A New Cryptographic Algorithm for Safe Route Transversal of Data in Smart Cities using Rubik Cube |
Chhabra, Arpit
(Shobhit Institute of Engineering and Technology (Deemed University), Chaudhary Charan Singh University)
Singhal, Niraj (Shobhit Institute of Engineering and Technology (Deemed University), Chaudhary Charan Singh University) Bansal, Manav (Shobhit Institute of Engineering and Technology (Deemed University), Chaudhary Charan Singh University) Rizvi, Syed Vilayat (Shobhit Institute of Engineering and Technology (Deemed University), Chaudhary Charan Singh University) |
1 | Eckhoff David and Wanger Isabel, "Privacy in Smart Cities-Applications, Technologies, Challenges and Solutions", IEEE Communications Surveys and Tutorials, Vol. 20, Issue. 1, pp. 489-516, (2017). DOI |
2 | Elghandour, A., Salah, A., & Karawia, A. (2021). A new cryptographic algorithm via a two-dimensional chaotic map. Ain Shams Engineering Journal. |
3 | Chhabra, A., and Singhal, N, "Indicator-Based Cyber Threats Detection for Data of Smart Cities Using Bio-Inspired Artificial Algae Algorithm", IJARET, Vol. 11, Issue. 11, pp. 1530-1536, (2020). |
4 | Adedeji Kazeem, B., & Akinlolu, P. (2014). A new hybrid data encryption and decryption technique to enhance data security in communication networks: algorithm development. International Journal of Scientific & Engineering Research, 5(10). |
5 | Dodge M, Kitchin R. The challenges of cybersecurity for smart cities. InCreating Smart Cities 2019 (pp. 205-216). Routledge. |
6 | Adedeji Kazeem B, Akinlolu P. A new hybrid data encryption and decryption technique to enhance data security in communication networks: algorithm development. International Journal of Scientific & Engineering Research. 2014 Oct;5(10). |
7 | Butt, Talal Ashraf, and Muhammad Afzaal. "Security and privacy in smart cities: issues and current solutions." In Smart technologies and innovation for a sustainable future, pp. 317-323. Springer, Cham, 2019. |
8 | Elmaghraby, A. S., andLosavio, M. M., "Cyber Security Challenges in Smart Cities: Safety, security, and privacy", Journal of advanced research, Vol.5, Issue. 4,pp. 491-497, (2014). DOI |
9 | Theodorakopoulos, G. and Baras, J. S., "Game-theoretic modeling, of malicious users in collaborative networks", IEEE Journal on selected areas in communications, Vol.26, Issue. 7,pp. 1317-1327, (2008).67. DOI |
10 | Zeng, D. X., Li, M., Wang, J. J., Hou, Y. L., Lu, W. J., & Huang, Z. (2018). Overview of Rubik's cube and reflections on its application in the mechanism. Chinese Journal of Mechanical Engineering, 31(1), 1-12. DOI |
11 | M. Bellare, A. Desai, E. Jokipii, P. Rogaway, "A Concrete Security Treatment of Symmetric Encryption: Analysis of the DES Modes of Operation", Proceedings of the 38th Symposium on Foundations of Computer Science, IEEE, 1997. |
12 | Varshney, N., & Qadeer, M. A. (2012). Non-Uniform Steps Model: New Layer to Traditional Security Encryption Algorithms (Next-Generation Data Security Layer). International Journal of Engineering and Technology, 4(6), 808. DOI |
13 | Dixit, P., Gupta, A. K., Trivedi, M. C., & Yadav, V. K. (2018). Traditional and hybrid encryption techniques: a survey. In Networking communication and data knowledge engineering (pp. 239-248). Springer, Singapore. |
14 | Belal, A. A., & Abdel-Gawad, M. A. (2001, March). 2D-encryption mode. In Second NIST Modes of Operation Workshop. |