Abstract-This article defines a new algorithm for a secret key cryptosystem using cellular automata which is a promising approach to cryptography. Our algorithm is based on cellular automata built on a set of reversible rules which have the ability to construct unpredictable secret keys using MARGOLUS neighborhood. To prove the feasibility of the algorithm, we present some tests of encryption, decryption and diffusion; a CPU time comparison with an encryption algorithm by blocks as for instance AES-256 is established. On the other hand, the security of the algorithm is proved and the implemented algorithm resists against a brute force attack.
In recent years, the internet of things (IoT) growth has brought about many technological changes, including the emergence of the notion of the smart city. The development of a smart city requires the integration of IoT devices and information and communication technologies to improve the quality of lives of citizens in many areas such as health, economy, business, agriculture, and transport. However, with this evolution, many cybersecurity risks and challenges have been raised, so it is necessary to develop these technologies in a protected way to avoid being compromised by attackers. Blockchain, being a new technology based on cryptographic principles, can play an important role in securing smart cities. In this survey, we discussed different applications of blockchain technology in smart cities and also studied how blockchain features (transparency, democracy, decentralization, and security) can help in the improvement of smart city services. This analysis will help us to implement an electronic voting model using a smart contract based on the Ethereum blockchain to highlight how blockchain technology can be implemented in smart cities to promote security.
Excessive demand and the urgent need for the development of smart cities, evoke the need to provide the capacity for more low-resource devices to communicate and collaborate at a distance, in order to make the concept of the internet more real and practical. For this, IETF "IPv6 over Networks of Resource-constrained Nodes" (6lo) workgroup works on equipment of all resource constrained devices by IPv6 protocol to integrate the internet. From the security point of view, this integration is not without risks, the Internet carries many dangers and current security mechanisms are very greedy for such devices. This paper analyses potential security threats in 6lo as a particular case of mobile ad hoc networks, and provides some countermeasures ideas, in particular, the two principal security defense lines: the cryptography as a first line and the intrusion detection system as the second line.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.