Skip to main content
Top
Published in: Wireless Personal Communications 1/2021

19-03-2021

Cellular Automata based Cryptography Model for Reliable Encryption Using State Transition in Wireless Network Optimizing Data Security

Authors: Ayan Banerjee, Anirban Kundu

Published in: Wireless Personal Communications | Issue 1/2021

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Authors propose a hardware based approach for reliable encryption in wireless network using Cellular Automata (CA). Distinct layers of encryption have been utilized in proposed model for enhancing data security. Transmitter and receiver modules are designed for performing state transition based encrypted activities. Transmitter module is required for capturing environmental turbulences (noise) from a specific geographical location and send encrypted signal to receiver module through wireless network. Receiver module analyses received signal after decryption for desired activities based on real time situations. Different hardware components are selected and compared based on market study targeting efficient construction of proposed modules. Time complexity and code break complexity are measured using different key lengths, keysets, and data sizes for proposed CA based encryption scheme achieving unique results in hardware based cryptography system. Encryption key length, index, and keyset are required for computing code break complexity in design model. Large data size is effectively managed to calculate protection ratio and reliability factor for realizing efficient protectiveness and accuracy. Comparative study between existing encryption technique and proposed CA based encryption technique is established based on time complexity and code break complexity.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Stephen, O. (2014). The study of the application of data encryption techniques in cloud storage to ensure stored data integrity and availability. International Journal of Scientific and Research Publications, 4(10), 1–7. Stephen, O. (2014). The study of the application of data encryption techniques in cloud storage to ensure stored data integrity and availability. International Journal of Scientific and Research Publications, 4(10), 1–7.
2.
go back to reference Sharma, P., Sood, S. K., & Kaur, S. (2011). Security issues in cloud computing. Springer-Verlag, Berlin Heidelberg HPAGC CCIS, 169, 36–45. Sharma, P., Sood, S. K., & Kaur, S. (2011). Security issues in cloud computing. Springer-Verlag, Berlin Heidelberg HPAGC CCIS, 169, 36–45.
3.
go back to reference Yarlagadda, V. K., & Ramanujam, S. (2011). Data security in cloud computing. Journal of Computer and Mathematical Sciences, 2(1), 15–23. Yarlagadda, V. K., & Ramanujam, S. (2011). Data security in cloud computing. Journal of Computer and Mathematical Sciences, 2(1), 15–23.
4.
go back to reference Ahmad, A. (2017). Type of security threats and its prevention. Computer Technology & Applications., 3(2), 750–752. Ahmad, A. (2017). Type of security threats and its prevention. Computer Technology & Applications., 3(2), 750–752.
5.
go back to reference Padmavathi, G. & Shanmugapriya, D. (2009). A survey of attacks, security mechanisms and challenges in wireless sensor networks. (IJCSIS) International Journal of Computer Science and Information Security, 4(1&2). Padmavathi, G. & Shanmugapriya, D. (2009). A survey of attacks, security mechanisms and challenges in wireless sensor networks. (IJCSIS) International Journal of Computer Science and Information Security, 4(1&2).
6.
go back to reference Monali, S. G., & Kalyankar, M. A. (2015). The study of network security with its penetrating attacks and possible security mechanisms. International Journal of Computer Science and Mobile computing., 4(5), 728–735. Monali, S. G., & Kalyankar, M. A. (2015). The study of network security with its penetrating attacks and possible security mechanisms. International Journal of Computer Science and Mobile computing., 4(5), 728–735.
7.
go back to reference Maheshwari, R., & Pathak, S. (2012). A proposed secure framework for safe data transmission in private cloud. International Journal of Recent Technology and Engineering (IJRTE)., 1(1), 78–82. Maheshwari, R., & Pathak, S. (2012). A proposed secure framework for safe data transmission in private cloud. International Journal of Recent Technology and Engineering (IJRTE)., 1(1), 78–82.
8.
go back to reference Ahmed, M., & Hossain, M. A. (2014). Cloud computing and security issues in the cloud. International Journal of Network Security (IJNSA), 6(1), 25–36. Ahmed, M., & Hossain, M. A. (2014). Cloud computing and security issues in the cloud. International Journal of Network Security (IJNSA), 6(1), 25–36.
9.
go back to reference Tamilselvi, S. (2017). Data storage security in cloud computing using AES. International Journal of Advanced Networking & Applications (IJANA), 08(05), 124–127. Tamilselvi, S. (2017). Data storage security in cloud computing using AES. International Journal of Advanced Networking & Applications (IJANA), 08(05), 124–127.
