Browse > Article
http://dx.doi.org/10.22937/IJCSNS.2022.22.8.15

A New Cryptographic Algorithm for Safe Route Transversal of Data in Smart Cities using Rubik Cube  

Chhabra, Arpit (Shobhit Institute of Engineering and Technology (Deemed University), Chaudhary Charan Singh University)
Singhal, Niraj (Shobhit Institute of Engineering and Technology (Deemed University), Chaudhary Charan Singh University)
Bansal, Manav (Shobhit Institute of Engineering and Technology (Deemed University), Chaudhary Charan Singh University)
Rizvi, Syed Vilayat (Shobhit Institute of Engineering and Technology (Deemed University), Chaudhary Charan Singh University)
Publication Information
International Journal of Computer Science & Network Security / v.22, no.8, 2022 , pp. 113-122 More about this Journal
Abstract
At the point when it is check out ourselves, it might track down various information in each turn or part of our lives. Truth be told, information is the new main thrust of our advanced civilization and in this every day, "information-driven" world, security is the significant angle to consider to guarantee dependability and accessibility of our organization frameworks. This paper includes a new cryptographic algorithm for safe route traversal for data of smart cities which is a contemporary, non-hash, non-straight, 3D encryption execution intended for having information securely scrambled in the interim having a subsequent theoretical layer of safety over it. Encryption generally takes an information string and creates encryption keys, which is the way to unscramble as well. In the interim in another strategy, on the off chance that one can sort out the encryption key, there are opportunities to unravel the information scrambled inside the information string. Be that as it may, in this encryption framework, the work over an encryption key (which is created naturally, henceforth no pre-assurance or uncertainty) just as the calculation produces a "state" in a way where characters are directed into the Rubik block design to disregard the information organization.
Keywords
Smart cities; Cyber threats; Trusted Partner module (TPM); Advanced persistent threats (APT's); Data transmission;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 Eckhoff David and Wanger Isabel, "Privacy in Smart Cities-Applications, Technologies, Challenges and Solutions", IEEE Communications Surveys and Tutorials, Vol. 20, Issue. 1, pp. 489-516, (2017).   DOI
2 Elghandour, A., Salah, A., & Karawia, A. (2021). A new cryptographic algorithm via a two-dimensional chaotic map. Ain Shams Engineering Journal.
3 Chhabra, A., and Singhal, N, "Indicator-Based Cyber Threats Detection for Data of Smart Cities Using Bio-Inspired Artificial Algae Algorithm", IJARET, Vol. 11, Issue. 11, pp. 1530-1536, (2020).
4 Adedeji Kazeem, B., & Akinlolu, P. (2014). A new hybrid data encryption and decryption technique to enhance data security in communication networks: algorithm development. International Journal of Scientific & Engineering Research, 5(10).
5 Dodge M, Kitchin R. The challenges of cybersecurity for smart cities. InCreating Smart Cities 2019 (pp. 205-216). Routledge.
6 Adedeji Kazeem B, Akinlolu P. A new hybrid data encryption and decryption technique to enhance data security in communication networks: algorithm development. International Journal of Scientific & Engineering Research. 2014 Oct;5(10).
7 Butt, Talal Ashraf, and Muhammad Afzaal. "Security and privacy in smart cities: issues and current solutions." In Smart technologies and innovation for a sustainable future, pp. 317-323. Springer, Cham, 2019.
8 Elmaghraby, A. S., andLosavio, M. M., "Cyber Security Challenges in Smart Cities: Safety, security, and privacy", Journal of advanced research, Vol.5, Issue. 4,pp. 491-497, (2014).   DOI
9 Theodorakopoulos, G. and Baras, J. S., "Game-theoretic modeling, of malicious users in collaborative networks", IEEE Journal on selected areas in communications, Vol.26, Issue. 7,pp. 1317-1327, (2008).67.   DOI
10 Zeng, D. X., Li, M., Wang, J. J., Hou, Y. L., Lu, W. J., & Huang, Z. (2018). Overview of Rubik's cube and reflections on its application in the mechanism. Chinese Journal of Mechanical Engineering, 31(1), 1-12.   DOI
11 M. Bellare, A. Desai, E. Jokipii, P. Rogaway, "A Concrete Security Treatment of Symmetric Encryption: Analysis of the DES Modes of Operation", Proceedings of the 38th Symposium on Foundations of Computer Science, IEEE, 1997.
12 Varshney, N., & Qadeer, M. A. (2012). Non-Uniform Steps Model: New Layer to Traditional Security Encryption Algorithms (Next-Generation Data Security Layer). International Journal of Engineering and Technology, 4(6), 808.   DOI
13 Dixit, P., Gupta, A. K., Trivedi, M. C., & Yadav, V. K. (2018). Traditional and hybrid encryption techniques: a survey. In Networking communication and data knowledge engineering (pp. 239-248). Springer, Singapore.
14 Belal, A. A., & Abdel-Gawad, M. A. (2001, March). 2D-encryption mode. In Second NIST Modes of Operation Workshop.