Next Article in Journal
Portable Device for Potentiometric Determination of Antioxidant Capacity
Previous Article in Journal
Low-Latency Collaborative Predictive Maintenance: Over-the-Air Federated Learning in Noisy Industrial Environments
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Physical Layer Authenticated Image Encryption for IoT Network Based on Biometric Chaotic Signature for MPFrFT OFDM System

1
Faculty of Engineering, Delta University for Science and Technology, Gamasa 35712, Egypt
2
Department of Computer Science, Community College, King Saud University, Riyadh 11437, Saudi Arabia
3
Department of Electronics and Communications, School of Engineering, Edith Cowan University, Perth, WA 6027, Australia
*
Author to whom correspondence should be addressed.
Sensors 2023, 23(18), 7843; https://doi.org/10.3390/s23187843
Submission received: 7 August 2023 / Revised: 23 August 2023 / Accepted: 6 September 2023 / Published: 12 September 2023
(This article belongs to the Section Internet of Things)

Abstract

:
In this paper, a new physical layer authenticated encryption (PLAE) scheme based on the multi-parameter fractional Fourier transform–Orthogonal frequency division multiplexing (MP-FrFT-OFDM) is suggested for secure image transmission over the IoT network. In addition, a new robust multi-cascaded chaotic modular fractional sine map (MCC-MF sine map) is designed and analyzed. Also, a new dynamic chaotic biometric signature (DCBS) generator based on combining the biometric signature and the proposed MCC-MF sine map random chaotic sequence output is also designed. The final output of the proposed DCBS generator is used as a dynamic secret key for the MPFrFT OFDM system in which the encryption process is applied in the frequency domain. The proposed DCBS secret key generator generates a very large key space of 2 2200 . The proposed DCBS secret keys generator can achieve the confidentiality and authentication properties. Statistical analysis, differential analysis and a key sensitivity test are performed to estimate the security strengths of the proposed DCBS-MP-FrFT-OFDM cryptosystem over the IoT network. The experimental results show that the proposed DCBS-MP-FrFT-OFDM cryptosystem is robust against common signal processing attacks and provides a high security level for image encryption application.

1. Introduction

The Internet of Things (IoT) represents a modern internet phenomenon. Device recognition achieves intelligence through establishing or facilitating context-related decisions via the device transceiving information about itself. The rise of cloud computing capabilities leads to an unlimited addressing capacity. The IoT’s purpose is to allow device connectivity with anybody and anything at anytime, anywhere, and via any path/network and service. The IoT can be used in different applications such as transportation, healthcare, power grids, entertainment and smart buildings [1]. Encrypting IoT data before transferring it over wireless networks is one of the simplest and most effective ways to prevent it from being intercepted and altered. Data are converted into an unreadable format by the process of encryption, which can only be decrypted by authorized persons with the right key. IoT services require security to be at the core of everything. Physical layer security (PLS), one of the providing methods for communication security, has attracted a lot of interest from both academics and business since it can provide uncrackable, demonstrable, and quantifiable secrecy. PLS has a significant advantage over encryption since it is not dependent on computational complexity. Consequently, the degree of security attained will not be high, even if the listener has advanced computing capabilities. In contrast to a technique based on encryption, this is founded on the notion that an observer has a constrained computational ability to tackle challenging mathematical puzzles for brief intervals. For the PLS protocol design in IoT, the unique characteristics of IoT, such as cheap cost, wide-range coverage, enormous connection, and varied services impose significant problems [2]. The development of PLS solutions for IoT applications remains difficult despite the success of PLS technique research. The IoT is distinguished by four special characteristics in particular: low cost, broad coverage, high connectivity, and a variety of services. How to design PLS strategies that well match these four features remains an open problem [2].
Recently, [3] have enhanced the dynamics of constellation fluctuations between neighboring frames by utilizing the randomness in the data. The constellation is then dynamically rotated while using analog-based encryption rather than digital-based encryption, which lowers quantization loss and increases robustness to channel phase problems. The others in [4] offer an asymmetric multi-level physical layer security (PLS) scheme in which each transmitted symbol is subjected to two different types of distortion: multi-reception amplitude randomization and channel-based phase distortion. Additionally, the technique streamlines receiver design while providing a significant security advantage for authentic links. The study makes several doable, reasonable, and access-controlled suggestions in [5] for safeguarding the physical layer of the Internet of Things (IoT). The study is still going on with a specific focus on the difficulties with encrypted data. To achieve this goal, a secure approach at the physical layer that provides cryptographic features for usage in conjunction with a flexible RC6 encryption/decryption method is described.
The chaos-based PLS transmission scheme for IoT is introduced in [6]. The suggested approach successfully addresses the concerns with the extremely high PAPR of the OFDM symbols in addition to providing confidentiality of physical layer information transfer by encrypting the Discrete Fourier Transform (DFT) matrix. Additionally, it has no need for additional sideband information and, in theory, has a minimal computing complexity. A physical layer security scheme for OFDM-based IoT systems with compressed sensing is proposed in [7]. The others use a combination of compressed sensing (CS) and OFDM to increase security. Therefore, using compressed sensing, we suggest the PLSSCS physical layer security strategy for OFDM-based IoT systems. By using channel measuring rather than previously collected data, it can alleviate the drawback of key extraction. In [8], the RSA Algorithm and Constellation Encryption Design Based on Chaotic Sequence are introduced. The main goal of this technique is to construct a large number of highly secure encrypted sequences by efficiently combining chaotic sequences and RSA. The precise procedure is to communicate system parameters using the asymmetric RSA algorithm, create a secret sequence using the chaotic sequence’s initial value sensitivity, and then encrypt the original sequence using the secret sequence.
There are many physical layer encryption (PLE) schemes applied to the IoT networks. The key idea of PLE is to exploit the randomness of channels to degrade the received signal quality at the eavesdropper. Three new PLE techniques complement IoT features well and have a lot of promise for use in the future [9]. The noise aggregation and self-encryption [10,11], fountain-coding based secure transmission [12,13,14,15,16,17,18] and Self-Encryption via constellation rotation [19,20,21,22,23,24,25,26,27,28] are different examples of the PLE used in the IoT. OFDM, which has a high spectral efficiency and easy implementation, is used as a self-encryption via the constellation rotation principal. It has been incorporated into different protocols including IEEE 802.11 a/g/n, IEEE 802.16 WiMAX, the frequency domain [29,30,31], data scrambling in the time domain [32], rotation of the modulation symbols [33], and noise-enhanced constellation rotation [34,35] for many of these reasons. Research has looked at using PLE, such as constellation scrambling, to increase the security level of OFDM.
The majority of IEEE 802.11 Wi-Fi amendments, including 802.11 a, 802.11 g, 802.11 ac, 802.11 n, 802.11 ax, and 802.11 p (the protocol used in vehicle networks) [36,37,38], have embraced OFDM. High-speed Wi-Fi has recently emerged as a viable option for IoT devices due to its compatibility with existing networks. As a result, IEEE 802.11 ah [39] has been proposed as a new Wi-Fi standard for IoT systems. The basic physical layer structure of the transceiver adheres to the conventional design to maintain backward compatibility with access points and clients that support the OFDM physical layer structure despite the fact that this standard offers a number of new and enhanced features to improve power and spectral efficiency [39]. IoT applications can be categorized into two groups: low data rate applications like smart meters and high data rate applications like multimedia IoT. A number of IoT communication protocols, including NB-IoT and 802.11 ah, rely on OFDM as an effective multiple access approach to support the successful operation of high data rate IoT applications [40]. One key feature of IoT systems is their ability to support a variety of legacy and emerging communication protocols, including SigFox, cellular technology, 6LoWPAN (IPv6 Low-power Wireless Personal Area Networks (LoWPAN)), BLE (Bluetooth low energy), ZigBee, RFID (radio frequency identification), NFC (near-field communication), Z-Wave, NB-IoT (Narrow Band IoT), LoRaWAN (long-range wide area network), and Wi-SUN (wireless smart utility network) [41]. There are currently eight major categories of PLS schemes that concentrate on data confidentiality for OFDM systems: channel-based encryption [42], phase encryption [43], permutation [44,45], artificial noise (AN) and artificial fast fading (AFF) [46,47], preamble modulation [48] (Figure 1), power allocation [49], Peak-to-Average Power Reduction (PAPR) encryption [50], the frequency domain [51] and the time domain [52] are two other areas in which these techniques can be used.
Chaos-based physical layer encryption is used in OFDM-based IoT systems to achieve the phase randomization and constellation rotation in the transmitted image in both spatial and transformation domains. An investigation of the Fractional Fourier Transform (FrFT) domains is introduced in [48]. The FrFT parameters are considered as the additional keys for encryption achieving reliable cybersecurity for robust image communication. In [49], multiple fractional order chaotic systems are used in the proposed color image encrypting technique, since using multiple fractional order for image encryption considerably increases the key space and the key sensitivity. A generalization of the FrFT is the multi-parameter fractional Fourier transform (MP-FrFT). Due to the widespread use of MPFrFT in both cryptosystems [50,51,52,53,54,55], more and more academics are becoming interested in it. The authors in [56] introduce the MP-WFRFT and chaotic scrambling-assisted directional modulation technology for improving physical layer security. To realize the power-efficient and security-enhanced wireless transmissions, the directional modulation (DM) technology with multiple parameters weighted-type fractional Fourier transform (MP-WFRFT) and chaotic scrambling (CS) was developed in [56].
In 2023, a new physical layer authentication in wireless networks-based machine learning approaches is introduced in [57]. The purpose of the work given in [57] is to identify and thoroughly compare prior research on physical layer authentication. In addition to demonstrating the most recent PLA techniques, this study examined whether machine learning techniques improved wireless network security performance in physical layer authentication models. Additionally, it pointed out problems and offered lines of inquiry for further study. Researchers and security model creators interested in employing machine learning (ML) and deep learning (DL) methodologies for PLA in wireless communication systems in future research and designs will find this work to be useful. In addition, an application of machine learning techniques in medical data processing based on distributed computing and the IoT is suggested in [58]. Also, in [59], the CNN learning and offloading is used as a hybrid approach for latency and battery lifetime optimization in IoT devices. The main contributions of this research follow:
1.
New robust MCC-MF sine map is designed and analyzed.
2.
New dynamic chaotic biometric (Digital Fingerprint) signature (DCBS) generator based on the combining the biometric signature and the proposed MCC-MF sine map random chaotic sequence output is also designed.
3.
New physical layer authenticated encryption (PLAE) scheme based on the multi-parameter fractional Fourier transform—Orthogonal frequency division multiplexing (MP-FrFT-OFDM) is suggested.
This paper is organized as follows. An introduction is presented in Section 1; Section 2 presents a related preliminary basics. Section 3 presents the proposed MCC-MF sine map, Section 4 presents the proposed DCBS-MP-FrFT-OFDM cryptosystem. Section 4 presents the performance analysis and simulation results discussions of the proposed DCBS-MP-FrFT-OFDM cryptosystem. The following section is the comparison results analysis. Finally, the conclusions and future works are drawn.