11.
go back to reference Gong, Y. (2017). A survey on the modeling and applications of cellular automata theory. Materials Science and Engineering, 242, 1–6. Gong, Y. (2017). A survey on the modeling and applications of cellular automata theory. Materials Science and Engineering, 242, 1–6.
12.
go back to reference Das, D., & Misra, R. (2011). Programmable cellular automata based efficient parallel AES encryption algorithm. International Journals of Network Security and Its Applications (IJNSA), 3(6), 197–211.CrossRef Das, D., & Misra, R. (2011). Programmable cellular automata based efficient parallel AES encryption algorithm. International Journals of Network Security and Its Applications (IJNSA), 3(6), 197–211.CrossRef
13.
go back to reference Kavehrad, M., & McLane, P. J. (1985). Performance of low complexity channel coding and diversity for spread spectrum in indoor, wireless communications. AT & T Tech. J, 64(8), 1927–1965.CrossRef Kavehrad, M., & McLane, P. J. (1985). Performance of low complexity channel coding and diversity for spread spectrum in indoor, wireless communications. AT & T Tech. J, 64(8), 1927–1965.CrossRef
14.
go back to reference Deshmukh, S., & Bhosle, U. (2016) Performance evaluation of spread spectrum system using different modulation scheme. In International conference on computational modeling and security (pp. 176–182). Deshmukh, S., & Bhosle, U. (2016) Performance evaluation of spread spectrum system using different modulation scheme. In International conference on computational modeling and security (pp. 176–182).
15.
go back to reference Mahjabeen, D. (2010). Interoperability of wireless networks with 4g based on layer modification. International Journal of Communications, Network and System Sciences, 03(05), 472–476.CrossRef Mahjabeen, D. (2010). Interoperability of wireless networks with 4g based on layer modification. International Journal of Communications, Network and System Sciences, 03(05), 472–476.CrossRef
16.
go back to reference Idrizi, F., Dalipi, F., & Rustemi, E. (2013). Analyzing the speed of combined cryptographic algorithms with secret and public key. International Journal of Engineering Research and Development, 8(2), 45–51. Idrizi, F., Dalipi, F., & Rustemi, E. (2013). Analyzing the speed of combined cryptographic algorithms with secret and public key. International Journal of Engineering Research and Development, 8(2), 45–51.
17.
go back to reference Chehal, R., & Singh, K. (2012). Efficiency and security of data with symmetric encryption algorithms. International Journal of Advanced Research in Computer Science and Software Engineering, 2(8), 472–475. Chehal, R., & Singh, K. (2012). Efficiency and security of data with symmetric encryption algorithms. International Journal of Advanced Research in Computer Science and Software Engineering, 2(8), 472–475.
18.
go back to reference Elminaam, D. S. A., Kader, H. M. A., & Mohiy Mohamed Hadhoud, M. M. (2010). Evaluating the performance of symmetric encryption algorithms. International Journal of Network Security, 10(3), 213–219. Elminaam, D. S. A., Kader, H. M. A., & Mohiy Mohamed Hadhoud, M. M. (2010). Evaluating the performance of symmetric encryption algorithms. International Journal of Network Security, 10(3), 213–219.
19.
go back to reference Su, C., Lin, T., Huang, C., & Wu, C. (2003). A high throughput low-cost AES processor. IEEE Communications Magazine, 41(12), 86–91.CrossRef Su, C., Lin, T., Huang, C., & Wu, C. (2003). A high throughput low-cost AES processor. IEEE Communications Magazine, 41(12), 86–91.CrossRef
20.
go back to reference Burr, W. E. (2003). Selecting the advanced encryption standard. Security & Privacy Magazine, IEEE., 1(2), 43–52.CrossRef Burr, W. E. (2003). Selecting the advanced encryption standard. Security & Privacy Magazine, IEEE., 1(2), 43–52.CrossRef
21.
go back to reference Kotturi, D., Yoo, S., & Blizzard, J. (2005). AES crypto chip utilizing high-speed parallel pipelined architecture. IEEE ISCAS, 5, 4653–4656. Kotturi, D., Yoo, S., & Blizzard, J. (2005). AES crypto chip utilizing high-speed parallel pipelined architecture. IEEE ISCAS, 5, 4653–4656.
