0% found this document useful (0 votes)
21 views15 pages

IIoT Image Security Model Celestial Presentation

Iiot

Uploaded by

prettyfitmeandu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views15 pages

IIoT Image Security Model Celestial Presentation

Iiot

Uploaded by

prettyfitmeandu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 15

AN IMAGE SECURITY MODEL

BASED ON CHAOS AND DNA


CRYPTOGRAPHY FOR IIOT
IMAGES
Presented by GAURAV KUMAR
Roll No. : 2355002
INTRODUCTION

 IIoT environments involve transferring sensitive


data like images over public networks, raising
security risks.
 Problem: IIoT networks are vulnerable to cyber-
attacks; encryption of images is essential for
safe data transmission.
 Solution: Propose a cryptographic algorithm
combining chaotic maps and DNA cryptography
to secure IIoT images.
BACKGROUND ON IIOT AND
IMAGE SECURITY

 IIoT: Involves smart devices that collect and


monitor data in industries (e.g., manufacturing,
healthcare).
 Challenges: Cybersecurity risks due to open
network structure; risk of data misuse or
unauthorized access.
 Need for Lightweight Encryption: Many IIoT
devices have limited resources, requiring
efficient encryption methods.
KEY CONCEPTS IN THE
PROPOSED MODEL

 Chaos Theory: Chaos theory is applied in


cryptography due to its sensitive dependence on
initial conditions, making systems highly
unpredictable. In this paper, chaotic maps such as
the Tent Map, Chebyshev Map, and Circle Map are
used to generate pseudo-random sequences, which
form the basis of secure key generation.
 DNA Cryptography: Uses DNA sequences for
encoding data, providing high complexity for
security. It encodes binary data as DNA sequences
using nucleotide bases (A, T, C, G), providing a dense
and complex method for secure information storage.
CHAOTIC MAPS OVERVIEW

 3D Logistic Map: Introduces more dimensions


and complexity, creating stronger chaotic
sequences.
 Tent, Circle, and Chebyshev Maps: Used for
initializing and generating sequences for
encryption keys.
PROPOSED FRAMEWORK -
OVERVIEW

 Goal: Achieve a secure cryptographic


framework for IIoT image transmission.
 Phases:
 • Key Generation: Uses chaotic maps to
produce sequences.
 • Encryption: DNA encoding and XOR
operation for pixel permutation.
 • Decryption: Reverses encryption to retrieve
the original image.
PROPOSED BLOCK DIAGRAM FOR
IIOT IMAGES ENCRYPTION AND
DECRYPTION
KEY GENERATION PHASE

 Use Tent, Chebyshev, and Circle Maps for


generating initial values.
 Normalize and iterate through a 3D Logistic
Map.
 Produce chaotic sequences for dimensions X, Y,
Z, forming the encryption keys.
ENCRYPTION PHASE

 Pixel shuffling and row/column rotations.


 DNA encoding and XOR operations with the
generated key.
 Results in a highly secure, encrypted image.
DECRYPTION PHASE

 Reverse row/column rotation and DNA


decoding.
 XOR operations with the key to restore the
original image.
 Output is a decrypted image that matches the
original.
SECURITY ANALYSIS -
STATISTICAL ATTACK
RESISTANCE

 Correlation Coefficient Analysis: Shows low


correlation in encrypted images, indicating
secure encryption.
 Information Entropy: Close to 8, indicating
randomness.
 Histogram Analysis: Even pixel intensity
distribution in encrypted image, demonstrating
effective encryption.
SECURITY ANALYSIS -
DIFFERENTIAL AND
EXHAUSTIVE ATTACKS

 NPCR (Number of Pixels Change Rate): High


values indicate encryption's sensitivity to small
changes.
 UACI (Unified Average Changing Intensity): High
values indicate robustness.
 Key Space Analysis: Large key space (10^195)
prevents brute-force attacks.
EXPERIMENTAL RESULTS AND
COMPARISON

 Evaluation:
 • NPCR: 99.6566%
 • UACI: 33.4588%
 • Entropy: ~8.0
 Comparison with Other Schemes: Shows better
performance in terms of NPCR, UACI, and key
space.
CONCLUSION AND FUTURE
SCOPE

 Conclusion: The proposed framework resists


statistical, differential, and exhaustive attacks
effectively.
 Future Work: Testing in real-world IIoT
environments and exploring the use of
asymmetric cryptography.
THANK YOU

You might also like