo
    Zhang, Zhaohui
    Liu, Ziquan
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021,
  • [43] Lightweight rogue access point detection algorithm for WiFi-enabled Internet of Things(IoT) devices
    Agyemang, Justice Owusu
    Kponyo, Jerry John
    Klogo, Griffith Selorm
    Boateng, Joshua Ofori
    INTERNET OF THINGS, 2020, 11
  • [44] Curve25519 based lightweight end-to-end encryption in resource constrained autonomous 8-bit IoT devices
    Shafi Ullah
    Raja Zahilah
    Cybersecurity, 4
  • [45] Ring-ExpLWE: A High-Performance and Lightweight Post-Quantum Encryption Scheme for Resource-Constrained IoT Devices
    Xu, Dongdong
    Wang, Xiang
    Hao, Yuanchao
    Zhang, Zhun
    Hao, Qiang
    Jia, Haoyu
    Dong, Haifeng
    Zhang, Longbing
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (23): : 24122 - 24134
  • [46] Curve25519 based lightweight end-to-end encryption in resource constrained autonomous 8-bit IoT devices
    Ullah, Shafi
    Zahilah, Raja
    CYBERSECURITY, 2021, 4 (01)
  • [47] Managing data security in fog computing in IoT devices using noise framework encryption with power probabilistic clustering algorithm
    M. Jalasri
    L. Lakshmanan
    Cluster Computing, 2023, 26 : 823 - 836
  • [48] Managing data security in fog computing in IoT devices using noise framework encryption with power probabilistic clustering algorithm
    Jalasri, M.
    Lakshmanan, L.
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2023, 26 (01): : 823 - 836
  • [49] An efficient DNA-inspired image encryption algorithm based on hyper-chaotic maps and wavelet fusion
    Said E. El-Khamy
    Amira G. Mohamed
    Multimedia Tools and Applications, 2021, 80 : 23319 - 23335
  • [50] An efficient DNA-inspired image encryption algorithm based on hyper-chaotic maps and wavelet fusion
    El-Khamy, Said E.
    Mohamed, Amira G.
    MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (15) : 23319 - 23335