Encryption time (sec).
<div><p>The Internet of Things (IoT) includes vehicles, homes, and integrated sensors and many interconnected physical devices that gather and share data to interact with their environment. Data moving across multiple levels is vulnerable to various security threats, including leaks and...
Saved in:
| Main Author: | |
|---|---|
| Other Authors: | , , , , |
| Published: |
2025
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1852016952477745152 |
|---|---|
| author | Shahnwaz Afzal (22184546) |
| author2 | Mohammad Ubaidullah Bokhari (22184549) Mahfooz Alam (14096469) Mohd Shahid Husain (22184552) Mohammad Zunnun Khan (20565234) Zubair Ashraf (22184555) |
| author2_role | author author author author author |
| author_facet | Shahnwaz Afzal (22184546) Mohammad Ubaidullah Bokhari (22184549) Mahfooz Alam (14096469) Mohd Shahid Husain (22184552) Mohammad Zunnun Khan (20565234) Zubair Ashraf (22184555) |
| author_role | author |
| dc.creator.none.fl_str_mv | Shahnwaz Afzal (22184546) Mohammad Ubaidullah Bokhari (22184549) Mahfooz Alam (14096469) Mohd Shahid Husain (22184552) Mohammad Zunnun Khan (20565234) Zubair Ashraf (22184555) |
| dc.date.none.fl_str_mv | 2025-09-04T17:51:10Z |
| dc.identifier.none.fl_str_mv | 10.1371/journal.pone.0330976.t002 |
| dc.relation.none.fl_str_mv | https://figshare.com/articles/dataset/Encryption_time_sec_/30056807 |
| dc.rights.none.fl_str_mv | CC BY 4.0 info:eu-repo/semantics/openAccess |
| dc.subject.none.fl_str_mv | Neuroscience Biotechnology Science Policy Space Science Biological Sciences not elsewhere classified Mathematical Sciences not elsewhere classified Information Systems not elsewhere classified subsequent study analyzing logistic round module correlation coefficients reinforces bit shift registers architecture &# 8217 various security threats robust cryptographic security experimental results demonstrate component significantly improves bit chaotic outputs balancing strict security proposed cipher exceeds cipher &# 8217 secure iot communication optimal performance metrics average shannon entropy proposed encryption method model improves method achieves chaotic map also demonstrate xlink "> unauthorized access two 80 successfully passing share data provides efficient produces 32 overall performance methodically eliminating key expansion integrated sensors individual effects including leaks including grain includes vehicles hence confirming enhance confusion energy efficiency decryption time decryption duration current algorithms cryptanalytic attacks constrained environments avalanche effect avalanche analysis ablation research |
| dc.title.none.fl_str_mv | Encryption time (sec). |
| dc.type.none.fl_str_mv | Dataset info:eu-repo/semantics/publishedVersion dataset |
| description | <div><p>The Internet of Things (IoT) includes vehicles, homes, and integrated sensors and many interconnected physical devices that gather and share data to interact with their environment. Data moving across multiple levels is vulnerable to various security threats, including leaks and unauthorized access. IoT faces significant challenges in balancing strict security with optimal performance metrics such as energy efficiency, throughput, and memory. We present a novel lightweight stream cipher designed to secure IoT communication and address these challenges. The proposed architecture features four main components: a logistic round module that produces 32-bit chaotic outputs; two 80-bit shift registers, LFSR and NLFSR, for key expansion; and multiplexer units to enhance confusion and diffusion. This model improves the randomness and robustness of the keystream, strengthening the cipher against cryptanalytic attacks. An ablation research is performed by methodically eliminating the chaotic map, NLFSR, and multiplexer components to assess their individual effects on encryption/decryption duration, throughput, entropy, and avalanche analysis. Experimental results demonstrate that each component significantly improves the cipher’s overall performance and security, hence confirming the architecture’s design and also demonstrate that the proposed cipher exceeds the performance of current algorithms, including Grain-128 and RSA-1024, in terms of encryption/decryption time, throughput, and energy efficiency, while maintaining comparable statistical randomness to AES and Trivium. This method achieves an average Shannon entropy of 7.9996, and successfully passing all 15 NIST statistical randomness tests. A subsequent study analyzing the avalanche effect and correlation coefficients reinforces the strength of the encryption. The proposed encryption method, designed for resource-constrained environments, provides efficient and robust cryptographic security to protect IoT data effectively.</p></div> |
| eu_rights_str_mv | openAccess |
| id | Manara_cdf57bfe95c1ac337d9eaf9bfaec4c1c |
| identifier_str_mv | 10.1371/journal.pone.0330976.t002 |
| network_acronym_str | Manara |
| network_name_str | ManaraRepo |
| oai_identifier_str | oai:figshare.com:article/30056807 |
| publishDate | 2025 |
| repository.mail.fl_str_mv | |
| repository.name.fl_str_mv | |
| repository_id_str | |
| rights_invalid_str_mv | CC BY 4.0 |
