Version 1
: Received: 10 February 2018 / Approved: 13 February 2018 / Online: 13 February 2018 (09:23:50 CET)
Version 2
: Received: 15 February 2018 / Approved: 15 February 2018 / Online: 15 February 2018 (19:57:48 CET)
How to cite:
Talbi, M.; Bouhalel, M.S. Application of a Lightweight Encryption Algorithm to a Quantized Speech Image for Secure IoT. Preprints2018, 2018020096. https://doi.org/10.20944/preprints201802.0096.v2
Talbi, M.; Bouhalel, M.S. Application of a Lightweight Encryption Algorithm to a Quantized Speech Image for Secure IoT. Preprints 2018, 2018020096. https://doi.org/10.20944/preprints201802.0096.v2
Talbi, M.; Bouhalel, M.S. Application of a Lightweight Encryption Algorithm to a Quantized Speech Image for Secure IoT. Preprints2018, 2018020096. https://doi.org/10.20944/preprints201802.0096.v2
APA Style
Talbi, M., & Bouhalel, M.S. (2018). Application of a Lightweight Encryption Algorithm to a Quantized Speech Image for Secure IoT. Preprints. https://doi.org/10.20944/preprints201802.0096.v2
Chicago/Turabian Style
Talbi, M. and Med Salim Bouhalel. 2018 "Application of a Lightweight Encryption Algorithm to a Quantized Speech Image for Secure IoT" Preprints. https://doi.org/10.20944/preprints201802.0096.v2
Abstract
The IoT Internet of Things being a promising technology of the future. It is expected to connect billions of devices. The increased communication number is expected to generate data mountain and the data security can be a threat. The devices in the architecture are fundamentally smaller in size and low powered. In general, classical encryption algorithms are computationally expensive and this due to their complexity and needs numerous rounds for encrypting, basically wasting the constrained energy of the gadgets. Less complex algorithm, though, may compromise the desired integrity. In this paper we apply a lightweight encryption algorithm named as Secure IoT (SIT) to a quantized speech image for Secure IoT. It is a 64-bit block cipher and requires 64-bit key to encrypt the data. This quantized speech image is constructed by first quantizing a speech signal and then splitting the quantized signal into frames. Then each of these frames is transposed for obtaining the different columns of this quantized speech image. Simulations result shows the algorithm provides substantial security in just five encryption rounds.
Computer Science and Mathematics, Computer Networks and Communications
Copyright:
This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Commenter: srujan
The commenter has declared there is no conflict of interests.