2022
DOI: 10.1007/s10586-022-03790-1
|View full text |Cite
|
Sign up to set email alerts
|

Lightweight encryption for privacy protection of data transmission in cyber physical systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 17 publications
(4 citation statements)
references
References 22 publications
0
4
0
Order By: Relevance
“…This algorithm can use information permutation to generate pseudo-random sequences and generate new key streams during data transmission, thereby providing protection. The results indicated that the algorithm can effectively resist any existing data attacks [9] . To solve the privacy security of mobile crowd-sourcing data, Wang W and other scholars proposed a mobile crowdsourcing federated learning system on the grounds of blockchain and edge computing.…”
Section: Related Workmentioning
confidence: 94%
See 1 more Smart Citation
“…This algorithm can use information permutation to generate pseudo-random sequences and generate new key streams during data transmission, thereby providing protection. The results indicated that the algorithm can effectively resist any existing data attacks [9] . To solve the privacy security of mobile crowd-sourcing data, Wang W and other scholars proposed a mobile crowdsourcing federated learning system on the grounds of blockchain and edge computing.…”
Section: Related Workmentioning
confidence: 94%
“…In formula(9),  represents the gradient operator. ( ) t f  represents the loss function utilized in the optimization process.…”
mentioning
confidence: 99%
“…Ensuring that these images remain confidential during transmission, safeguarding against theft or leakage has become a prominent research focus. 4 , 5 , 6 However, due to the distinctiveness of digital images, 7 , 8 , 9 such as high correlation of adjacent pixel points, scattering distribution of critical information, and high information redundancy, cryptographic protection using traditional text encryption algorithms struggles to meet real-time performance requirements. Furthermore, chaos itself exhibits inherent qualities 10 , 11 , 12 , 13 such as high sensitivity to initial conditions and control parameters, excellent pseudo-randomness, ergodicity, and long-term unpredictability of orbits, and it has many similarities with confusion, diffusion, and so on in cryptography.…”
Section: Introductionmentioning
confidence: 99%
“…The advent of lightweight ciphers (a new branch of cryptography) enables data to be effectively protected in applications with limited resources 1 . Tiwari et al 2 propose lightweight encryption for privacy protection of data transmission in cyber physical systems. There are several different approaches to developing lightweight ciphers.…”
Section: Introductionmentioning
confidence: 99%