22.
go back to reference Bagnoli, F., Franci, F., & Rechtman, R. (2002) Opinion formation and phase transitions in a probabilistic cellular automaton with two absorbing states. In Proceedings of fifth international conference on cellular automata for researchand industry (pp. 249–258). Bagnoli, F., Franci, F., & Rechtman, R. (2002) Opinion formation and phase transitions in a probabilistic cellular automaton with two absorbing states. In Proceedings of fifth international conference on cellular automata for researchand industry (pp. 249–258).
23.
go back to reference Billings, S. A., & Yang, Y. (2003). Identification of probabilistic cellular automata. IEEE Transaction on System, Man and Cybernetics. Part B, 33(2), 225–236.CrossRef Billings, S. A., & Yang, Y. (2003). Identification of probabilistic cellular automata. IEEE Transaction on System, Man and Cybernetics. Part B, 33(2), 225–236.CrossRef
24.
go back to reference Chattopadhyay, S., Adhikari, S., Sengupta, S., & Pal, M. (2000). Highly regular, modular, and cascadable design of cellular automata-based pattern classifier. IEEE Transaction on VLSI Systems, 8(6), 724–735.CrossRef Chattopadhyay, S., Adhikari, S., Sengupta, S., & Pal, M. (2000). Highly regular, modular, and cascadable design of cellular automata-based pattern classifier. IEEE Transaction on VLSI Systems, 8(6), 724–735.CrossRef
25.
go back to reference Das, D., & Misra, R. (2011). Programmable cellular automata based efficient parallel AES encryption algorithm. International Journal of Network Security & Its Applications (IJNSA), 3(6), 197–211.CrossRef Das, D., & Misra, R. (2011). Programmable cellular automata based efficient parallel AES encryption algorithm. International Journal of Network Security & Its Applications (IJNSA), 3(6), 197–211.CrossRef
26.
go back to reference Qadir, F., Jahan, S., & Khan, K. A. (2012). Replacement of graphics translations with two dimensional cellular automata, twenty five neighborhood model. International Journal of Computational Engineering and Management, 15(4), 33–39. Qadir, F., Jahan, S., & Khan, K. A. (2012). Replacement of graphics translations with two dimensional cellular automata, twenty five neighborhood model. International Journal of Computational Engineering and Management, 15(4), 33–39.
27.
go back to reference Rosin, P. L. (2006). Training cellular automata for image processing. IEEE Transaction on Image Processing, 15(7), 2076–2087.CrossRef Rosin, P. L. (2006). Training cellular automata for image processing. IEEE Transaction on Image Processing, 15(7), 2076–2087.CrossRef
28.
go back to reference Mitra, A., Kundu, A., Chattopadhyay, M., & Chattopadhyay, S. (2015). An analysis of equal length cellular automata (ELCA) generating linear rules for applications in distributed computing. Journal of Cellular Automata (JCA), 10(1–2), 95–117.MathSciNetMATH Mitra, A., Kundu, A., Chattopadhyay, M., & Chattopadhyay, S. (2015). An analysis of equal length cellular automata (ELCA) generating linear rules for applications in distributed computing. Journal of Cellular Automata (JCA), 10(1–2), 95–117.MathSciNetMATH
29.
go back to reference Patel, R., & Kamboj, P. (2016). Security enhancement of blowfish block cipher. In International conference on smart trends for information technology and computer communications (pp. 232–238). Patel, R., & Kamboj, P. (2016). Security enhancement of blowfish block cipher. In International conference on smart trends for information technology and computer communications (pp. 232–238).
30.
go back to reference Kuppusamy, K., & Mahalakshmi, J. (2015). A block cipher based cryptographic algorithm to enhance the data security. International Conference on Advances in Applied Engineering and Technology, 10(55), 1866–1870. Kuppusamy, K., & Mahalakshmi, J. (2015). A block cipher based cryptographic algorithm to enhance the data security. International Conference on Advances in Applied Engineering and Technology, 10(55), 1866–1870.
31.
go back to reference Blomer, J., & May, A. (2001). Low secret exponent RSA revisited. Cryptography and Lattices, International Conference, 2146(2146), 4–19.MathSciNetCrossRef Blomer, J., & May, A. (2001). Low secret exponent RSA revisited. Cryptography and Lattices, International Conference, 2146(2146), 4–19.MathSciNetCrossRef
32.
go back to reference Nandini, C., & Mohd, T. (2011). An enhanced approach for secret key algorithm based on data encryption standard. International Journal of Research And Review in Computer Science, 2(4), 943. Nandini, C., & Mohd, T. (2011). An enhanced approach for secret key algorithm based on data encryption standard. International Journal of Research And Review in Computer Science, 2(4), 943.
