About
22
Publications
1,926
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
30
Citations
Introduction
Information security, wireless network security, Design Digital Electronics and VHDL Programming Circuit
Current institution
Publications
Publications (22)
This paper presents a new method for generating encryption keys for Internet of Things (IoT) devices. This method combines chaos theory with neural networks to create secure and efficient keys. We use the Lorenz chaotic system to generate complex patterns and a Convolutional Neural Network (CNN) to learn and predict these patterns. This approach is...
This paper introduces an innovative hardware implementation of the Secure Hash Algorithm (SHA-3) using three-dimensional cellular automata (3D-CA) for secure blockchain-based IoT systems. Our approach optimizes the SHA-3 algorithm by leveraging the parallel processing capabilities of 3D-CA, addressing the computational challenges in resource-constr...
The secure distribution of keys is essential to ensuring the privacy and integrity of data in Internet of Things (IoT) systems. Quantum Key Distribution (QKD) protocols, such as BB84, use principles from quantum mechanics to establish secure communication channels. However, errors that occur during the transmission of qubits can compromise the reli...
Secure Hash Algorithms (SHA) are widely used in the Internet of Things (IoT) systems for message authentication and integrity verification. However, the performance of different SHA algorithms can vary significantly in terms of Quality of Service (QoS) metrics such as area utilization, processing speed, energy efficiency, and security. In this pape...
The Internet of Things (IoT) has experienced rapid growth, resulting in a proliferation of interconnected devices in domains such as smart homes, cities, and healthcare applications. Ensuring secure communication within IoT networks is crucial for protecting privacy and data. The BB84 protocol, a quantum key distribution (QKD) protocol, shows promi...
In the realm of Internet of Things (IoT) systems, the generation of cryptographic keys is crucial for ensuring secure data transmission and device authentication. However, traditional methods of generating random keys encounter challenges about security, efficiency, and scalability, particularly when applied to resource-constrained IoT devices. To...
This paper presents a novel encryption method for the secure transmission of medical images in the Internet of Medical Things (IoMT) systems. The method combines Feedforward Neural Network (FFNN) architectures for a random key generation with a substitution function using the Sbox of the AES algorithm to ensure high-level security. The FFNNs are tr...
The Internet of Medical Things (IoMT) driven health is the most advantageous aspect of technology in the global healthcare industry. Securing medical images in IoMT systems is a great challenge to protecting medical privacy. Many cryptographic schemes that provide the confidentiality and integrity of these images over IoMT devices are proposed. The...
Cellular Automata (CAs) have been applied successfully to several physical systems, processes and scientific problems that involve local interactions, such as image processing, data encryption and byte error correcting codes. In this paper, we analyze the cellular automata, and we propose a reconfigurable cryptosystem based on 2-D Von Neumann cellu...
Security protocols and encryption algorithms are essentially based on algorithms and on Random Number Generators (RNG). In this paper, we described a single key cryptographic system based on Programmable Cellular Automata Generator (PCAG) and Stream Generators. We proposed reconfigurable architecture of PCAG. The hardware implementations of PCAG an...
The Elliptic Curve Cryptography covers all relevant asymmetric cryptographic primitives like digital signatures and key agreement algorithms. The function used for this purpose is the point multiplication KP. Where K is an integer and P is a point on an elliptic curve. In the present work, we will develop an optimized Elliptic Curve Point Multiplic...