2. Related Preliminary Basics

2.1. Multiple Parameters FrFT

The MPFrFT was presented with its applications and its advantages in signal processing, image encryption and communications in [60]. The a t h -order continuous FRT of x ( t ) is given by:
  X a = + x t K a ( u , t ) d t
K a u , t = 1 j c o t α · e j π ( t 2 cot α t u csc α + u 2 cot α )
where K a ( u , t ) is the transform kernel and α = a π / 2 . The matrix F is N × N D F T can be defined as:
F k , n = 1 N e j 2 π N k n , 0 k , n N 1
The DFT matrix F has only four different eigenvalues 1 , j , 1 , j . Consider S as a nearly tri-diagonal N × N matrix whose nonzero entries are S n , n = 2 cos 2 π n / N , 0 n N and S n , n + 1 = S n + 1 , n = 1 , 0 n N 2 , and S n 1,0 = S 0 , n 1 = 1 . The matrices S and F will have the same eigenvectors if they commute with the matrix F   ( S · F = F · S ) but will not have the same eigenvectors λ k = e j π k 2 . Based on the four different eigenvectors 1 , j , 1 , j , the ath-order FrFT matrix of size N × N denoted by F a is defined by [61]:
F a = V Λ a V T = k = 0 N 1 λ k a v k v k T ,       for N odd k = 0 N 2 λ k a v k v k T + λ N a v N v N T , for N even
where ( · ) T denotes the matrix transpose operation, V = v 0 v 1 v 2 · · · v N 2 v N 1 for N odd and V = v 0 v 1 v 2 · · · v N 2 v N for N even, v k is the normalized k t h -order discrete Hermite–Gaussian-like eigenvector of S, and Λ a is a diagonal matrix whose entries are λ k a with fractional order a . The MPFrFT can be defined as an extension of the FrFT with multiple parameters by replacing the order a with the vector of fraction orders a ¯ of length 1 × N which are independent fraction orders; then, the MPFrFT denoted by F a ¯ is defined as:
F a ¯ = V Λ a ¯ V T
where Λ a is given by:
Λ a = d i a g ( λ 0 a 0 , λ 1 a 1 , · · · , λ N 1 a N 1 ,                               f o r   N   o d d d i a g ( λ 0 a 0 , λ 1 a 1 , · · · , λ N 2 a N 2 , λ N a N ,       f o r   N   e v e n
In addition, this model of 1D MPFrFT can be modeled as 2D MPFrFT by using two vectors of fraction orders a ¯ and b ¯ with lengths of 1 × N and 1 × M . The two vectors of fraction orders a ¯ and b ¯ are independent fraction orders. The 2D MPFrFT can be performed by applying one 1D MPFrFT along rows followed by applying another 1D MPFrFT along columns. The 2D MPFrFT denoted by F ( a , ¯ b ¯ ) is defined as [61]:
F ( a , ¯ b ¯ ) = V Λ ( a , ¯ b ¯ ) V T
Then, the 2D MPFrFT of a 2D input P of size M × N can be defined in a row–column scheme as:
F ( a , ¯ b ¯ ) P = F ( a ¯ ) P F ( b ¯ )
The properties of the MPFrFT are given in [62]. The main advantage of the 2D MPFrFT is that the two vectors of fraction orders a ¯ and b ¯ with lengths of 1 × N and 1 × M can be used as an additional secret key for secure applications.

2.2. Biometric Authenticated Secret Key

A fingerprint can be used as a biometric property to extract digital data using a variety of methods, such as a block-based approach to create a feature vector [62]. With the help of this feature vector, code words can be created that are sufficiently random and large to be employed. The procedure includes the following steps: feature extraction, straight line attribute calculation, straight line attribute obfuscation, and production of a biometric binary string. Then, from the fingerprint image, we extract the minute points, core points, and delta points. If P is a collection of minute points, then p x , y stands for a minute point’s coordinate. A collection of minor points is denoted by the notation point p = p 1 x 1 , y 1 , p 2 x 2 , y 2 , , p k x k , y k . Miniscule points are represented by p i ( x i , y i ) ,   i = 1 , 2 , k . The core point is then represented as C p ( x c , y c ) , where x c is the x-coordinate and y c is the y-coordinate of the discovered core point “ C p “from the input fingerprint picture. Finally, when a delta point is found in a fingerprint picture, it is represented as D p ( x d , y d ) , where x d , is the discovered delta point’s x-coordinate and y d is its y-coordinate. Divide the image into small blocks and compute the straight-line properties between the points in the set ‘P’. The fingerprint image ‘I’ will be divided into a number of tiny blocks, each measuring m × m pixels, with I = p × q of all blocks.
Using all the blocks, we determine the straight-line properties when computing all straight lines from a block’s minutiae point ( p k ), which stands for the block in the i t h row and j t h column of I i j as a reference block for all other blocks’ minutiae points. Compute the length and angle of each straight line, using the Euclidean distance for length (li) and the x-axis for angle a i . Let F B represent a collection of straight-line lengths and angles for all blocks, F B = { ( l 1 , a 1 ) , ( l 2 , a 2 ) , , ( l z b , a z b ) } . Find the block I l m that contains the core point ( C P ), compute all straight lines that connect the core point ( C P ) to all other minutiae points of neighboring blocks, and then extract the core and delta points from image I. Let F C denote a set of lengths and angles of straight lines, where the size of the F B is z b . Finally, the extracted minutiae attributes contain three fields per minutiae: the x-coordinate ([1, 511]), y- coordinate ([1, 511]) and orientation θ ([0, 359]); the three parameters ( x . y . θ ) are used as a biometric minutia [63,64,65]. In [64], a high-performance fingerprint scanner and a recognition engine are both included in the FS83 serial Fingerprint Authentication Module (FS83-sFAM), which is used in order to generate 2072 bytes from three samples of different fingerprints of one user. The resultant bits are represented in hexadecimal format, which is used in authenticated and secret key generation. The biometric fingerprint image is shown in Figure 1.