33.
go back to reference Banerjee A., & Kundu, A. (2020). Performance analysis of multilingual encryption for enhancing data security using cellular automata based state transition mapping: a linear approach. In IEEE, 1st international conference for convergence in engineering (pp. 458–463). Banerjee A., & Kundu, A. (2020). Performance analysis of multilingual encryption for enhancing data security using cellular automata based state transition mapping: a linear approach. In IEEE, 1st international conference for convergence in engineering (pp. 458–463).
34.
go back to reference Banerjee A., & Kundu, A. (2020). Comparative analysis of cellular automata based multilingual encryption using syndicate rules for data security. In Springer, 10th world congress on information and communication technologies. Banerjee A., & Kundu, A. (2020). Comparative analysis of cellular automata based multilingual encryption using syndicate rules for data security. In Springer, 10th world congress on information and communication technologies.
35.
go back to reference Moharrami, E., & Navimipour, N. J. (2018). Designing nanoscale counter using reversable gate based on quantum dot cellular automata. International Journal of Theoretical Physics, 57(6), 1–22.MATH Moharrami, E., & Navimipour, N. J. (2018). Designing nanoscale counter using reversable gate based on quantum dot cellular automata. International Journal of Theoretical Physics, 57(6), 1–22.MATH
36.
go back to reference Berlekamp, E., Conway, J., & Guy, R. (2003). Winning ways for your mathematical plays. Academic Press, 2(25), 817–850.MATH Berlekamp, E., Conway, J., & Guy, R. (2003). Winning ways for your mathematical plays. Academic Press, 2(25), 817–850.MATH
37.
go back to reference Cho, S. J., Choi, U. S., Doo, K. H., & Hwang, Y. H. (2007). New synthesis of one dimensional 90/150 linear hybrid group cellular automata. IEEE Transactions on Computer Aided Design of Integrated Circuit and Systems, 26(9), 1720–1724.CrossRef Cho, S. J., Choi, U. S., Doo, K. H., & Hwang, Y. H. (2007). New synthesis of one dimensional 90/150 linear hybrid group cellular automata. IEEE Transactions on Computer Aided Design of Integrated Circuit and Systems, 26(9), 1720–1724.CrossRef
38.
go back to reference Samanta, J., Bhaumik, J., & Barman, S. (2018). Compact CA-based single byte error correcting codec. IEEE Transactions on Computers, 99, 1–8.MathSciNetMATH Samanta, J., Bhaumik, J., & Barman, S. (2018). Compact CA-based single byte error correcting codec. IEEE Transactions on Computers, 99, 1–8.MathSciNetMATH
39.
go back to reference Kundu, A., Pal, A. R., Sarkar, T., Banerjee, M., Guha, S. K., Mukhopadhyay, D. (2009). Comparative study on null boundary and periodic boundary 3-neighborhood multiple attractor cellular automata for classification. In Conference on digital international management (pp. 204–209). Kundu, A., Pal, A. R., Sarkar, T., Banerjee, M., Guha, S. K., Mukhopadhyay, D. (2009). Comparative study on null boundary and periodic boundary 3-neighborhood multiple attractor cellular automata for classification. In Conference on digital international management (pp. 204–209).
40.
go back to reference Das, S., Sikdar, B. K., Pal Chaudhuri, P. (2004). Characterization of reachable/nonreachable cellular automata states. In Proceedings of sixth international conference on cellular automata for research and industry, ACRI (pp. 813–822). Das, S., Sikdar, B. K., Pal Chaudhuri, P. (2004). Characterization of reachable/nonreachable cellular automata states. In Proceedings of sixth international conference on cellular automata for research and industry, ACRI (pp. 813–822).
41.
go back to reference Das, S., & Sikdar, B. K. (2016). Classification of CA rules targeting synthesis of reversible cellular automata. In Proceedings of international conference on cellular automata for research and industry, ACRI (pp. 68–77). Das, S., & Sikdar, B. K. (2016). Classification of CA rules targeting synthesis of reversible cellular automata. In Proceedings of international conference on cellular automata for research and industry, ACRI (pp. 68–77).
