Encryption time (sec).

<div><p>The Internet of Things (IoT) includes vehicles, homes, and integrated sensors and many interconnected physical devices that gather and share data to interact with their environment. Data moving across multiple levels is vulnerable to various security threats, including leaks and...

Full description

Saved in:
Bibliographic Details
Main Author: Shahnwaz Afzal (22184546) (author)
Other Authors: Mohammad Ubaidullah Bokhari (22184549) (author), Mahfooz Alam (14096469) (author), Mohd Shahid Husain (22184552) (author), Mohammad Zunnun Khan (20565234) (author), Zubair Ashraf (22184555) (author)
Published: 2025
Subjects:
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1852016952477745152
author Shahnwaz Afzal (22184546)
author2 Mohammad Ubaidullah Bokhari (22184549)
Mahfooz Alam (14096469)
Mohd Shahid Husain (22184552)
Mohammad Zunnun Khan (20565234)
Zubair Ashraf (22184555)
author2_role author
author
author
author
author
author_facet Shahnwaz Afzal (22184546)
Mohammad Ubaidullah Bokhari (22184549)
Mahfooz Alam (14096469)
Mohd Shahid Husain (22184552)
Mohammad Zunnun Khan (20565234)
Zubair Ashraf (22184555)
author_role author
dc.creator.none.fl_str_mv Shahnwaz Afzal (22184546)
Mohammad Ubaidullah Bokhari (22184549)
Mahfooz Alam (14096469)
Mohd Shahid Husain (22184552)
Mohammad Zunnun Khan (20565234)
Zubair Ashraf (22184555)
dc.date.none.fl_str_mv 2025-09-04T17:51:10Z
dc.identifier.none.fl_str_mv 10.1371/journal.pone.0330976.t002
dc.relation.none.fl_str_mv https://figshare.com/articles/dataset/Encryption_time_sec_/30056807
dc.rights.none.fl_str_mv CC BY 4.0
info:eu-repo/semantics/openAccess
dc.subject.none.fl_str_mv Neuroscience
Biotechnology
Science Policy
Space Science
Biological Sciences not elsewhere classified
Mathematical Sciences not elsewhere classified
Information Systems not elsewhere classified
subsequent study analyzing
logistic round module
correlation coefficients reinforces
bit shift registers
architecture &# 8217
various security threats
robust cryptographic security
experimental results demonstrate
component significantly improves
bit chaotic outputs
balancing strict security
proposed cipher exceeds
cipher &# 8217
secure iot communication
optimal performance metrics
average shannon entropy
proposed encryption method
model improves
method achieves
chaotic map
also demonstrate
xlink ">
unauthorized access
two 80
successfully passing
share data
provides efficient
produces 32
overall performance
methodically eliminating
key expansion
integrated sensors
individual effects
including leaks
including grain
includes vehicles
hence confirming
enhance confusion
energy efficiency
decryption time
decryption duration
current algorithms
cryptanalytic attacks
constrained environments
avalanche effect
avalanche analysis
ablation research
dc.title.none.fl_str_mv Encryption time (sec).
dc.type.none.fl_str_mv Dataset
info:eu-repo/semantics/publishedVersion
dataset
description <div><p>The Internet of Things (IoT) includes vehicles, homes, and integrated sensors and many interconnected physical devices that gather and share data to interact with their environment. Data moving across multiple levels is vulnerable to various security threats, including leaks and unauthorized access. IoT faces significant challenges in balancing strict security with optimal performance metrics such as energy efficiency, throughput, and memory. We present a novel lightweight stream cipher designed to secure IoT communication and address these challenges. The proposed architecture features four main components: a logistic round module that produces 32-bit chaotic outputs; two 80-bit shift registers, LFSR and NLFSR, for key expansion; and multiplexer units to enhance confusion and diffusion. This model improves the randomness and robustness of the keystream, strengthening the cipher against cryptanalytic attacks. An ablation research is performed by methodically eliminating the chaotic map, NLFSR, and multiplexer components to assess their individual effects on encryption/decryption duration, throughput, entropy, and avalanche analysis. Experimental results demonstrate that each component significantly improves the cipher’s overall performance and security, hence confirming the architecture’s design and also demonstrate that the proposed cipher exceeds the performance of current algorithms, including Grain-128 and RSA-1024, in terms of encryption/decryption time, throughput, and energy efficiency, while maintaining comparable statistical randomness to AES and Trivium. This method achieves an average Shannon entropy of 7.9996, and successfully passing all 15 NIST statistical randomness tests. A subsequent study analyzing the avalanche effect and correlation coefficients reinforces the strength of the encryption. The proposed encryption method, designed for resource-constrained environments, provides efficient and robust cryptographic security to protect IoT data effectively.</p></div>
eu_rights_str_mv openAccess
id Manara_cdf57bfe95c1ac337d9eaf9bfaec4c1c
identifier_str_mv 10.1371/journal.pone.0330976.t002
network_acronym_str Manara
network_name_str ManaraRepo
oai_identifier_str oai:figshare.com:article/30056807
publishDate 2025
repository.mail.fl_str_mv
repository.name.fl_str_mv
repository_id_str
rights_invalid_str_mv CC BY 4.0