3. Proposed Multi-Cascaded Chaotic Modular Fractional Sine Map (MCC-MF Sine Map)

The cascade chaotic system (CCS) is a general 1D chaotic framework for creating new nonlinear chaotic systems using any two 1D chaotic maps as seed maps; it was first introduced in [66]. Zhongyun et al. also suggested a dynamic parameter-control chaotic system (DPCCS) [67] based on the concept of the CCS. The DPCCS has a simple architecture that uses the control map’s output to dynamically modify the seed map’s parameters. CCS and DPCCS have straightforward hardware implementation, simple structures, and wildly unpredictable behavior. In this section, a new MCC-MF sine map is introduced and analyzed. The development of discrete fractional calculus allowed for the effective incorporation and capture of memory effects in nonlinear discrete temporal systems. Complex features are seen in chaotic systems with a fractional order. Assume that a sequence ρ ( n ) is given and the isolated time scale a is represented in terms of the real valued constant τ as { τ , τ + 1 , τ + 2 , , } such that ρ : τ R . The difference operator is denoted by Δ , where Δ ρ n = ρ n + 1 ρ n . Then, we summarize some of the basic definitions related to discrete fractional calculus as follows:
The fractional sum of order α ( α > 0 ) is given by [68]:
Δ τ α ρ t = 1 Γ α m = τ t α Γ t m Γ t m α + 1 ρ m , t τ + α .
The Caputo-like delta difference of order α is defined by [68]:
Δ τ α   C ρ t = Δ τ n α Δ n ρ t = 1 Γ n α m = τ t n α Γ t m Γ t m n + α + 1 Δ n ρ m , t τ + n α , n = α + 1 .
The delta fractional difference equation of order α is represented by [69]:
Δ τ α   C ρ t = f ( t + α 1 , ρ ( t + α 1 ) ) ,
The equivalent discrete fractional integral is given by [70]:
y l = ρ 0 t + 1 Γ ( α ) m = τ + n α t α Γ t m Γ t m α + 1 × f ( m + α 1 , ρ ( m + α 1 ) ) , t τ + n .
Note that the initial iteration in this case is [71]:
ρ 0 t = k = 0 n 1 Γ t τ + 1 k ! Γ t τ k + 1 Δ k ρ τ .
The non-modular fractional sine chaotic map is given by [72]:
x i = x 0 + 1 Γ v j = 1 n Γ ( i j + v ) Γ ( i j + 1 ) r 1 sin ( π r 1 )
The proposed MCC-MF sine map is designed based on the concept of a cascade chaotic system. The fractional chaotic map is given by [68,69,70,71,72] and the final mathematical model is given by:
x i = x 0 + 1 Γ   v i j = 1 n Γ ( i j + v i ) Γ ( i j + 1 ) r 1 sin ( π r 2 sin ( π r 3 sin ( π r 4 sin ( π x ( j 1 ) ) ) ) )
where r 1 , r 2 , r 3 and r 4 are the control parameters and x 0 is the initial condition of the proposed map. Using more than one parameter of the sine map gives a high Lyapunov exponent (LE) value, high chaotic range and a large key space. The block diagram of the proposed MCC-MF sine map is shown in Figure 2. The proposed MCC-MF sine map consists of four fractional chaotic sine maps connected in concatenated form with different secret parameters. The modular function is used to improve the chaotic property based on the continuity of the map output.
The effect of the fractional order on the chaotic map can be shown in Figure 3, where Figure 3a–d describe the output series, the bifurcation diagram (BD), and the Lyapunov value.
The NIST test suit, which consists of 16 statistical tests, is used to determine the randomness of the proposed MCC-MF sine map. These tests determine whether or not the created sequence is random. These tests’ primary reliance is on the probability value (p value). The significance level, which is the line separating the rejection and non-rejection regions, compares the p-value. The significant level in NIST is set at 0.01. If the p-value is less than or equal to 0.01, the sequence is not random and is rejected; if it is greater than 0.01, the sequence is random and accepted. The proposed MCC-MF sine map’s binary sequence of 10 6 bits is examined using SP800-22 [73], and the results are shown in Table 1.

4. Proposed Secure MP-FrFT-OFDM Cryptosystem

Due to their effective use of network resources and bandwidth, ability to accommodate a range of mobility scenarios, and ability to deliver high data rates, OFDM systems have demonstrated widespread success in many wireless communication applications. Thus, it is anticipated that OFDM will continue to be a crucial enabling technology in present and future systems, including 5Gs [42]. In order to deal with inter-channel interference (ICI) and inter-symbol interference (ISI) problems and permit simultaneous data transmission via band-limited channels, OFDM was first presented in the middle of the 1960s [48]. Wide frequency selective channels are, in theory, divided into a number of small, flat fading sub-bands by OFDM. Despite the fact that OFDM sub-bands are made orthogonal and independent of one another, a guard band known as the cyclic prefix (CP) is necessary to lessen the impacts of ISI and ICI. Instead of employing an empty guard space, the idea of a CP is based on adding a cyclic extension to the symbol itself. In the suggested encryption scheme, authenticated biometric features are utilized as the biometric secret key generation with the proposed MCC-MF sine map chaotic secret key generation in order to design a DCBS generator for the MPFrFT OFDM image encryption.

4.1. Proposed DCBS Generator

The design of the proposed DCBS generator is based on the secure fractional number sequence generated from the proposed MCC-MF sine map and the biometric fingerprint minutiae generated from the FS83 s-FA Module [62]. We assumed that the FS83 s-FA Module generated a sequence “T” [1, 256] with a length of 2072 bytes. The block diagram of the proposed DCBS generator is shown in Figure 4. As shown in Figure 4, the proposed DCBS generator consists of 128 secret keys, an initial condition generation, and the proposed MCC-MF-sine map. The secret key is used for initial condition generation for the proposed MCC-MF-sine map with the fractional secure parameters ( v 1   t o   v 4 ) in order to generate 2072 bytes and 512 × 512 bytes. The output of the MCC-MF-sine map is used as an input for the DCBS generator to produce two vectors a ¯ and b ¯ of sizes (1 × 256) and 256 × 256 bytes for the encryption and authentication process.
1.
The secret key (SK) of 128 bits represented by 32 hexadecimal digits “C2250EA6637F5AFAAF0654 9CCD16220A” is used to combined the biometric signature with the fractional number sequence generated from the proposed MCC-MF sine map.
2.
The secret key is divided into eight sections to generate the initial conditions and the different control parameters of the proposed MCC-MF sine map. All secret parameters and the initial condition are 10 15 decimal precision.
3.
The first eight hexadecimal digits ( k s 1 ) and the last eight hexadecimal digits number eight k s 8 are used to generate the fractional initial condition of the proposed MCC-MF sine map as:
x 0 = ( h e x 2 d e c k s 1 h e x 2 d e c k s 8 mod 1 )
4.
The first ( k s 1 ) and the second ( k s 2 ) eight hexadecimal digits are used to generate the first fractional secret control parameter ( r 1 f ) as:
r 1 f = ( h e x 2 d e c k s 1 + h e x 2 d e c k s 2     10 6 )   mod   20
5.
The next three fractional secret control parameters are given as:
r 2 f = ( h e x 2 d e c k s 3 + h e x 2 d e c k s 4     10 6 )   mod   20
r 3 f = ( h e x 2 d e c k s 5 + h e x 2 d e c k s 6     10 6 )   mod   20
r 4 f = ( h e x 2 d e c k s 7 + h e x 2 d e c k s 2     10 8 )   mod   20
6.
The proposed MCC-MF sine map given in Equation (15) is iterated t = 512 × 512 × 8 times by using the generated x 0 , r 1 f , r 2 f , r 3 f , r 4 f secret parameters and the fractional secure parameters ( v 1   t o   v 4 ).
7.
Ignore the first 1000 bits to prove the chaos property of the generated chaotic sequence. In addition, select the last 2072 bytes of the generated chaotic sequence.
8.
Concatenate the chaotic sequence output (2072 bytes) with the 2072 bytes of the biometric signature to generate the dynamic chaotic biometric signature (DCBS).
9.
Finally, randomly select 256 × 256 bytes from the iterated chaotic sequence 512 × 512 bytes for the diffusion process by Xoring with the original image and select the two different 256 vectors ( a ¯   a n d   b ¯ ), which are used as the secret multi-parameters for the confusion process in the MPFrFT OFDM transform.

4.2. Secure MP-FrFT-OFDM Based on MCC-MF Sine Map and DCBS Generator

The concept of OFDM is used in the physical layer communication based on Fast Fourier Transform (FFT). Also, the Fractional Fourier Transform (FrFT) is used in the OFDM system. The FrFT used only one parameter for the phase shift in the FFT which converts the FFT to FrFT. In the multi-parameters, FrFT used a vector of secret fractional values (0 to 1) with a length equal to the length of the FrFT for the OFDM system. In addition, the encryption process is applied in the frequency domain based on the OFDM system, which is the standard modulation used in the physical layer (IEEE 802.11 a/g/n). In this section, we suggested using the MPFrFT and the FrFT instead of the standard FFT in OFDM. The FFT–OFDM is only a multi-carrier transmission system. By using the FrFT instead FFT in OFDM, only one fraction order is used to change the phase in the output of the FrFT, which cannot satisfy any encryption properties. In this paper, the MPFrFT is used with the OFDM, where the MPFrFT has multi-parameters (ordered) equal to the length of the FrFT used, the length of MPFrFT can be 256, which means that the 256 parameters can be used as a secret key (secure multi-phase changing parameters). So, the encryption can be applied in the frequency domain without any additional equipment.
The framework of the proposed secure MP-FrFT-OFDM based on MCC-MF sine map and DCBS generator is given in Figure 5. The first step in the proposed MPFrFT OFDM image encryption based on the MCC-MF sine map and DCBS generator key is changing the input image into a binary format of ( d = 256 × 256 × 8 ) bits, d { 0 , 1 } . The second step involves applying the convolutional coding with a code rate ( R = 1 / 2 ) to the image data bits as an error-correcting code. The coded data sequence is mapped onto the QPSK-modulated symbols. Based on the proposed DCBS generator, the secret multi-parameters are generated for the MPFrFT OFDM image encryption process; finally, the cyclic prefixes are added to the output of the MPFrFT OFDM encrypted data. In the receiver, the inverse processes are used. The three steps of the proposed cryptosystem will be discussed. The proposed secure MP-FrFT-OFDM based on MCC-MF sine map and DCBS generator is shown in Figure 5.