| spelling | Encryption time (sec).Shahnwaz Afzal (22184546)Mohammad Ubaidullah Bokhari (22184549)Mahfooz Alam (14096469)Mohd Shahid Husain (22184552)Mohammad Zunnun Khan (20565234)Zubair Ashraf (22184555)NeuroscienceBiotechnologyScience PolicySpace ScienceBiological Sciences not elsewhere classifiedMathematical Sciences not elsewhere classifiedInformation Systems not elsewhere classifiedsubsequent study analyzinglogistic round modulecorrelation coefficients reinforcesbit shift registersarchitecture &# 8217various security threatsrobust cryptographic securityexperimental results demonstratecomponent significantly improvesbit chaotic outputsbalancing strict securityproposed cipher exceedscipher &# 8217secure iot communicationoptimal performance metricsaverage shannon entropyproposed encryption methodmodel improvesmethod achieveschaotic mapalso demonstratexlink ">unauthorized accesstwo 80successfully passingshare dataprovides efficientproduces 32overall performancemethodically eliminatingkey expansionintegrated sensorsindividual effectsincluding leaksincluding grainincludes vehicleshence confirmingenhance confusionenergy efficiencydecryption timedecryption durationcurrent algorithmscryptanalytic attacksconstrained environmentsavalanche effectavalanche analysisablation research<div><p>The Internet of Things (IoT) includes vehicles, homes, and integrated sensors and many interconnected physical devices that gather and share data to interact with their environment. Data moving across multiple levels is vulnerable to various security threats, including leaks and unauthorized access. IoT faces significant challenges in balancing strict security with optimal performance metrics such as energy efficiency, throughput, and memory. We present a novel lightweight stream cipher designed to secure IoT communication and address these challenges. The proposed architecture features four main components: a logistic round module that produces 32-bit chaotic outputs; two 80-bit shift registers, LFSR and NLFSR, for key expansion; and multiplexer units to enhance confusion and diffusion. This model improves the randomness and robustness of the keystream, strengthening the cipher against cryptanalytic attacks. An ablation research is performed by methodically eliminating the chaotic map, NLFSR, and multiplexer components to assess their individual effects on encryption/decryption duration, throughput, entropy, and avalanche analysis. Experimental results demonstrate that each component significantly improves the cipher’s overall performance and security, hence confirming the architecture’s design and also demonstrate that the proposed cipher exceeds the performance of current algorithms, including Grain-128 and RSA-1024, in terms of encryption/decryption time, throughput, and energy efficiency, while maintaining comparable statistical randomness to AES and Trivium. This method achieves an average Shannon entropy of 7.9996, and successfully passing all 15 NIST statistical randomness tests. A subsequent study analyzing the avalanche effect and correlation coefficients reinforces the strength of the encryption. The proposed encryption method, designed for resource-constrained environments, provides efficient and robust cryptographic security to protect IoT data effectively.</p></div>2025-09-04T17:51:10ZDatasetinfo:eu-repo/semantics/publishedVersiondataset10.1371/journal.pone.0330976.t002https://figshare.com/articles/dataset/Encryption_time_sec_/30056807CC BY 4.0info:eu-repo/semantics/openAccessoai:figshare.com:article/300568072025-09-04T17:51:10Z |
| spellingShingle | Encryption time (sec). Shahnwaz Afzal (22184546) Neuroscience Biotechnology Science Policy Space Science Biological Sciences not elsewhere classified Mathematical Sciences not elsewhere classified Information Systems not elsewhere classified subsequent study analyzing logistic round module correlation coefficients reinforces bit shift registers architecture &# 8217 various security threats robust cryptographic security experimental results demonstrate component significantly improves bit chaotic outputs balancing strict security proposed cipher exceeds cipher &# 8217 secure iot communication optimal performance metrics average shannon entropy proposed encryption method model improves method achieves chaotic map also demonstrate xlink "> unauthorized access two 80 successfully passing share data provides efficient produces 32 overall performance methodically eliminating key expansion integrated sensors individual effects including leaks including grain includes vehicles hence confirming enhance confusion energy efficiency decryption time decryption duration current algorithms cryptanalytic attacks constrained environments avalanche effect avalanche analysis ablation research |
| status_str | publishedVersion |
| title | Encryption time (sec). |
| title_full | Encryption time (sec). |
| title_fullStr | Encryption time (sec). |
| title_full_unstemmed | Encryption time (sec). |
| title_short | Encryption time (sec). |
| title_sort | Encryption time (sec). |
| topic | Neuroscience Biotechnology Science Policy Space Science Biological Sciences not elsewhere classified Mathematical Sciences not elsewhere classified Information Systems not elsewhere classified subsequent study analyzing logistic round module correlation coefficients reinforces bit shift registers architecture &# 8217 various security threats robust cryptographic security experimental results demonstrate component significantly improves bit chaotic outputs balancing strict security proposed cipher exceeds cipher &# 8217 secure iot communication optimal performance metrics average shannon entropy proposed encryption method model improves method achieves chaotic map also demonstrate xlink "> unauthorized access two 80 successfully passing share data provides efficient produces 32 overall performance methodically eliminating key expansion integrated sensors individual effects including leaks including grain includes vehicles hence confirming enhance confusion energy efficiency decryption time decryption duration current algorithms cryptanalytic attacks constrained environments avalanche effect avalanche analysis ablation research |