Dynamic S-boxes generation for IoT security enhancement: A genetic algorithm approach

IF 6 2区 工程技术 Q1 ENGINEERING, MULTIDISCIPLINARY Ain Shams Engineering Journal Pub Date : 2024-11-01 DOI:10.1016/j.asej.2024.103049
Amina Msolli, Imen Hagui, Abdelhamid Helali
{"title":"Dynamic S-boxes generation for IoT security enhancement: A genetic algorithm approach","authors":"Amina Msolli,&nbsp;Imen Hagui,&nbsp;Abdelhamid Helali","doi":"10.1016/j.asej.2024.103049","DOIUrl":null,"url":null,"abstract":"<div><div>We are witnessing an explosion in the concept of the Internet of Things (IoT) as smart objects become more important in our daily lives to make it easier to achieve our goals. It is obvious that the application areas of IoT are extremely diverse. Indeed, several sectors will be deeply impacted by IoT applications. Of which, security in the Internet of Things (IoT) has become a major concern due to increasing vulnerabilities and threats. Connected devices, often with limited security capabilities, have become attractive targets for attackers. Vulnerabilities in IoT devices, whether resulting from unmodified default configurations, lack of regular updates, or insecure communication protocols, expose these systems to potential risks. Cryptography, as a discipline dedicated to securing communications, uses advanced mathematical techniques to guarantee the confidentiality of electronic exchanges by making the data incomprehensible to unauthorized persons.</div><div>In this paper, we show an in-depth exploration of the generation of new S-boxes using the genetic algorithm. These new S-boxes are dynamically generated with the new genetic algorithm-based approach. This new method offers adaptive optimization, iteratively exploring the solution space to identify robust S-boxes, thereby strengthening the security of the encryption system. The study continues with the evaluation of these S-boxes through dedicated metrics, allowing an in-depth analysis of their performance in terms of resistance to cryptographic attacks and preservation of substitution properties. Finally, this evaluation extends to the incorporation of these newly generated S-boxes into the AES encryption algorithm, where different dimensions, such as cryptanalysis resistance, scene visibility, and other performance levels, will be examined.</div></div>","PeriodicalId":48648,"journal":{"name":"Ain Shams Engineering Journal","volume":"15 11","pages":"Article 103049"},"PeriodicalIF":6.0000,"publicationDate":"2024-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Ain Shams Engineering Journal","FirstCategoryId":"5","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2090447924004246","RegionNum":2,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"ENGINEERING, MULTIDISCIPLINARY","Score":null,"Total":0}
引用次数: 0

Abstract

We are witnessing an explosion in the concept of the Internet of Things (IoT) as smart objects become more important in our daily lives to make it easier to achieve our goals. It is obvious that the application areas of IoT are extremely diverse. Indeed, several sectors will be deeply impacted by IoT applications. Of which, security in the Internet of Things (IoT) has become a major concern due to increasing vulnerabilities and threats. Connected devices, often with limited security capabilities, have become attractive targets for attackers. Vulnerabilities in IoT devices, whether resulting from unmodified default configurations, lack of regular updates, or insecure communication protocols, expose these systems to potential risks. Cryptography, as a discipline dedicated to securing communications, uses advanced mathematical techniques to guarantee the confidentiality of electronic exchanges by making the data incomprehensible to unauthorized persons.
In this paper, we show an in-depth exploration of the generation of new S-boxes using the genetic algorithm. These new S-boxes are dynamically generated with the new genetic algorithm-based approach. This new method offers adaptive optimization, iteratively exploring the solution space to identify robust S-boxes, thereby strengthening the security of the encryption system. The study continues with the evaluation of these S-boxes through dedicated metrics, allowing an in-depth analysis of their performance in terms of resistance to cryptographic attacks and preservation of substitution properties. Finally, this evaluation extends to the incorporation of these newly generated S-boxes into the AES encryption algorithm, where different dimensions, such as cryptanalysis resistance, scene visibility, and other performance levels, will be examined.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
为增强物联网安全性生成动态 S-box:遗传算法方法
随着智能物品在我们的日常生活中变得越来越重要,我们正在目睹物联网(IoT)概念的爆炸式发展,从而更容易实现我们的目标。显然,物联网的应用领域极为广泛。事实上,物联网应用将对多个领域产生深刻影响。其中,由于漏洞和威胁不断增加,物联网(IoT)的安全问题已成为人们关注的焦点。通常安全功能有限的联网设备已成为攻击者的目标。物联网设备中的漏洞,无论是未修改的默认配置、缺乏定期更新,还是不安全的通信协议,都会使这些系统面临潜在风险。密码学作为一门致力于保障通信安全的学科,利用先进的数学技术使未经授权的人无法理解数据,从而保证电子交换的机密性。这些新的 S 框是通过基于遗传算法的新方法动态生成的。这种新方法提供了自适应优化,通过迭代探索解空间来识别稳健的 S-box,从而加强加密系统的安全性。研究继续通过专门的指标对这些 S 盒进行评估,以便深入分析它们在抵御加密攻击和保持替换特性方面的性能。最后,这项评估还将延伸到将这些新生成的 S-box 纳入 AES 加密算法的过程中,届时将从不同的维度,如抗密码分析能力、场景可见性和其他性能水平,对这些 S-box 进行检验。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
Ain Shams Engineering Journal
Ain Shams Engineering Journal Engineering-General Engineering
CiteScore
10.80
自引率
13.30%
发文量
441
审稿时长
49 weeks
期刊介绍: in Shams Engineering Journal is an international journal devoted to publication of peer reviewed original high-quality research papers and review papers in both traditional topics and those of emerging science and technology. Areas of both theoretical and fundamental interest as well as those concerning industrial applications, emerging instrumental techniques and those which have some practical application to an aspect of human endeavor, such as the preservation of the environment, health, waste disposal are welcome. The overall focus is on original and rigorous scientific research results which have generic significance. Ain Shams Engineering Journal focuses upon aspects of mechanical engineering, electrical engineering, civil engineering, chemical engineering, petroleum engineering, environmental engineering, architectural and urban planning engineering. Papers in which knowledge from other disciplines is integrated with engineering are especially welcome like nanotechnology, material sciences, and computational methods as well as applied basic sciences: engineering mathematics, physics and chemistry.
期刊最新文献
Editorial Board Study on the intermediate crack-induced debonding strain of FRP-strengthened concrete members using the updated BP neural network An Improved digital multi-resonant controller for 3 ϕ grid-tied and standalone PV system under balanced and unbalanced conditions Common architectural characteristics of traditional courtyard houses in Erbil city Analysis of Monte-Carlo collision method with argon and helium background gases at different RF-powers and pressures in ELTRAP device
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1