4.3. Authenticated Encryption Scheme

The ciphering technique’s steps can be summed up as follows:
  • Read the image that was entered.
  • Convert the input image into binary format.
  • The first encryption step started with the diffusion process by Xoring, which converts the binary image data of 256 × 256 × 8 bits with the select random iterated chaotic sequence of 256 × 256 × 8 bits.
  • Apply convolutional coding for the diffusion 256 × 256 × 8 bits.
  • Apply QPSK mapping.
  • The second encryption step is the confusion process, applying the inverse MPFrFT based OFDM modulation based on the two secret fractional parameter vectors a  = 256   bytes ( a 1 , a 2 , , a 256 )
and b = 256   bytes   b 1 , b 2 , , b 256 as follows:
a = 0.9 + 1 100 i = 1 i = 256 a i
b = 0.9 + 1 100 i = 1 i = 256 b i
7.
Add the cyclic prefix (CP) to the output of the secure MP-FrFT.
8.
Send the encrypted image across an IoT channel to the recipient side.

4.4. Authenticated Decryption

The deciphering technique’s steps can be summed up as follows:
  • Receive the authenticated encrypted image data.
  • Remove the cyclic prefix (CP) from the received secure MP-FrFT.
  • The first step in the decryption is the de-confusion by applying the inverse MP-FrFT-based OFDM on the encrypted image based on the inverse two secret fractional parameter vectors a and b as follows:
a = ( 0.9 + 1 100 i = 1 i = 256 a i )
b = ( 0.9 + 1 100 i = 1 i = 256 b i )
4.
Apply QPSK de-mapping.
5.
Apply convolutional de-coding for the diffusion 256 × 256 × 8 bits.
6.
Convert the authenticated encrypted image into binary format.
7.
The second step in the decryption step is the de-diffusion by Xoring of the authenticated encrypted binary image data of 256 × 256 × 8 bits with the select random iterated chaotic sequence of 256 × 256 × 8 bits.
8.
Apply the required analysis.
Examining the impact of noise, information entropy, visual inspection, histograms, assaults, differential, and encryption quality metrics, the effectiveness and security of the proposed system are examined. The recommended picture encryption approach maintains a good security quality, according to all numerical results.

5. Performance Analysis and Results

Key space analysis, UACI, NPCR, neighboring pixel correlation analysis, and histogram analysis are only a few of the statistical and security analysis techniques used. A CT scan of the brain (medical) and other images are chosen with different standard gray-scale test images such as Cameraman, Peppers and Lena for system simulation. The test image is 256 × 256 pixels. The OFDM parameters include the following: the total number of OFDM sub-carriers is denoted by ( N s c = 256 ) , the FFT length is set to a 256 bit length, and the C P is set to a 32 bit length. The suggested system performance is tested under the AWGN channel effect at zero mean μ = 0 and at different values of noise variances, ( σ 2 = 0.01 , 0.05 , 0.10 , 0.15 , 0.20 ) . Also, the proposed system is tested under different signal processing attacks as Salt and Pepper noise and Speckle noise. Analysis of the histogram, neighboring pixel correlation, key space, NPCR, and UACI tests are examples of statistical and security analysis. The multi-secure simulation parameters are displayed in Table 2. The suggested authenticated secure image transmission system simulation parameters are also shown in Table 2 and Table 3.

5.1. Visual Quality Metrics

Remarkable indicators used in studying the encryption robustness are represented as the Key Performance Indicators (KPIs) for the proposed system. Visual quality inspection is measured in terms of BER performance and PSNR as a clarity investigation performance as well as statistical measures to evaluate the degree of encryption quantitatively. The visual quality metrics for the proposed scheme are measured in terms of BER performance and PSNR performance in the form E b N 0 v s . B E R , and E b N 0 v s . P S N R as a visual testing for the received image. Different E b N 0 values between 0 and 18 dB are used to calculate the PSNR values of the received image. Bit Error Rate (BER) is a signal quality metric that evaluates the performance of the entire system, including the transmitter, the receiver, and the medium used to connect them. BER is defined as the ratio of the number of bits received in error due to interference, noise, or other problems to the total number of bits received. In [24], the BER simple formula is defined.
B E R = Number of bit errors Total number of transferred bits
P S N R = 10 × l o g 10 f m a x 2 × M × N i = 1 M j = 1 N I i , j I i , j 2
The PSNR ratio, which is measured in decibels (dB), is regarded as a visual quality metric test of the reconstructed (decrypted) image compared to the original transmitted image [25]. The quality of the produced image will be better the higher the PSNR value. Here, f m a x 2 denotes the highest pixel value possible, I ( i , j ) denotes the original image pixel, I ( i , j ) denotes the received image pixel values, (M × N) denotes the image size, and all other variables are equal. Various images with a resolution of 256 × 256 pixels are used to test the simulation analysis for the proposed authenticated secure image transfer technique. The AWGN channel is a well-known model to indicate various random processes seen in nature; it contains a uniform power across the whole frequency band. Starting with a CT brain medical image, the proposed system behavior is examined under the AWGN channel effect at zero mean μ = 0 and over certain ranges of noise variances, σ 2 = 0.01 , 0.05 , 0.10 , 0.15 , 0.20 , as shown in Table 4.
A Salt and Pepper noise attack is when a certain amount of the pixels in the image are affected by an impulse type of noise represented by either black or white dots (hence the name of the noise), which can significantly deteriorate the quality of an image [3]. It can be used to model defects in the transmission of the image. The proposed authenticated secure image transmission scheme system is examined under Salt and Pepper noise attack; here, the noise density d = 0.02 . The B E R and P S N R performances of the proposed F F T , F r F T and M P F r F T coded OFDM schemes are tabulated at different values of E b N 0 ( 0 t o 10 d B ) in Table 5 and Table 6. The results given in Table 5 are plotted in Figure 6 and Figure 7, respectively. In Figure 6, at E b N 0 = 8 d B , the FFT-OFDM BER performance is 8.60 × 10 4 , the FrFT-OFDM BER performance is 8.21 × 10 4 and the MPFrFT-OFDM BER performance is 8.59 × 10 4 . In Figure 6, at E b N 0 = 8 d B , the FFT-OFDM PSNR performance is 30.65 d B , the FrFT-OFDM PSNR performance is 30.8548 d B and the MP-FrFT-OFDM PSNR performance is 30.6579 d B . The proposed FrFT-OFDM system gains PSNR performance improvement by about 0.1969 d B compared with the proposed MPFrFT-OFDM system, but a large key space is achieved by the MPFrFT OFDM system than the FrFT-OFDM system.
Different E b N 0 values 2 , 8 and 16 d B are chosen in Table 7 in order to highlight the visual quality metric performance of the proposed systems under the Salt and Pepper noise effect. In medical ultrasound imaging, Speckle is a granular interference that inherently exists in and degrades the quality of the medical images. It results from the coherence of backscattered signals from various distributed targets [4].
Table 8 presents both B E R and P S N R metrics performance for the proposed F F T , F r F T and M P F r F T coded OFDM systems at different values of E b N 0 ( 0 d B t o 16 d B ) under Speckle noise attack. Speckle noise is represented as a multiplicative noise to the brain medical test image, using uniformly distributed random noise with zero mean, μ = 0 and variance, δ 2 = 0.02 . The results in Table 8 are plotted in Figure 8 and Figure 9 in order to clarify the Speckle noise attack effect on the proposed authenticated secure medical image transmission schemes. BER calculations were obtained for the introduced F F T , F r F T and M P F r F T coded OFDM systems at E b N 0 = 8 d B ; the BER values are 3.70 × 10 8 , 0 , and 3.11 × 10 4 respectively. At the same E b N 0 = 8 d B , the PSNR performance values are 75.1229 d B , I n f d B , and 54.1514 d B respectively. Then, at E b N 0 8.50 d B , the proposed systems provide the highest B E R and P S N R performance ( 0 B E R a n d I n f P S N R ) . Speckle noise is represented as a multiplicative noise to the brain medical test image, using uniformly distributed random noise with zero mean, μ = 0 and variance, δ 2 = 0.02 . In addition, Table 9 shows the B E R and P S N R performance for FFT, FrFT, and MPFrFT coded OFDM over Speckle noise attack at δ 2 = 0.02 at E b N 0 = 2 , 8 , 8.50 d B .

