Skip to main content

Secure Data Transmission in Cyber-Physical Systems Based on the New Approach for Stream Cipher’s Gamma Generation

  • Chapter
  • First Online:
Cyber-Physical Systems

Abstract

We suggested a new approach for secure gamma generation in stream ciphers with application to secure data transmission between components of cyber-physical systems (in terms of ensuring confidentiality). Secure gamma generation is based on using a new type of pseudo-random number generator (PRNG) with linear feedback shift registers (LFSR) and fuzzy logic. We used a nonlinear combination function based on fuzzy logic for selecting the best LSFR while generating the output. We adjusted some parameters of fuzzy PRNG (FPRNG) to get the best pseudo-random sequences (gamma), which are very close to white random noise. We also studied the structure of FPRNG to select the best design that better fits the requirements of good gamma generators with application to cyber-physical systems. We showed that the suggested approach allows generating gamma sequences with better quality than many others. It makes possible using this approach in new stream ciphers and applying them to ensure confidentiality of data transmission between different components of cyber-physical systems (CPS).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 139.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 179.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 179.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Suh, S.C., Tanik, U.J., Carbone, J.N., Egorlu, A.: Applied Cyber-Physical Systems, 253 pp. Springer-Verlag, New York (2014)

    Google Scholar 

  2. Ali, S., Al Balushi, T., Nadir, Z., Hussain, O.K.: Cyber Security for Cyber-Physical Systems, 768 pp. Springer International Publishing (2018)

    Google Scholar 

  3. Kravets, A.G., Bolshakov, A.A., Schervakov, M.V. (eds.): Cyber-Physical Systems: Advances in Design & Modelling, 340 pp. Springer Nature Switzerland, (2020)

    Google Scholar 

  4. Krushel, E.A., Stepanchenko, I.V., Panfilov, A.E., Berisheva, E.D.: An experience of optimization approach application to improve the urban passenger transport structure. In: Kravets, A., Shcherbakov, M., Kultsova, M., Lijima, T. (eds.) Knowledge-Based Software Engineering, 11th Joint Conference, JCKBSE, pp. 27–39, Springer, Cham, Heidelberg, New York, Dordrecht, London (2014)

    Google Scholar 

  5. Paar, C., Peizl, J.: Understanding Cryptography, 372 pp. Springer-Verlag, Berlin, Heidelberg (2010)

    Google Scholar 

  6. Huang, S.C.H., MacCallum, D., Du D.: Network Security. Springer US, 280 p (2010)

    Google Scholar 

  7. Rueppel R.A.: Analysis and Design of Stream Ciphers, 244 pp. Berlin, Heidelberg, Springer-Verlag (1986)

    Google Scholar 

  8. Henk, C.A.V.T.: Fundamentals of Cryptology: A Professional Reference and Tutorial. The Springer International Series in Engineering and Computer Science, 2000th edition, 492 pp (1999)

    Google Scholar 

  9. Zimmermann, H.J.: Fuzzy Set Theory—And Its Applications, 2nd edn. Springer Science + Business Media, LLC, 408 pp (1991)

    Google Scholar 

  10. Trillas, E., Eciolaza, L.: Fuzzy logic, 204 pp. Springer International Publishing (2015)

    Google Scholar 

  11. Anikin, I.V., Alnajjar, K.: Fuzzy Stream Cipher System, International Siberian Conference on Control and Communications (SIBCON), Omsk, Russia (2015). https://doi.org/10.1109/sibcon.2015.7146976

  12. Anikin, I.V., Alnajjar, K.: Pseudo-random Number Generator Based on Fuzzy Logic, International Siberian Conference on Control and Communications (SIBCON), Moscow, Russia (2016). https://doi.org/10.1109/SIBCON.2016.7491667

  13. Anikin, I.V., Alnajjar, K.: Primitive Polynomials Selection Method for Pseudo-Random Number Generator Based on Fuzzy Logic. IEEE Dynamics of Systems, Mechanisms, and Machines (Dynamics), Omsk, Russia (2017)

    Google Scholar 

  14. Anikin, I.V., Alnajjar, K.: Increasing the quality of pseudo-random number generator based on fuzzy logic generator. J. Phys.: Conf. Ser. 1096(1), 012193 (2018)

    Google Scholar 

  15. Wasserstein, R.L., Lazar, N.A.: The ASA’s statement on p-values: context, process, and purpose. Am. Stat. 70(2), 129–133 (2016)

    Article  MathSciNet  Google Scholar 

  16. Knuth, D. E.: The Art of Computer Programming: Semi-numerical Algorithms, 624 pp. Addison-Wesley publishing company (1968)

    Google Scholar 

  17. Meidl, W., Niederreiter, H.: On the expected value of the linear complexity and the k-error linear complexity of periodic sequences. IEEE Trans. Inf. Theor. 48, 2817–2825 (2002)

    Article  MathSciNet  Google Scholar 

  18. Rueppel, R.A.: Analysis and Design of Stream Ciphers, 244 pp. Springer-Verlag, Berlin (1986)

    Google Scholar 

  19. Marsaglia, G.: DIEHARD: Battery of Tests of Randomness. Available: http://stat.fsu.edu/pub/diehard (1996)

  20. Rukhin, A., Soto, J., Nechvatal, J., Smid, M., Barker, E., Leigh, S., Levenson, M., Vangel, M., Banks, D., Heckert, A., Dray, J., Vo, S.: A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications. NIST Special Publication 800–22. http://csrc.nist.gov/rng/SP800-22b.pdf (2001)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Igor Anikin .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Anikin, I., Alnajjar, K. (2021). Secure Data Transmission in Cyber-Physical Systems Based on the New Approach for Stream Cipher’s Gamma Generation. In: Kravets, A.G., Bolshakov, A.A., Shcherbakov, M.V. (eds) Cyber-Physical Systems. Studies in Systems, Decision and Control, vol 350. Springer, Cham. https://doi.org/10.1007/978-3-030-67892-0_27

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-67892-0_27

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-67891-3

  • Online ISBN: 978-3-030-67892-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy