Total views : 174
An Innovative FlipCryp Algorithm for Secured Storage in Cyber Physical System
Objectives: The Cyber-Physical System (CPS) is an integral part of modern society as most smart infrastructures are controlled by these systems. Two critically important aspects of these systems are safety and security. Confidentiality and privacy of the stored data in CPS have become a major challenge in these systems. In this paper we introduce an innovative cryptographic algorithm- FlipCryp which overcomes these challenges. Methods/Statistical Analysis: The existing encryption algorithms are well suited for text data. Since CPS contain the high volume of real-time data, classical encryption techniques are not appropriate, because most of real time data are served via the network, the encryption and decryption techniques have to take minimal time to achieve acceptable end-to-end delay. Findings: FlipCryp is an innovative idea of encryption and decryption which uses two keys for the process- the Flip key and the Cryp Key. Applications/ Improvement: The CPS systems have a human in loop, so privacy is a major concern. The proposed FlipCryp algorithm is well suited for real-time data of critical and smart infrastructures which provide high confidentiality and privacy.
Cryp Key, Cyber Physical System (CPS), FlipCryp, Flip Key.
- Halperin D, Benjamin HB, Ransford SS, Clark B, Defend AW, Morgan K, Fu T, Kohno WH, Maisel M. Pacemakers and implantable cardiac deﬁbrillators: Software radio attacks and zero-power defenses. Proceedings of IEEE Symposium on Security and Privacy; 2008.
- Han J, Jain A, Luk M, Perrig A. Don’t sweat your privacy: Using humidity to detect human presence. Proceedings of 5th International Workshop on Privacy in UbiComp (UbiPriv’07); 2007. p. 1–6.
- Madden J, McMillin B, Sinha A. Environmental obfuscation of a cyber physical system - vehicle example workshop. On 34th Annual IEEE Computer Software and Applications Conference, Washington; 2010. p. 176–81.
- Work D, Bayen A, Jacobson Q. Automotive cyber physical systems in the context of human mobility. National Workshop on High-Confidence Automotive Cyber-Physical Systems, Troy, MI; 2008. p. 1–3.
- Selvarani B. A Novice’s perception of partial homomorphic encryption schemes. Indian Journal of Science and Technology. 2016; 9(37):1–6.
- Davis R. The data encryption standard in perspective. Proceeding of Communication Society Magazine. 1978; 16(6):5–6.
- Thambiraja E, Ramesh G, Umarani R. A survey on various most common encryption techniques. International Journal of Advanced Research in Computer Science and Software Engineering. 2012: 2(7):1–8.
- Daemen J, RijmenV, Rijndael R. The advanced encryption standard. Dr. Dobb's Journal. 2001; 26(3):165–88.
- Rivest RL, Shamir A, Adleman L. A method for obtaining digital signatures and public-key cryptosystems. Communication of the ACM. 1978; 21(2):1–15.
- Kumari DA, Chandrika M, Bharadwaj BSR. Magnified cipher block chaining mode using DES to ensure data security in cloud computing. Indian Journal of Science and Technology. 2016 May; 9(17):1–7.
- Baek SS, Won YS, Han DG, Ryou JC. The effect of eight-shuffling AES implementations techniques against side channel analysis. Indian Journal of Science and Technology. 2015 Mar; 8(S5):1–7.
- Sandyarani K, Kumar PN. Extended hamming SEC-DAED-TAED based fault detection technique for AES encryption and decryption. Indian Journal of Science and Technology. 2016 Sep; 9(33):1–5.
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.