5.2. Encryption Quality Metrics

Encryption quality metrics for the proposed scheme are measured using deferential attack analysis, correlation analysis, histogram analysis, entropy analysis and key space analysis.

5.2.1. Deferential Attack Analysis

The number of pixels change rate (also known as the NPCR) and unified average changing intensity (also known as the UACI) are two frequently used tests that were used to evaluate the sensitivity of the encrypted image. To strengthen resistance to the differential attack, each small change to the plain image should result in a significant disruption of the cipher image. Consider C 1 and C 2 , two cypher pictures for two planar images p 1 and p 2 , which only differ by one pixel. C 1 ( i , j ) and C 2 ( i , j ) are the gray-scale pixel values of the two images C 1 and C 2 , respectively. The NPCR and UACI are defined as [13]:
N P C R = i = 1 N j = 1 M D ( i , j ) M N 100 %
U A C I = 1 M N i = 1 N j = 1 M C 1 i , j C 2 ( i , j ) 2 n 1 100
where D ( i , j ) is an identical-sized bipolar array to the cypher picture that is described as:
D   ( i ,   j ) = 1   i f   C 1 i , j C 2 ( i , j ) 0   i f   C 1 i , j = C 2 ( i , j )  
In the simple images, p i is the value of the initial pixel. Without modifying any other values, it is changed to p i = ( p i + 100) m o d 256 to obtain a second image and encrypt the two images in order to calculate the NPCR and UACI values of the two encoded images. Table 10 and Table 11 display the findings of the NPCR and UACI for the proposed MP-FrFT, FrFT-coded OFDM using Cameraman, Peppers and Boat standard gray-scale test images. Table 10 and Table 11 shows the N P C R and U A C I the comparison among the proposed MPFrFT and FrFT-coded OFDM using Cameraman, Peppers and Boat standard gray-scale test images

5.2.2. Correlation Analysis

Correlation is defined as a statistical relationship that measures the relativity between two variables. The correlation between the original image and encrypted image is measured between two vertically adjacent pixels: a plain image/cipher image, respectively [4]. If the correlation coefficient values are closer to 1 , it reflects highly dependent variables between the original and deciphered image (i.e., good decryption quality). If the correlation coefficients are closer to 0 , it refers to highly independent variables between the original and cipher image (i.e., totally different, no features between original image and encrypted one, high-quality encryption algorithm). Smaller values of the correlation coefficients assess a successful encryption/decryption process. The correlation between original and encrypted images for the proposed systems MPFrFT and FrFT are tabulated in Table 12. These correlation coefficient values ensure the immunity of the proposed schemes. The correlation coefficient r x y is defined as [3]:
r x y = C o v ( x , y ) σ x × σ y
C o r r = i = 1 N ( x i E x ) ( x y E y ) ( x i E x ) 2 × ( x i E x ) 2 ,
where E x = 1 N × i = 1 N x i , x , y are the gray-scale pixel values of the source and enciphered images.

5.2.3. Histogram Analysis

The definition of a histogram is a statistical graphical distribution of each discrete intensity level (also known as a “gray level”) in a digital image into user-specified ranges. It displays the gray scale, the density of the gray-level distribution, the average luminance of an image, picture contrast, and so on. The histogram’s horizontal axis displays the potential intensity values, while the vertical axis displays the number of pixels for each of these intensities [5]. The proposed MPFrFT and FrFT-coded OFDM ciphering approaches reflect identical histograms of the relevant source images, according to the reported histogram analysis. As a result, an encrypted image’s statistical metrics are the same as those of the matching source image. Table 13 shows the histogram analysis for the proposed MPFrFT-coded OFDM using Cameraman, Peppers and Boat standard gray-scale test images.

5.2.4. Key Space Analysis

The total number of unique keys that can be utilized in the encryption process is calculated by the key space. If the length of each initial value or control parameter is set to 16 decimals, the secret keys for the proposed encryption consist of eight initial values ( x 0 1 ) valid in the range of [0, 1] and four control parameters ( r 1 , r 2 ,…, r 4 ) valid in the range of 0.1 to 20. The key space determines the total number of distinct keys that can be used in the encryption process. The secret keys for the suggested encryption consist of eight starting values ( x 0 1 ) valid in the range of [0, 1] and four control parameters ( r 1 , r 2 ,…, r 4 ) valid in the range of 0.1 to 20 if the length of each initial value or control parameter is set to 16 decimals. It is possible to determine the entire complexity (total key space) as follows: 10 15 × 10 15 × 10 15 × 10 15 × 10 15 = 10 4 × 15 = 10 60 . The key space of an image of size 256 × 256 is 256 × 256 × 2 8 = 4× 10 5 . In addition, the multi-parameter a ¯ and b ¯ has a key space for a ¯ = 10 15 × 256   and for b ¯ =   10 15 × 256 , so the total multi-parameter key space for the MP-FrFT-OFDM is equal to 10 7680 . Finally, the total key space of the proposed cryptosystem can be calculated as 10 60 × 4 × 10 5 × 10 7680 = 4 × 10 7745 = 2 2200 . The findings showed that the key space of our approach is very vast, preventing all sorts of brute force assaults. The key space of the proposed algorithm is more than 2 100 . The findings and analyses of the important space analysis are presented in Figure 10.

5.2.5. Entropy Analysis

The unpredictability of the received image is calculated using entropy, which is a measure of uncertainty in the cyphered image. Strong randomness and strong confidentiality are signs that the encoded image has high entropy [13]. One definition of entropy in an information system reads like follows:
H ( m ) = i = 0 2 N 1 p ( m i ) l o g 2 p ( m i )
where “m” is the information source, the symbol “ m i ” is represented by N total bits, it has a probability of p ( m i ) , and the optimal information entropy value is close to 8. The entropy result based on the proposed algorithm is 7.9999.

5.2.6. Key Sensitivity Analysis

A strong encryption system should be highly sensitive to even the smallest alteration to the secret keys [13]. Assume the control settings and beginning values that are used to encrypt plain photos ( x 0 1 ) and ( r 1 , r 2 ,…, r 4 ) in order to test the key sensitivity. Use the new key to decode the image after the encryption process by adding 10 16 to any beginning condition or control parameter. As a result, Figure 11 shows the key sensitivity test demonstrates how sensitive the proposed encryption system is to the security key. That indicates the least amount of secret key modification during the decoding procedure. The outcome will be an image that is entirely unencrypted.

6. Comparative Analysis

In this section, the performance comparison between the proposed cryptosystem results and other methods described in the literature for the Lena image of size 256 × 256 is shown in Table 14. The comparison between the proposed cryptosystem and the other recent methods is based on different criteria such as key space, entropy, correlation, NPCR and UACI. As shown in Table 14, whether the proposed DCBS-MP-FrFT-OFDM cryptosystem has the capacity to withstand various attacks is evaluated in order to determine the encryption system’s strength. The proposed method for evaluating it was put through a safety check, which included discussions of the histogram, entropy, correlation coefficient, NPCR, UACI, and NIST randomness tests.

7. Conclusions

A new physical layer authenticated encryption (PLAE) technique focused on the multi-parameter fractional Fourier transform–orthogonal frequency division multiplexing (MP-FrFT-OFDM) is proposed in this paper for secure image transmission over public IoT networks. This paper designs and studies a new, robust multi-cascaded chaotic modular fractional sine map (MCC-MF sine map). A novel dynamic chaotic biometric (Digital Fingerprint) signature (DCBS) generator based on combining the biometric signature and the suggested MCC-MF sine map random chaotic sequence output is also devised. It is based on the proposed MCC-MF sine map random chaotic sequence output. For the multi-parameter fractional Fourier transform in the OFDM system, which studies the encryption process in the frequency domain, the suggested DCBS generator’s output is used as a dynamic secret key. The suggested DCBS secret key generator is used to satisfy the secrecy and authentication features. The proposed DCBS-MP-FrFT-OFDM cryptosystem over IoT network’s security strengths are tested using statistical analysis, differential analysis, and key sensitivity analysis. The suggested proposed DCBS-MP-FrFT-OFDM cryptosystem’s ability to withstand various attacks is tested in order to gauge how strong the encryption system is. The suggested approach for evaluating it was subjected to a safety examination, which covered discussions of the histogram, entropy, correlation coefficient, NPCR, UACI, and NIST randomness tests.
This study adds to the body of literature by further examining the flaws of using the MPFrFT as two dimensions with multi-parameters of the FrFT, which increase the secret key space based on multi-phase shifting strategy in OFDM. The proposed DCBS-MP-FrFT-OFDM cryptosystem does not need any additional equipment, except the OFDM is replaced by MP-FrFT-OFDM and an external two-dimensional multi-parameters DCBS generator. The DCBS generator generates the all the secret keys in the proposed cryptosystem. In addition, the limitations of the proposed MPFrFT-OFDM scheme include that the two secret vectors can be optimized in order to improve the BER performance. On the other hand, for the security analysis, the MPFrFT OFDM has a very large key space as discussed in the key space analysis compared with other systems.
In the future, we will propose a brand-new deep CNN that can produce a digital signature in order to satisfy the identity property. Additionally, a digital deep CNN signcryption system can be created to combine the encryption and digital signature. Future studies could also concentrate on watermarking, data hiding in encrypted images, and stream video encryption and decoding. It will also be advised to use a new Deep Convolutional Neural Network for a compression–encryption system. Also, in future work, different optimization schemes can be used to optimize the selection of the two vectors a ¯ and b ¯ with a size of 1 × 256 fractional numbers in the range of (0 to 1) to improve the BER performance of the proposed MPFrFT OFDM.