spelling Encryption time (sec).Shahnwaz Afzal (22184546)Mohammad Ubaidullah Bokhari (22184549)Mahfooz Alam (14096469)Mohd Shahid Husain (22184552)Mohammad Zunnun Khan (20565234)Zubair Ashraf (22184555)NeuroscienceBiotechnologyScience PolicySpace ScienceBiological Sciences not elsewhere classifiedMathematical Sciences not elsewhere classifiedInformation Systems not elsewhere classifiedsubsequent study analyzinglogistic round modulecorrelation coefficients reinforcesbit shift registersarchitecture &# 8217various security threatsrobust cryptographic securityexperimental results demonstratecomponent significantly improvesbit chaotic outputsbalancing strict securityproposed cipher exceedscipher &# 8217secure iot communicationoptimal performance metricsaverage shannon entropyproposed encryption methodmodel improvesmethod achieveschaotic mapalso demonstratexlink ">unauthorized accesstwo 80successfully passingshare dataprovides efficientproduces 32overall performancemethodically eliminatingkey expansionintegrated sensorsindividual effectsincluding leaksincluding grainincludes vehicleshence confirmingenhance confusionenergy efficiencydecryption timedecryption durationcurrent algorithmscryptanalytic attacksconstrained environmentsavalanche effectavalanche analysisablation research<div><p>The Internet of Things (IoT) includes vehicles, homes, and integrated sensors and many interconnected physical devices that gather and share data to interact with their environment. Data moving across multiple levels is vulnerable to various security threats, including leaks and unauthorized access. IoT faces significant challenges in balancing strict security with optimal performance metrics such as energy efficiency, throughput, and memory. We present a novel lightweight stream cipher designed to secure IoT communication and address these challenges. The proposed architecture features four main components: a logistic round module that produces 32-bit chaotic outputs; two 80-bit shift registers, LFSR and NLFSR, for key expansion; and multiplexer units to enhance confusion and diffusion. This model improves the randomness and robustness of the keystream, strengthening the cipher against cryptanalytic attacks. An ablation research is performed by methodically eliminating the chaotic map, NLFSR, and multiplexer components to assess their individual effects on encryption/decryption duration, throughput, entropy, and avalanche analysis. Experimental results demonstrate that each component significantly improves the cipher’s overall performance and security, hence confirming the architecture’s design and also demonstrate that the proposed cipher exceeds the performance of current algorithms, including Grain-128 and RSA-1024, in terms of encryption/decryption time, throughput, and energy efficiency, while maintaining comparable statistical randomness to AES and Trivium. This method achieves an average Shannon entropy of 7.9996, and successfully passing all 15 NIST statistical randomness tests. A subsequent study analyzing the avalanche effect and correlation coefficients reinforces the strength of the encryption. The proposed encryption method, designed for resource-constrained environments, provides efficient and robust cryptographic security to protect IoT data effectively.</p></div>2025-09-04T17:51:10ZDatasetinfo:eu-repo/semantics/publishedVersiondataset10.1371/journal.pone.0330976.t002https://figshare.com/articles/dataset/Encryption_time_sec_/30056807CC BY 4.0info:eu-repo/semantics/openAccessoai:figshare.com:article/300568072025-09-04T17:51:10Z
spellingShingle Encryption time (sec).
Shahnwaz Afzal (22184546)
Neuroscience
Biotechnology
Science Policy
Space Science
Biological Sciences not elsewhere classified
Mathematical Sciences not elsewhere classified
Information Systems not elsewhere classified
subsequent study analyzing
logistic round module
correlation coefficients reinforces
bit shift registers
architecture &# 8217
various security threats
robust cryptographic security
experimental results demonstrate
component significantly improves
bit chaotic outputs
balancing strict security
proposed cipher exceeds
cipher &# 8217
secure iot communication
optimal performance metrics
average shannon entropy
proposed encryption method
model improves
method achieves
chaotic map
also demonstrate
xlink ">
unauthorized access
two 80
successfully passing
share data
provides efficient
produces 32
overall performance
methodically eliminating
key expansion
integrated sensors
individual effects
including leaks
including grain
includes vehicles
hence confirming
enhance confusion
energy efficiency
decryption time
decryption duration
current algorithms
cryptanalytic attacks
constrained environments
avalanche effect
avalanche analysis
ablation research
status_str publishedVersion
title Encryption time (sec).
title_full Encryption time (sec).
title_fullStr Encryption time (sec).
title_full_unstemmed Encryption time (sec).
title_short Encryption time (sec).
title_sort Encryption time (sec).
topic Neuroscience
Biotechnology
Science Policy
Space Science
Biological Sciences not elsewhere classified
Mathematical Sciences not elsewhere classified
Information Systems not elsewhere classified
subsequent study analyzing
logistic round module
correlation coefficients reinforces
bit shift registers
architecture &# 8217
various security threats
robust cryptographic security
experimental results demonstrate
component significantly improves
bit chaotic outputs
balancing strict security
proposed cipher exceeds
cipher &# 8217
secure iot communication
optimal performance metrics
average shannon entropy
proposed encryption method
model improves
method achieves
chaotic map
also demonstrate
xlink ">
unauthorized access
two 80
successfully passing
share data
provides efficient
produces 32
overall performance
methodically eliminating
key expansion
integrated sensors
individual effects
including leaks
including grain
includes vehicles
hence confirming
enhance confusion
energy efficiency
decryption time
decryption duration
current algorithms
cryptanalytic attacks
constrained environments
avalanche effect
avalanche analysis
ablation research