Preprint Article Version 2 Preserved in Portico This version is not peer-reviewed

Application of a Lightweight Encryption Algorithm to a Quantized Speech Image for Secure IoT

Version 1 : Received: 10 February 2018 / Approved: 13 February 2018 / Online: 13 February 2018 (09:23:50 CET)
Version 2 : Received: 15 February 2018 / Approved: 15 February 2018 / Online: 15 February 2018 (19:57:48 CET)

How to cite: Talbi, M.; Bouhalel, M.S. Application of a Lightweight Encryption Algorithm to a Quantized Speech Image for Secure IoT. Preprints 2018, 2018020096. https://doi.org/10.20944/preprints201802.0096.v2 Talbi, M.; Bouhalel, M.S. Application of a Lightweight Encryption Algorithm to a Quantized Speech Image for Secure IoT. Preprints 2018, 2018020096. https://doi.org/10.20944/preprints201802.0096.v2

Abstract

The IoT Internet of Things being a promising technology of the future. It is expected to connect billions of devices. The increased communication number is expected to generate data mountain and the data security can be a threat. The devices in the architecture are fundamentally smaller in size and low powered. In general, classical encryption algorithms are computationally expensive and this due to their complexity and needs numerous rounds for encrypting, basically wasting the constrained energy of the gadgets. Less complex algorithm, though, may compromise the desired integrity. In this paper we apply a lightweight encryption algorithm named as Secure IoT (SIT) to a quantized speech image for Secure IoT. It is a 64-bit block cipher and requires 64-bit key to encrypt the data. This quantized speech image is constructed by first quantizing a speech signal and then splitting the quantized signal into frames. Then each of these frames is transposed for obtaining the different columns of this quantized speech image. Simulations result shows the algorithm provides substantial security in just five encryption rounds.

Keywords

IoT; security; encryption; quantized speech image; SNR; PESQ; histogram; entropy; correlation

Subject

Computer Science and Mathematics, Computer Networks and Communications

Comments (0)

Comment 1
Received: 2 October 2018
Commenter: srujan
The commenter has declared there is no conflict of interests.
Comment: For the proposed algorithm, can you able to give detailed encryption process with an example like explained in the SIT algorithm ???
+ Respond to this comment

We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.

Leave a public comment
Send a private comment to the author(s)
* All users must log in before leaving a comment
Views 0
Downloads 0
Comments 0
Metrics 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.