Author Contributions

Conceptualization, E.A.A.H., S.A., H.K. and T.M.H.; methodology, E.A.A.H. and T.M.H.; software, E.A.A.H. and T.M.H.; validation, E.A.A.H., S.A., H.K. and T.M.H.; formal analysis, E.A.A.H., S.A., H.K. and T.M.H.; writing—original draft preparation, E.A.A.H. and T.M.H.; writing—review and editing, E.A.A.H., S.A., H.K. and T.M.H.; visualization, E.A.A.H.; supervision, E.A.A.H. and T.M.H.; project administration, S.A. and H.K.; funding acquisition, S.A. All authors have read and agreed to the published version of the manuscript.

Funding

This research is funded by the King Saud University under project number RSP2023R260.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Acknowledgments

The authors would like to extend their gratitude to King Saud University (Riyadh, Saudi Arabia) for funding this research through Researchers Supporting Project number (RSP2023R260).

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Gloukhovtsev, M. IOT Security: Challenges, Solutions & Future Prospects; Knowledge Sharing Article; Dell Inc.: Round Rock, TX, USA, 2018. [Google Scholar]
  2. Srhir, A.; Mazri, T.; Mohammed, B. Security in the IoT: State-of-the-Art, Issues, Solutions, and Challenges. Int. J. Adv. Comput. Sci. Appl. 2023, 14, 65–75. [Google Scholar] [CrossRef]
  3. Hou, Y.; Li, G.; Dang, S.; Hu, L.; Hu, A. Physical Layer Encryption Scheme Based on Dynamic Constellation Rotation. In Proceedings of the 2022 IEEE 96th Vehicular Technology Conference (VTC2022-Fall), London, UK, 26–29 September 2022. [Google Scholar] [CrossRef]
  4. Salman, H.; Arslan, H. PLS-IoT Enhancement against Eavesdropping via Spatially Distributed Constellation Obfuscation. IEEE Wireless Commun. Lett. 2023, 25, 1–8. [Google Scholar] [CrossRef]
  5. Ashraf, A.M.; Elmedany, W.M.; Sharif, M.S. Secure IoT Data Transmission at Physical Layer using RC6 Encryption Technique. In Proceedings of the 2022 9th International Conference on Future Internet of Things and Cloud (FiCloud), Online, 22–24 August 2022. [Google Scholar] [CrossRef]
  6. Liu, J.; Ren, A.; Sun, R.; Du, X.; Guiza, M. A Novel Chaos-Based Physical Layer Security Transmission Scheme for Internet of Things. In Proceedings of the 2019 IEEE Global Communications Conference (GLOBECOM), Waikoloa, HI, USA, 9–13 December 2019. [Google Scholar]
  7. Liu, J.; Hu, Q.; Sun, R.; Du, X.; Guizani, M. A Physical Layer Security Scheme with Compressed Sensing in OFDM-based IoT Systems. In Proceedings of the ICC 2020—2020 IEEE International Conference on Communications (ICC), Dublin, Ireland, 7–11 June 2020. [Google Scholar] [CrossRef]
  8. Quan, M.; Jin, Q.; Ba, B.; Zhang, J.; Jian, C. Constellation Encryption Design Based on Chaotic Sequence and the RSA Algorithm. Electronics 2022, 11, 3346. [Google Scholar] [CrossRef]
  9. Sun, L.; Du, Q. A Review of Physical Layer Security Techniques for Internet of Things: Challenges and Solutions. Entropy 2018, 20, 730. [Google Scholar] [CrossRef] [PubMed]
  10. Hussain, M.; Du, Q.; Sun, L.; Ren, P. Security enhancement for video transmission via noise aggregation in immersive systems. Multimed. Tools Appl. 2016, 75, 5345–5357. [Google Scholar] [CrossRef]
  11. Sun, L.; Xu, H. Unequal secrecy protection for untrusted two-way relaying systems: Constellation overlapping and noise aggregation. IEEE Trans. Veh. Technol. 2018, 67, 9681–9695. [Google Scholar] [CrossRef]
  12. Luby, M. LT codes. In Proceedings of the 43rd IEEE Annual Symposium on Foundations of Computer Science, Vancouver, BC, Canada, 16–19 November 2002; Volume 1, pp. 271–280. [Google Scholar]
  13. Byers, J.; Luby, M.; Mitzenmacher, M. A digital fountain approach to asynchronous reliable multicast. IEEE J. Sel. Areas Commun. 2002, 20, 1528–1540. [Google Scholar] [CrossRef]
  14. Zhang, X.; Du, Q. Adaptive low-complexity erasure-correcting code-based protocols for QoS-driven mobile multicast services over wireless networks. IEEE Trans. Veh. Technol. 2006, 55, 1633–1647. [Google Scholar] [CrossRef]
  15. Shokrollahi, A. Rapter codes. IEEE Trans. Inf. Theory 2006, 52, 2551–2567. [Google Scholar] [CrossRef]
  16. Nonenmacher, J.; Biersack, E.; Towsley, D. Partity-based loss recovery for reliable multicast transmission. IEEE/ACM Trans. Netw. 1998, 6, 349–361. [Google Scholar] [CrossRef]
  17. MacKay, D. Fountain codes. IEE Proc. Commun. 2005, 152, 1062–1068. [Google Scholar] [CrossRef]
  18. Niu, H.; Iwai, M.; Sezaki, K.; Sun, L.; Du, Q. Exploiting fountain codes for secure wireless delivery. IEEE Commun. Lett. 2014, 18, 777–780. [Google Scholar] [CrossRef]
  19. Boutros, J.; Viterbo, E. Signal space diversity: A power- and bandwidth-efficient diversity technique for the Rayleigh fading channel. IEEE Trans. Inf. Theory 1998, 44, 1453–1467. [Google Scholar] [CrossRef]
  20. Sun, L.; Zhang, T.; Niu, H. Inter-relay interference in two-path digital relaying systems: Detrimental or beneficial? IEEE Trans. Wirel. Commun. 2011, 10, 2468–2473. [Google Scholar] [CrossRef]
  21. Lu, H.; Hong, P.L.; Xue, K.P. Analysis on decode-and-forward two-path relay networks: When and how to cooperate. IEEE Trans. Veh. Technol. 2016, 65, 5758–5763. [Google Scholar] [CrossRef]
  22. Sun, L.; Du, Q.; Ren, P.; Wang, Y. Two birds with one stone: Towards secure and interference-free D2D transmissions via constellation rotation. IEEE Trans. Veh. Technol. 2016, 65, 8767–8774. [Google Scholar] [CrossRef]
  23. Ren, C.; Chen, J.; Tellambura, C. Spectrum sharing with device-to-device successive relaying and hybrid complex field network coding. IEEE Trans. Veh. Technol. 2017, 66, 7947–7963. [Google Scholar] [CrossRef]
  24. Xu, H.; Sun, L.; Ren, P.; Du, Q. Securing two-way cooperative systems with an untrusted relay: A constellation-rotation aided approach. IEEE Commun. Lett. 2015, 19, 2270–2273. [Google Scholar] [CrossRef]
  25. Khan, M.A.; Asim, M.; Jeoti, V.; Manzoor, R.S. On secure OFDM system: Chaos based constellation scrambling. In Proceedings of the 2007 International Conference on Intelligent and Advanced Systems (ICIAS), Kuala Lumpur, Malaysia, 25–28 November 2007; pp. 484–488. [Google Scholar]
  26. Tseng, D.; Chiu, J. An OFDM speech scrambler without residual intelligibility. In Proceedings of the IEEE Region 10 Conference (TENCON), Taipei, Taiwan, 30 October–2 November 2007; pp. 1–4. [Google Scholar]
  27. Zhang, L.; Xin, X.; Liu, B.; Wang, Y. Secure OFDM-PON based on chaos scrambling. IEEE Photon. Technol. Lett. 2011, 23, 998–1000. [Google Scholar] [CrossRef]
  28. Li, H.; Wang, X.; Hou, W. Secure transmission in OFDM systems by using time domain scrambling. In Proceedings of the 77th IEEE Vehicular Technology Conference (VTC Spring), Dresden, Germany, 2–5 June 2013; pp. 1–5. [Google Scholar]
  29. Dzung, D. Data Encryption on the Physical Layer of a Data Transmission System. U.S. Patent 7752430B2, 6 July 2010. [Google Scholar]
  30. Ma, R.; Dai, L.; Wang, Z.; Wang, J. Secure communication in TDS-OFDM system using constellation rotation and noise insertion. IEEE Trans. Consum. Electron. 2010, 56, 1328–1332. [Google Scholar] [CrossRef]
