A large number of physical objects are interconnected and accessed through the internet along with the existing
technology like cloud computing, mobile computing, wireless sensor networks and big data forms a big paradigm called the
Internet of Things (IoT). Data from remote and neglected areas are collected via wireless sensors and stored in the cloud.
Growth in the number of the sensing device and the server to which these are connected leads to many security issues and
malicious attacks. With mirai botnet and jeep hack about 150 million user’s information from MyFitnessPal nutrition app was
stolen. This paper mainly focuses on security challenges for transmitting the data in the wireless sensor network in the IoT
environment. To avoid the malicious attack, eavesdropping, algebraic attacks and other attacks a new security algorithm is
proposed based on Cellular Automata (CA) which has a key length of 80 bits and the text size is 64 bits. Reversible rules of CA
are used in this algorithm to achieve reversibility, parallelism, stability, randomness, and uniformity. The process of
encryption and decryption is performed for 15 rounds to avoid dependency between the ciphertext and the plain text. Finally,
we compare the execution time, throughput and the avalanche effect of the proposed algorithm with the existing algorithm like
Advanced Encryption Standard (AES), Height, Present algorithm. The proposed algorithm is verified to be a better choice for
lost cost and resource-restricted devices.
Cite this
Harinee Shanmuganathan and Anand Mahendran*, "Encryption Based on Cellular Automata for Wireless Devices in IoT Environment", The International Arab Journal of Information Technology (IAJIT) ,Volume 18, Number 03, pp. 87 - 95, May 2021, doi: 10.34028/iajit/18/3/11 .
@ARTICLE{2031,
author={Harinee Shanmuganathan and Anand Mahendran*},
journal={The International Arab Journal of Information Technology (IAJIT)},
title={Encryption Based on Cellular Automata for Wireless Devices in IoT Environment},
volume={18},
number={03},
pages={87 - 95},
doi={10.34028/iajit/18/3/11 },
year={1970}
}
TY - JOUR
TI - Encryption Based on Cellular Automata for Wireless Devices in IoT Environment
T2 -
SP - 87
EP - 95
AU - Harinee Shanmuganathan and Anand Mahendran*
DO - 10.34028/iajit/18/3/11
JO - The International Arab Journal of Information Technology (IAJIT)
IS - 9
SN - 2413-9351
VO - 18
VL - 18
JA -
Y1 - Jan 1970
ER -
PY - 1970
Harinee Shanmuganathan and Anand Mahendran*, " Encryption Based on Cellular Automata for Wireless Devices in IoT Environment", The International Arab Journal of Information Technology (IAJIT) ,Volume 18, Number 03, pp. 87 - 95, May 2021, doi: 10.34028/iajit/18/3/11 .
Abstract: A large number of physical objects are interconnected and accessed through the internet along with the existing
technology like cloud computing, mobile computing, wireless sensor networks and big data forms a big paradigm called the
Internet of Things (IoT). Data from remote and neglected areas are collected via wireless sensors and stored in the cloud.
Growth in the number of the sensing device and the server to which these are connected leads to many security issues and
malicious attacks. With mirai botnet and jeep hack about 150 million user’s information from MyFitnessPal nutrition app was
stolen. This paper mainly focuses on security challenges for transmitting the data in the wireless sensor network in the IoT
environment. To avoid the malicious attack, eavesdropping, algebraic attacks and other attacks a new security algorithm is
proposed based on Cellular Automata (CA) which has a key length of 80 bits and the text size is 64 bits. Reversible rules of CA
are used in this algorithm to achieve reversibility, parallelism, stability, randomness, and uniformity. The process of
encryption and decryption is performed for 15 rounds to avoid dependency between the ciphertext and the plain text. Finally,
we compare the execution time, throughput and the avalanche effect of the proposed algorithm with the existing algorithm like
Advanced Encryption Standard (AES), Height, Present algorithm. The proposed algorithm is verified to be a better choice for
lost cost and resource-restricted devices. URL: https://iajit.org/paper/2031
@ARTICLE{2031,
author={Harinee Shanmuganathan and Anand Mahendran*},
journal={The International Arab Journal of Information Technology (IAJIT)},
title={Encryption Based on Cellular Automata for Wireless Devices in IoT Environment},
volume={18},
number={03},
pages={87 - 95},
doi={10.34028/iajit/18/3/11 },
year={1970}
,abstract={A large number of physical objects are interconnected and accessed through the internet along with the existing
technology like cloud computing, mobile computing, wireless sensor networks and big data forms a big paradigm called the
Internet of Things (IoT). Data from remote and neglected areas are collected via wireless sensors and stored in the cloud.
Growth in the number of the sensing device and the server to which these are connected leads to many security issues and
malicious attacks. With mirai botnet and jeep hack about 150 million user’s information from MyFitnessPal nutrition app was
stolen. This paper mainly focuses on security challenges for transmitting the data in the wireless sensor network in the IoT
environment. To avoid the malicious attack, eavesdropping, algebraic attacks and other attacks a new security algorithm is
proposed based on Cellular Automata (CA) which has a key length of 80 bits and the text size is 64 bits. Reversible rules of CA
are used in this algorithm to achieve reversibility, parallelism, stability, randomness, and uniformity. The process of
encryption and decryption is performed for 15 rounds to avoid dependency between the ciphertext and the plain text. Finally,
we compare the execution time, throughput and the avalanche effect of the proposed algorithm with the existing algorithm like
Advanced Encryption Standard (AES), Height, Present algorithm. The proposed algorithm is verified to be a better choice for
lost cost and resource-restricted devices.},
keywords={Cellular Automata, secure data transmission, security algorithm, IOT},
ISSN={2413-9351},
month={Jan}}
TY - JOUR
TI - Encryption Based on Cellular Automata for Wireless Devices in IoT Environment
T2 -
SP - 87
EP - 95
AU - Harinee Shanmuganathan and Anand Mahendran*
DO - 10.34028/iajit/18/3/11
JO - The International Arab Journal of Information Technology (IAJIT)
IS - 9
SN - 2413-9351
VO - 18
VL - 18
JA -
Y1 - Jan 1970
ER -
PY - 1970
AB - A large number of physical objects are interconnected and accessed through the internet along with the existing
technology like cloud computing, mobile computing, wireless sensor networks and big data forms a big paradigm called the
Internet of Things (IoT). Data from remote and neglected areas are collected via wireless sensors and stored in the cloud.
Growth in the number of the sensing device and the server to which these are connected leads to many security issues and
malicious attacks. With mirai botnet and jeep hack about 150 million user’s information from MyFitnessPal nutrition app was
stolen. This paper mainly focuses on security challenges for transmitting the data in the wireless sensor network in the IoT
environment. To avoid the malicious attack, eavesdropping, algebraic attacks and other attacks a new security algorithm is
proposed based on Cellular Automata (CA) which has a key length of 80 bits and the text size is 64 bits. Reversible rules of CA
are used in this algorithm to achieve reversibility, parallelism, stability, randomness, and uniformity. The process of
encryption and decryption is performed for 15 rounds to avoid dependency between the ciphertext and the plain text. Finally,
we compare the execution time, throughput and the avalanche effect of the proposed algorithm with the existing algorithm like
Advanced Encryption Standard (AES), Height, Present algorithm. The proposed algorithm is verified to be a better choice for
lost cost and resource-restricted devices.