EconPapers    
Economics at your fingertips  
 

Lightweight image encryption scheme for IoT environment and machine learning-driven robust S-box selection

Arslan Shafique, Abid Mehmood (), Moatsum Alawida, Abdul Nasir Khan and Junaid Shuja
Additional contact information
Arslan Shafique: York St John University
Abid Mehmood: Abu Dhabi University
Moatsum Alawida: Abu Dhabi University
Abdul Nasir Khan: COMSATS University Islamabad, Abbottabad Campus
Junaid Shuja: Southeast Missouri State University

Telecommunication Systems: Modelling, Analysis, Design and Management, 2025, vol. 88, issue 1, No 17, 23 pages

Abstract: Abstract The Substitution box (S-box) is pivotal in block cipher cryptosystems, as it provides critical properties of non-linearity and confusion essential for robust security. Despite the development of various S-boxes categorized by their robustness-high, medium, or low-evaluating their effectiveness manually remains labor-intensive and inefficient. This paper addresses this issue by introducing a machine learning model that leverages parameters such as bit independence criterion, nonlinearity, strict avalanche criterion, linear approximation probability, and differential uniformity to assess S-box strength automatically. Additionally, a novel lightweight image encryption scheme is proposed tailored for IoT applications that integrate these robust S-boxes alongside four advanced cryptographic techniques: chaotic maps, discrete wavelet transform, substitution box, and dynamic random phase encoding. The proposed approach significantly enhances encryption security. The proposed scheme is evaluated using both statistical and visual analyses, evaluating parameters such as entropy, correlation, chi-square analysis, energy, computational complexity analysis, and resilience to various attacks, including noise and occlusion. The scheme demonstrates exceptional security metrics, with an entropy value of 7.9991, a correlation of 0.0001, and a chi-square value of 268. Additionally, the computational complexity of the scheme is 0.08 s, indicating efficient performance. Furthermore, a detailed comparison between the proposed encryption scheme and existing methods is performed to show that the proposed approach surpasses existing schemes in terms of security and computational efficiency.

Keywords: Machine learning; Cyber security; Cryptography; S-box; Chaos (search for similar items in EconPapers)
Date: 2025
References: View references in EconPapers View complete reference list from CitEc
Citations:

Downloads: (external link)
http://link.springer.com/10.1007/s11235-024-01251-1 Abstract (text/html)
Access to the full text of the articles in this series is restricted.

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:spr:telsys:v:88:y:2025:i:1:d:10.1007_s11235-024-01251-1

Ordering information: This journal article can be ordered from
http://www.springer.com/journal/11235

DOI: 10.1007/s11235-024-01251-1

Access Statistics for this article

Telecommunication Systems: Modelling, Analysis, Design and Management is currently edited by Muhammad Khan

More articles in Telecommunication Systems: Modelling, Analysis, Design and Management from Springer
Bibliographic data for series maintained by Sonal Shukla () and Springer Nature Abstracting and Indexing ().

 
Page updated 2025-04-02
Handle: RePEc:spr:telsys:v:88:y:2025:i:1:d:10.1007_s11235-024-01251-1