  31. Reilly, D.; Kanter, G. Noise-enhanced encryption for physical layer security in an OFDM radio. In Proceedings of the IEEE Radio and Wireless Symposium (RWS), San Diego, CA, USA, 18–22 January 2009; pp. 344–347. [Google Scholar]
  32. Vukadinovic, V.; Bakowski, K.; Marsch, P.; Garcia, I.D.; Xu, H.; Sybis, M.; Sroka, P.; Wesolowski, K.; Lister, D.; Thibault, I. 3GPP C-V2X and IEEE 802.11 p for vehicle-to-vehicle communications in highway platooning scenarios. Ad Hoc Netw. 2018, 74, 17–29. [Google Scholar] [CrossRef]
  33. Ometov, A.; Daneshfar, N.; Hazmi, A.; Andreev, S.; Del Carpio, L.F.; Amin, P.; Torsner, J.; Koucheryavy, Y.; Valkama, M. System-level analysis of IEEE 802.11 ah technology for unsaturated MTC traffic. Int. J. Sens. Netw. 2018, 26, 269–282. [Google Scholar] [CrossRef]
  34. Park, M.; Kenney, T.; Perahia, E.; Stacey, R.; Azizi, S. Method of Packet Classification for 802.11 ax. U.S. Patent 9,882,687, 30 January 2018. [Google Scholar]
  35. Wang, W.; He, S.; Yang, L.; Zhang, Q.; Jiang, T. Wi-Fi teetertotter: Overclocking OFDM for internet of things. arXiv 2018, arXiv:1801.02811. [Google Scholar]
  36. Mavromoustakis, C.; Mastorakis, G.; Batalla, J. Internet of Things (IoT) in 5G Mobile Technologies; Springer: Berlin/Heidelberg, Germany, 2016; Volume 8. [Google Scholar]
  37. Al-Sarawi, S.; Anbar, M.; Alieyan, K.; Alzubaidi, M. Internet of things (IoT) communication protocols. In Proceedings of the IEEE International Conference on Information Technology (ICIT), Amman, Jordan, 17–18 May 2017; pp. 685–690. [Google Scholar]
  38. Hamamreh, J.M.; Arslan, H. Secure orthogonal transform division multiplexing (OTDM) waveform for 5G and beyond. IEEE Commun. Lett. 2017, 21, 1191–1194. [Google Scholar] [CrossRef]
  39. Huo, F.; Gong, G. A new efficient physical layer OFDM encryption scheme. In Proceedings of the IEEE International Conference on Computer Communications (INFOCOM), Toronto, ON, Canada, 27 April–2 May 2014; pp. 1024–1032. [Google Scholar]
  40. Dharavathu, K.; Mosa, A. Secure image transmission through crypto-OFDM system using Rubik’s cube algorithm over an AWGN channel. Int. J. Commun. Syst. 2020, 33, e4369. [Google Scholar] [CrossRef]
  41. Zhang, L.; Liu, B.; Xin, X.; Zhang, Q.; Yu, J.; Wang, Y. Theory and performance analyses in secure CO-OFDM transmission system based on two-dimensional permutation. J. Lightw. Technol. 2013, 31, 74–80. [Google Scholar] [CrossRef]
  42. Cheng, D.; Gao, Z.; Liu, F.; Liao, X. A general time-domain artificial noise design for OFDM AF relay systems. In Proceedings of the IEEE/CIC International Conference on Communications in China (ICCC), Shenzhen, China, 2–4 November 2015; pp. 1–6. [Google Scholar]
  43. Akitaya, T.; Saba, T. Energy efficient artificial fast fading for MISOOFDM systems. In Proceedings of the IEEE Global Communications Conference (GLOBECOM), San Diego, CA, USA, 6–10 December 2015; pp. 1–6. [Google Scholar]
  44. Rahbari, H.; Krunz, M. Exploiting frame preamble waveforms to support new physical-layer functions in OFDM-based 802.11 systems. IEEE Trans. Wirel. Commun. 2017, 16, 3775–3786. [Google Scholar] [CrossRef]
  45. Karachontzitis, S.; Timotheou, S.; Krikidis, I.; Berberidis, K. Security-aware max-min resource allocation in multiuser OFDMA downlink. IEEE Trans. Inf. Forensics Secur. 2015, 10, 529–542. [Google Scholar] [CrossRef]
  46. Zhang, B.; Zhan, Q.; Chen, S.; Li, M.; Ren, K.; Wang, C.; Ma, D. Priwhisper: Enabling keyless secure acoustic communication for smartphones. IEEE Internet Things J. 2014, 1, 33–45. [Google Scholar] [CrossRef]
  47. Xiao, Y.; Chen, M.; Li, F.; Tang, J.; Liu, Y.; Chen, L. PAPR reduction based on chaos combined with SLM technique in optical OFDM IM/DD system. Opt. Fiber Technol. 2015, 21, 81–86. [Google Scholar] [CrossRef]
  48. Allah, O.S.F.; Afifi, A.; El-Shafai, W.; Naeem, E.A.; Alzain, M.A.; Al-Amri, J.F.; Soh, B.; El-Samie, F.E.A. Investigation of Chaotic Image Encryption in Spatial and FrFT Domains for Cybersecurity Applications. IEEE Access 2020, 8, 42491–42503. [Google Scholar]
  49. Dasgupta, T.; Paral, P.; Bhattacharya, S. Color image encryption based on multiple fractional order chaotic systems. In Proceedings of the International Conference on Control, Instrumentation, Energy and Communication (CIEC), Calcutta, India, 31 January–2 February 2014; pp. 583–587. [Google Scholar]
  50. Ozaktas, H.M.; Zalevsky, Z.; Kutay, M.A. The Fractional Fourier Transform with Applications in Optics and Signal Processing; Prentice Hall: New York, NY, USA, 2000. [Google Scholar]
  51. Pei, S.C.; Hsue, W.L. The multiple-parameter discrete fractional Fourier transform. IEEE Signal Proc. Lett. 2006, 13, 329–332. [Google Scholar]
  52. Zhao, T.; Ran, Q.; Yuan, L.; Chi, Y.; Ma, J. Security of image encryption scheme based on multi-parameter fractional Fourier transform. Opt. Commun. 2016, 376, 47–51. [Google Scholar] [CrossRef]
  53. Zhou, N.R.; Dong, T.J.; Wu, J.H. Novel image encryption algorithm based on multiple-parameter discrete fractional random transform. Opt. Commun. 2010, 283, 3037–3042. [Google Scholar] [CrossRef]
  54. Tao, R.; Meng, X.Y.; Wang, Y. Image encryption with multiorders of fractional Fourier transforms. IEEE Trans. Inf. Forensic. Secur. 2010, 5, 734–738. [Google Scholar] [CrossRef]
  55. Lang, J.; Tao, R.; Wang, Y. Image encryption based on the multiple-parameter discrete fractional Fourier transform and chaos function. Opt. Commun. 2010, 283, 2092–2096. [Google Scholar] [CrossRef]
  56. Liu, F.; Wang, L.; Xie, J.; Wang, Y.; Zhang, Z. MP-WFRFT and Chaotic Scrambling Aided Directional Modulation Technique for Physical Layer Security Enhancement. IEEE Access 2019, 7, 74459–74470. [Google Scholar] [CrossRef]
  57. Heidari, A.; Navimipour, N.J.; Jamali, M.A.J.; Akbarpour, S. A hybrid approach for latency and battery lifetime optimization in IoT devices through offloading and CNN learning. Sustain. Comput. Inform. Syst. 2023, 39, 100899. [Google Scholar] [CrossRef]
  58. Aminizadeh, S.; Heidari, A.; Toumaj, S.; Darbandi, M.; Navimipour, N.J.; Rezaei, M.; Talebi, S.; Azad, P.; Unal, M. The Applications of Machine Learning Techniques in Medical Data Processing based on Distributed Computing and the Internet of Things. Comput. Methods Programs Biomed. 2023, 241, 107745. [Google Scholar] [CrossRef]
  59. Alhoraibi, L.; Alghazzawi, D.; Alhebshi, R.; Rabie, O.B.J. Physical Layer Authentication in Wireless Networks-Based Machine Learning Approaches. Sensors 2023, 23, 1814. [Google Scholar] [CrossRef]
  60. Hsue, W.L.; Pei, S.C. The Multiple-Parameter Discrete Fractional Fourier Transform and Its Application. In Proceedings of the 2006 IEEE International Conference on Acoustics Speech and Signal Processing Proceedings, Toulouse, France, 14–19 July 2006. [Google Scholar]
  61. Farah, M.B.; Guesmi, R.; Kachouri, A.; Samet, M. A novel chaos based optical image encryption using fractional Fourier transform and DNA sequence operation. Opt. Laser Technol. 2020, 121, 105777. [Google Scholar] [CrossRef]
