Design and Performance Assessment of Light Weight Data Security System for Secure Data Transmission in IoT

Open Access

Year : 2021 | Volume : | Issue : 1 | Page : 29-41

    Abha Jadaun

  1. Satish Kumar Alaria

  1. M.Tech. Scholar, Arya Institute of Engineering & Technology AIET, Jaipur, , India
  2. Assistant Professor, Arya Institute of Engineering & Technology AIET, Jaipur, Rajasthan, India


The Internet of Things (IoT) is expected to provide an interface for future technologies’ small processing tools. It is expected to provide more communication data and information security can risky. Data pinnacles and information security can be a risk. This size of the gadget in this engineering is essentially little, low power utilization. Many rounds of encryption are essentially a misuse of requirements Gadget vitality. Less convoluted calculation, be that as it may, conceivable compromise required uprightness. It is a 64-bit square secret key that requires a 64-bit key to encrypt information. The engineering of the calculation is a blend of feistel and a uniform substitution to supplant the system simulation. The outcomes demonstrate that the calculation gives only a considerable security five rounds of encryption. The proposed work shows the execution of symmetric key lightweight calculation forgot information transmission of pictures and text utilizing picture encryption framework just as reversible information concealing framework. Proposed research has demonstrated faster computation, less complexity and higher PSNR as compared to existing algorithms. In this research work we have executed symmetric key cryptography for different
configurations of pictures, just as continuous picture procurement framework has been planned as graphical user interface. Reversible data hiding system has also been designed for a secure data transmission system. Data hiding system is also designed for secure data transmission system.

Keywords: PSNR, Internet of Things, encryption, MSE, password, symmetric key, cloud, image processing

[This article belongs to Journal Of Network security(jons)]

How to cite this article: Abha Jadaun, Satish Kumar Alaria Design and Performance Assessment of Light Weight Data Security System for Secure Data Transmission in IoT jons 2021; 9:29-41
How to cite this URL: Abha Jadaun, Satish Kumar Alaria Design and Performance Assessment of Light Weight Data Security System for Secure Data Transmission in IoT jons 2021 {cited 2021 Apr 03};9:29-41. Available from:

