4.6 Article

A Blockchain-Based Secure Image Encryption Scheme for the Industrial Internet of Things

Journal

ENTROPY
Volume 22, Issue 2, Pages -

Publisher

MDPI
DOI: 10.3390/e22020175

Keywords

blockchain; image encryption; industrial Internet of Things; IIoT; security; privacy; image sensors; entropy analysis

Funding

  1. Institute for Information & communications Technology Promotion (IITP) - Korea government (MSIT) [2019-0-00203]
  2. Basic Science Research Program through the National Research Foundation of Korea (NRF) - Ministry of Education [NRF-2019R1I1A3A01062789]
  3. National Research Foundation of Korea [2019R1I1A3A01062789] Funding Source: Korea Institute of Science & Technology Information (KISTI), National Science & Technology Information Service (NTIS)

Ask authors/readers for more resources

Smart cameras and image sensors are widely used in industrial processes, from the designing to the quality checking of the final product. Images generated by these sensors are at continuous risk of disclosure and privacy breach in the industrial Internet of Things (IIoT). Traditional solutions to secure sensitive data fade in IIoT environments because of the involvement of third parties. Blockchain technology is the modern-day solution for trust issues and eliminating or minimizing the role of the third party. In the context of the IIoT, we propose a permissioned private blockchain-based solution to secure the image while encrypting it. In this scheme, the cryptographic pixel values of an image are stored on the blockchain, ensuring the privacy and security of the image data. Based on the number of pixels change rate (NPCR), the unified averaged changed intensity (UACI), and information entropy analysis, we evaluate the strength of proposed image encryption algorithm ciphers with respect to differential attacks. We obtained entropy values near to an ideal value of 8, which is considered to be safe from brute force attack. Encrypted results show that the proposed scheme is highly effective for data leakage prevention and security.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available