42.
go back to reference Atmel. (2009). 8 Bit AVR Microcontroller with 4/8/16/32K Bytes In-System Programmable Flash. ATmega48P/V*, ATmega88P/V*, ATmega168P/V*, ATmega328P/V*. 1–426. Atmel. (2009). 8 Bit AVR Microcontroller with 4/8/16/32K Bytes In-System Programmable Flash. ATmega48P/V*, ATmega88P/V*, ATmega168P/V*, ATmega328P/V*. 1–426.
43.
go back to reference Holtek. (2009). HT12A/HT12E 212 Series of Encoders. 1–15. Holtek. (2009). HT12A/HT12E 212 Series of Encoders. 1–15.
44.
go back to reference Texas Instruments. (2013). μA7800 Series Positive-Voltage Regulators. 1–12. Texas Instruments. (2013). μA7800 Series Positive-Voltage Regulators. 1–12.
45.
go back to reference Holtek, (2002). HT12D/HT12F 212 Series of Encoders. 1–11. Holtek, (2002). HT12D/HT12F 212 Series of Encoders. 1–11.
46.
go back to reference Kim, J., Hong, S., Preneel, B., Biham, E., Dunkelman, O., & Keller, N. (2005). Related-key boomerang and rectangle attacks. In EURO-CRYPT'05, springer, 3494 of LNCS, 507–525. Kim, J., Hong, S., Preneel, B., Biham, E., Dunkelman, O., & Keller, N. (2005). Related-key boomerang and rectangle attacks. In EURO-CRYPT'05, springer, 3494 of LNCS, 507–525.
47.
go back to reference Texas Instruments. (2016). LM317 3- Terminal Adjustable Register. 1–32. Texas Instruments. (2016). LM317 3- Terminal Adjustable Register. 1–32.
48.
go back to reference Atmel Corporation. (2016). High Temperature Automotive Microcontroller Datasheet. 1–287. Atmel Corporation. (2016). High Temperature Automotive Microcontroller Datasheet. 1–287.
49.
go back to reference Holtek. (2003). HT12A/HT12E 212 Series of Encoders. 1–14. Holtek. (2003). HT12A/HT12E 212 Series of Encoders. 1–14.
50.
go back to reference Arora, M. (2012). How secure is AES against brute force attacks?. EE Times. 21. Arora, M. (2012). How secure is AES against brute force attacks?. EE Times. 21.
51.
go back to reference Manku, S., & Vasanth, K. (2015). Blowfish encryption algorithm for information security. ARPN Journal of Engineering and Applied Sciences, 10(10), 4717–4719. Manku, S., & Vasanth, K. (2015). Blowfish encryption algorithm for information security. ARPN Journal of Engineering and Applied Sciences, 10(10), 4717–4719.
52.
go back to reference Devi, A., & Ramya, B. S. (2017). Twofish algorithm implementation for lab to provide data security with predictive analysis. International Research Journal of Engineering and Technology, 04(05), 3033–3036. Devi, A., & Ramya, B. S. (2017). Twofish algorithm implementation for lab to provide data security with predictive analysis. International Research Journal of Engineering and Technology, 04(05), 3033–3036.
53.
go back to reference Saranya, V. V. (2014). A study on RSA algorithm for cryptography. International journal of Computer Science and Information technologies, 5(4), 5708–5709.MathSciNet Saranya, V. V. (2014). A study on RSA algorithm for cryptography. International journal of Computer Science and Information technologies, 5(4), 5708–5709.MathSciNet
54.
go back to reference Arya, A. (2016). Security enhancement using triple DES algorithm. International Journal of Computer Science and Mobile Computing, 6(4), 353–355. Arya, A. (2016). Security enhancement using triple DES algorithm. International Journal of Computer Science and Mobile Computing, 6(4), 353–355.
55.
go back to reference Rawal, S. (2016). Advance encryption standard (AES) and it’s working. International Research Journal of Engineering and Technology, 03(08), 1165–1169. Rawal, S. (2016). Advance encryption standard (AES) and it’s working. International Research Journal of Engineering and Technology, 03(08), 1165–1169.
Metadata
Title
Cellular Automata based Cryptography Model for Reliable Encryption Using State Transition in Wireless Network Optimizing Data Security
Authors
Ayan Banerjee
Anirban Kundu
Publication date
19-03-2021
Publisher
Springer US
Published in
Wireless Personal Communications / Issue 1/2021
Print ISSN: 0929-6212
Electronic ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-021-08243-3

Other articles of this Issue 1/2021

Wireless Personal Communications 1/2021 Go to the issue