Full Text PDF Download

Browse Figures


1. Mourad Talbi, Med Salim Bouhlel. Application of a Lightweight Encryption Algorithm to a Quantized Speech Image for Secure IoT.; 2018. DOI: 10.20944/preprints201802. 0096.v1.
2. Wen Zhang, Jie Men, Conglong Ma. Research progress of applying digital watermarking technology for printing. IEEE 2018 Chinese Control and Decision Conference (CCDC). 2018; 4479–4482.
3. David-Octavio Muñoz-Ramirez, Volodymyr Ponomaryo, Rogelio Reyes-Reyes, Volodymyr Kyrychenko, Oleksandr Pechenin, Alexander Totsky. A Robust Watermarking Scheme to JPEG Compression for Embedding a Color Watermark into Digital Images. IEEE 2018 IEEE 9th International Conference on Dependable Systems, Services and Technologies (DESSERT). 2018; 619–624.
4. Anirban Patra, Arijit Saha, Ajoy Kumar Chakraborty, Kallol Bhattacharya. A New Approach to Invisible Water Marking of Color Images using Alpha Blending. IEEE 2018 Emerging Trends in Electronic Devices and Computational Techniques (EDCT). 2018; 1–4.
5. Irshad Ahmad Ansari, Chang Wook Ahn, Millie Pant. On the Security of “Block-based SVD image watermarking in spatial and transform domains. IEEE 2018 International Conference on Digital Arts, Media and Technology (ICDAMT). 2018; 44–48.
6. Komarov Alexander S. Adaptive Probability Thresholding in Automated Ice and Open Water Detection from RADARSAT-2 Images. IEEE Geosci Remote Sens Lett. 2018; 15(4): 552–556.
7. Aoshuang Dong, Rui Zeng. Research and Implementation Based on Three-dimensional Model Watermarking Algorithm. IEEE 2017 International Conference on Computing Intelligence and Information System (CIIS). 2017; 277–282.
8. EnjianBai, Yiyu Yang, Xueqin Jiang. Image Digital Watermarking Based on a Novel Clock-controlled Generator. IEEE 2017 4th International Conference on Systems and Informatics (ICSAI). 2017; 1224–1228.
9. Oleg Evsutin, Roman Meshcheryakov, Viktor Genrikh, Denis Nekrasov, Nikolai Yugov. An Improved Algorithm of Digital Watermarking Based on Wavelet Transform Using Learning Automata. IEEE 2017 2nd Russia and Pacific Conference on Computer Technology and Applications (RPC). 2017; 49–53.
10. Ritu Gill, Rishi Soni. Digital Image Watermarking using 2-DCT and 2-DWT in Gray Images. IEEE 2017 International Conference on Intelligent Computing and Control Systems (ICICCS). 2017; 797–803.
11. Mohammad Shahab Goli, Alireza Naghsh. Introducing a New Method Robust Against Crop Attack In Digital Image Watermarking Using Two-Step Sudoku. IEEE 2017 3rd International Conference on Pattern Recognition and Image Analysis (IPRIA). 2017; 237–242.
12. Muhammad Usman, Irfan Ahmed, Shujaat Khan. SIT: A light weight encryption algorithm for secure internet of things. Int J Adv Comput Sci Appl. 2017; 8(1): 402–411.
13. Maria Almulhim, Noor Zaman. Proposing secure and the lightweight authentication scheme for IOT based E health applications. International conference on advance communication technology (ICACT). 2018; 1–1.
14. Muhammad Naveed Aman, Kee Chaing Chua. A light weight mutual authentication protocol for IOT system. GLOBECOM 2017-2017 IEEE Global Communications Conference. 2017; 1–6.
15. Mehdi Baahrami, Dong Li, Mukesh Singhal. Efficient parallel implementation of light weight data privacy method for cloud users. 7th international workshop on data intensive computing in clouds. 2016; 51–58.
16. Gaurav Bansod, Abhijit Patil. An Ultra light weight design for security in pervasive computing. IEEE 2nd international conference on big data security cloud. 2016; 79–84.
17. Zahid Mahmood, Huansheng Ning. Light weight two level session key management for end user authentication in internet of things. IEEE international conference on IOT. 2016; 323–327.
18. Ayaz Hassan Moon, Ummer Iqbal. Light weight authentication framework for WSN. International conference on Electrical, Electronics and Optimization techniques (ICEEOT). 2016; 3099–3105.
19. Jamuna Rani D. Light weight cryptographic algorithm for medical internet of things. Online international conference on Green Engineering and Technology (ICGET). 2016; 1–6.
20. Sudhir Satpathy, Sanu Mathew. Ultra low energy security circuits for IOT applications. IEEE 34th international conference on computer design (ICCD). 2016; 682–685.
21. Sainandan Bayya Vankata, Prabhkar Yellai. A new light weight transport method for secured transmission of data for IOT. International Journal of Electrical, Electronic Engineering. 2016; 1–6.
22. Amber Sultan, Xuelin Yang. Physical layer data encryption using chaotic constellation rotation in OFDM-PON. Proceedings of 15th International Bhurban conference on applied science and technology (IBCAST), Islamabad Pakistan. 2018.
23. Xuelin Yang, Zanwei Shen. Physical layer encryption algorithm for chaotic optical OFDM transmission against chosen plaintext attacks. In 18th International Conference on Transparent Optical Networks (ICTON). 2016; 1–5.
24. Han Chen, Xuelin Yang. Physical layer OFDM data encryption using chaotic ZCMT precoding matrix. IEEE, 19th International Conference on Transparent Optical Networks (ICTON). 2017; 1–4.
25. Gao Baojian, Luo Yongling, Hou Aiqin. New physical layer encryption algorithm based on DFT-S-OFDM system. International Conference on Mechatronic Sciences, Electric Engineering and Computer (MEC), Shenyang, China. 2013; 2018–2022.
26. Meihua Bi, Xiaosong Fu. A key space enhanced Chaotic encryption scheme for physical layer security in OFDM-PON. IEEE Photonics J. 2017; 9(1): 1–10.
27. Dana Halabi, Salam Hamdan. Enhance the security in smart home applications based on IOT-CoAP protocol. 2018 6th International Conference on Digital Information, Networking, and Wireless Communications (DINWC). 2018; 81–85.
28. Jongsoek Choi, Yongtae Shin. Study on information security sharing system among the industrial IOT service and product provider. IEEE ICOIN. 2018; 551–555.
29. Jin Hyeong Jeon, Ki-Hyung Kim. Block chain based data security enhanced IOT server platform. IEEE ICOIN. 2018; 941–944.
30. Muhammet Zekeriya Gunduz, Resul Das. A comparison of cyber security oriented test beds for IOT based smart grids. IEEE. 2016.
31. Himanshu Gupta, Garima Varshney. A security Framework for IOT devices against wireless threats. 2nd international conference on telecommunication and networks (TEL-NET). 2017; 1–6.
32. Thomas Maurin, Lurent, George Caraiman. IOT security assessment through the interfaces P-SCAN test bench platform. EDAA. 2018; 1013–1014.
33. Sanjay Kumar, Ambar Dutta. A Study on Robustness of Block Entropy Based Digital Image Watermarking Techniques with respect to Various Attacks. IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT). 2016; 1802–1806.
34. Senthil Kumaran N, Abinaya S. Comparison Analysis of Digital Image Watermarking using DWT and LSB Technique. IEEE 2016 International Conference on Communication and Signal Processing (ICCSP). 2016; 0448–0451.
35. Patil Harsha M, Rindhe Baban U. Study and Overview of Combined NSCT –DCT Digital Image Watermarking. IEEE 2016 International Conference on Global Trends in Signal Processing, Information Computing and Communication (ICGTSPICC). 2016; 302–307.

Regular Issue Open Access Article
Volume 9
Issue 1
Received March 22, 2021
Accepted March 30, 2021
Published April 3, 2021