Secure Occupancy Monitoring System for IoT Using Lightweight Intertwining Logistic Map

Vision-based occupancy counters have a wide range of applications in resource management, queue management, and handling emergency situations. In real time scenarios, occupancy counters are connected to the Internet. However, the Internet is an insecure channel and always prone to various types of attacks. When wired or Wireless Multimedia Surveillance Networks (WMSNs) are connected to the Internet, the privacy of innocent people can also be compromised. This paper presents a secure real-time scheme for IoT systems by intelligent integration of occupancy monitoring and chaos-based lightweight image encryption. Firstly, the real-time video was used to extract video frames through the single overhead camera. When people are detected in a frame, the intelligent system encrypts the current frame and also counts the people in/out and send occupancy count information to the cloud computing platform (ThingSpeak). Several experiments and security analyses were conducted to prove the security of partially encrypted video frames. Entropy, correlation coefficient, keyspace, number of pixel change rate, unified average change intensity, and histogram analysis prove the security of the proposed video encryption scheme. Furthermore, the proposed chaos-based encryption has faster processing time and hence the scheme can provide sufficient security in low power IoT devices.

[1]  Yu Zhang,et al.  Breaking a chaotic image encryption algorithm based on perceptron model , 2011, Nonlinear Dynamics.

[2]  J. Fridrich Symmetric Ciphers Based on Two-Dimensional Chaotic Maps , 1998 .

[3]  W Wim Zeiler,et al.  Occupancy measurement in commercial office buildings for demand-driven control applications : a survey and detection system evaluation , 2015 .

[4]  Jian Shen,et al.  A lightweight multi-layer authentication protocol for wireless body area networks , 2018, Future Gener. Comput. Syst..

[5]  Xingyuan Wang,et al.  Cryptanalysis and improvement on a cryptosystem based on a chaotic map , 2009, Comput. Math. Appl..

[6]  E. Solak,et al.  Cryptanalysis of a chaos-based image encryption algorithm , 2009 .

[7]  Zhiliang Zhu,et al.  Exploiting self-adaptive permutation-diffusion and DNA random encoding for secure and efficient image encryption , 2018, Signal Process..

[8]  Xing-yuan Wang,et al.  Analysis and improvement of a chaos-based symmetric image encryption scheme using a bit-level permutation , 2014 .

[9]  Gonzalo Álvarez,et al.  Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems , 2003, Int. J. Bifurc. Chaos.

[10]  Andreas Uhl,et al.  Identifying deficits of visual security metrics for images , 2016, Signal Process. Image Commun..

[11]  Xin Zhang,et al.  A new chaotic algorithm for image encryption , 2006 .

[12]  Yun Q. Shi,et al.  An integer wavelet transform based scheme for reversible data hiding in encrypted images , 2018, Multidimens. Syst. Signal Process..

[13]  Ming Li,et al.  Cryptanalysis and Improvement of Chaos-Based Image Encryption Scheme with Circular Inter-Intra-Pixels Bit-Level Permutation , 2017 .

[14]  Wei Zhang,et al.  A chaos-based symmetric image encryption scheme using a bit-level permutation , 2011, Inf. Sci..

[15]  Lin Teng,et al.  A chaotic color image encryption using integrated bit-level permutation , 2018, Multimedia Tools and Applications.

[16]  Ercan Solak,et al.  Cryptanalysis of Chaotic Ciphers , 2011, Chaos-Based Cryptography.

[17]  Charles F. Hockett,et al.  A mathematical theory of communication , 1948, MOCO.

[18]  Chengqing Li,et al.  Cryptanalyzing image encryption using chaotic logistic map , 2013, Nonlinear Dynamics.

[19]  Sang Joon Kim,et al.  A Mathematical Theory of Communication , 2006 .

[20]  Gonzalo Álvarez,et al.  Lessons Learnt from the Cryptanalysis of Chaos-Based Ciphers , 2011, Chaos-Based Cryptography.

[21]  Z. Guan,et al.  Chaos-based image encryption algorithm ✩ , 2005 .

[22]  Xing-yuan Wang,et al.  Image encryption using genetic operators and intertwining logistic map , 2014 .