Secure Analysis for IIOT Systems Using Hyperchaotic Image Encryption

Haini Zeng, Qiping Zou
2022 Security and Communication Networks  
Like edge computing, intelligent cameras and image sensors are widely used in the Industrial Internet of Things (IIOT), including design and finished product quality inspection. However, the images generated by these sensors are constantly at risk of information leakage and privacy violations in the IIOT. Due to the involvement of third parties, traditional encryption algorithms are no longer adapted to image encryption for IIOT. In the context of the IIOT, an image encryption technology based
more » ... n hyperchaotic systems and dynamic DNA coding is proposed. First, the image pixel position is scrambled by the hyperchaotic mapping index sequence, so that the image pixel matrix is dynamically DNA coded, and the base operation is performed on the given DNA sequence. Then, Keccak is used to calculate the hash value of the given DNA sequence as the initial value of the chaotic system and a certain number of base substitutions are performed on the DNA encoded pixel value according to the quaternary hyperchaotic sequence generated by the hyperchaotic system. Finally, ciphertext feedback and chaotic system iteration are used to further enhance the confusion and diffusion characteristics of the algorithm. The test results show that the algorithm not only has a large key space, strong sensitivity to keys, but also has strong resistance to exhaustive analysis attacks.
doi:10.1155/2022/3664986 doaj:73217b3902674ef7837b42360f3e2b2c fatcat:gsonosnvyvdafh2ozsrhezwsgy