  62. Panchal, G.; Samanta, D. A Novel Approach to Fingerprint Biometric-Based Cryptographic Key Generation and its Applications to Storage Security. Comput. Electr. Eng. 2018, 69, 461–478. [Google Scholar] [CrossRef]
  63. El-Mahallawy, M.S.; Hagras, E.A.; Eldin, A.Z.; Fakhr, M.W. Robust Blind and Secure Biometric Watermarking Based on Partial Multi-Map Chaotic Encryption. In Proceedings of the 4th IFIP International Conference on New Technologies, Mobility and Security, Paris, France, 7–10 February 2011. [Google Scholar]
  64. Murillo-Escobar, M.A.; Cruz-Hernández, C.; Abundiz-Pérez, F.; López-Gutiérrez, R.M. A robust embedded biometric authentication system based on fingerprint and chaotic encryption. Expert Syst. Appl. 2015, 42, 8198–8211. [Google Scholar] [CrossRef]
  65. Zebbiche, K.; Ghouti, L.; Khelifi, F.; Bouridane, A. Protecting Fingerprint Data Using Watermarking. In Proceedings of the First NASA/ESA Conference on Adaptive Hardware and Systems (AHS’06), Istanbul, Turkey, 15–18 June 2006. [Google Scholar]
  66. Zhou, Y.; Hua, Z.; Pun, C.M.; Chen, C.L. Cascade Chaotic System with Applications. IEEE Trans. Cybern. 2015, 45, 2001–2012. [Google Scholar] [CrossRef]
  67. Liu, L.; Miao, S. A New Simple One-Dimensional Chaotic Map and Its Application for Image Encryption. Multimed. Tools Appl. 2018, 77, 21445–21462. [Google Scholar] [CrossRef]
  68. Chen, F.; Luo, X.; Zhou, Y. Existence Results for Nonlinear Fractional Difference Equation. Adv. Differ. Equ. 2011, 2011, 713201. [Google Scholar] [CrossRef]
  69. Moore, R.E.; Kearfott, R.B.; Cloud, M.J. Introduction to Interval Analysis, Society for Industrial and Applied Mathematics 3600; University City Science Center: Philadelphia, PA, USA, 2009. [Google Scholar]
  70. Nepomuceno, E.G.; Martins, S.A.M. A lower bound error for free run simulation of the polynomial NARMAX. Syst. Sci. Control. Eng. Open Access J. 2016, 4, 50–58. [Google Scholar] [CrossRef]
  71. Nepomuceno, E.G.; Martins, S.A.M.; Amaral, G.; Riveret, R. On the lower bound error for discrete maps using associative property. Syst. Sci. Control. Eng. Open Access J. 2017, 5, 462–473. [Google Scholar] [CrossRef]
  72. Wu, G.-C.; Baleanu, D.; Zeng, S.-D. Discrete chaos in fractional sine and standard maps. Phys. Lett. A 2014, 378, 484–487. [Google Scholar] [CrossRef]
  73. Rukhin, A.; Soto, J.; Nechvatal, J.; Smid, M.; Barker, E.; Leigh, S.; Levenson, M.; Vangel, M.; Banks, D.; Heckert, A.; et al. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications; NIST Special Publication 800-22; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2001. [Google Scholar]
  74. Hagras, E.A.A.; Aldosary, S.; Khaled, H.; Hassan, T.M. Authenticated Public Key Elliptic Curve Based on Deep Convolutional Neural Network for Cybersecurity Image Encryption Application. Sensors 2023, 23, 6589. [Google Scholar] [CrossRef]
  75. Gao, X.; Mou, J.; Banerjee, S.; Cao, Y.; Xiong, L.; Chen, X. An effective multiple-image encryption algorithm based on 3D cube and hyperchaotic map. J. King Saud. Univ. Comput. Inf. Sci. 2022, 34, 1535–1551. [Google Scholar] [CrossRef]
  76. Gao, X.; Mou, J.; Xiong, L.; Sha, Y.; Yan, H.; Cao, Y. A fast and efficient multiple images encryption based on single-channel encryption and chaotic system. Nonlinear Dyn. 2022, 108, 613–636. [Google Scholar] [CrossRef]
  77. Gupta, M.; Singh, V.P.; Gupta, K.K.; Shukla, P.K. An efficient image encryption technique based on two-level security for internet of things. Multimed. Tools Appl. 2022, 82, 5091–5111. [Google Scholar] [CrossRef]
Figure 1. Biometric Fingerprint image.
Figure 1. Biometric Fingerprint image.
Sensors 23 07843 g001
Figure 2. Proposed MCC-MF sine map block diagram.
Figure 2. Proposed MCC-MF sine map block diagram.
Sensors 23 07843 g002
Figure 3. (a) BD of the conventional non-modular FSCM. (b) LE of the conventional non-modular FSCM. (c) BD of the proposed MCC-MF sine map. (d) LE of the proposed MCC-MF sine map.
Figure 3. (a) BD of the conventional non-modular FSCM. (b) LE of the conventional non-modular FSCM. (c) BD of the proposed MCC-MF sine map. (d) LE of the proposed MCC-MF sine map.
Sensors 23 07843 g003
Figure 4. Proposed DCBS generator block diagram based on MCC-MF sine map.
Figure 4. Proposed DCBS generator block diagram based on MCC-MF sine map.
Sensors 23 07843 g004
Figure 5. The proposed secure MP-FrFT-OFDM based on MCC-MF sine map and DCBS generator.
Figure 5. The proposed secure MP-FrFT-OFDM based on MCC-MF sine map and DCBS generator.
Sensors 23 07843 g005
Figure 6. BER of FFT, FrFT, MPFrFT OFDM over Salt and Pepper noise attack, d = 0.02 .
Figure 6. BER of FFT, FrFT, MPFrFT OFDM over Salt and Pepper noise attack, d = 0.02 .
Sensors 23 07843 g006
Figure 7. PSNR of FFT, FrFT, MPFrFT OFDM over Salt and Pepper noise attack, d = 0.02 .
Figure 7. PSNR of FFT, FrFT, MPFrFT OFDM over Salt and Pepper noise attack, d = 0.02 .
Sensors 23 07843 g007
Figure 8. B E R performance, FFT, FrFT, and MPFrFT OFDM over Speckle noise attack, δ 2 = 0.02 .
Figure 8. B E R performance, FFT, FrFT, and MPFrFT OFDM over Speckle noise attack, δ 2 = 0.02 .
Sensors 23 07843 g008
Figure 9. PSNR performance, FFT, FrFT, and MPFrFT OFDM over Speckle noise attack, δ 2 = 0.02 .
Figure 9. PSNR performance, FFT, FrFT, and MPFrFT OFDM over Speckle noise attack, δ 2 = 0.02 .
Sensors 23 07843 g009
Figure 10. Encryption and decryption results of the gray images Baboon, Lena, and Cameraman. (a) the original images, (b) the encrypted images, (c) the decrypted images.
Figure 10. Encryption and decryption results of the gray images Baboon, Lena, and Cameraman. (a) the original images, (b) the encrypted images, (c) the decrypted images.
Sensors 23 07843 g010
Figure 11. Key sensitivity analysis, original images are shown in (a), cipher images of the original key are shown in (b). Decrypted images for the incorrect decryption key are shown in (c), decrypted images for the correct decryption key are shown in (d).
Figure 11. Key sensitivity analysis, original images are shown in (a), cipher images of the original key are shown in (b). Decrypted images for the incorrect decryption key are shown in (c), decrypted images for the correct decryption key are shown in (d).
Sensors 23 07843 g011
Table 1. The randomness tests results for the proposed MCC-MF sine map based on NIST SP800-22 tests.
Table 1. The randomness tests results for the proposed MCC-MF sine map based on NIST SP800-22 tests.
Testp-ValueResult
Monobit frequency0.5961Success
Block frequency0.3673Success
Runs test0.7286Success
Longest run of ones0.8837Success
Binary matrix rank test0.2735Success
Discrete Fourier transform0.1942Success
Non-overlapping template0.3061Success
Overlapping templates0.7398Success
Universal statistical0.8394Success
Linear complexity0.7193Success
Serial test0.5037Success
Approximate entropy0.6695Success
Cumulative sums (forward)0.8359Success
Cumulative sums (revere)0.3891Success
Random excursions0.7291Success
Table 2. The multi-secure parameters used in the simulations.
Table 2. The multi-secure parameters used in the simulations.
ParameterValue
SK ( H e x . ) 4071A20C3CB340E95E65AF06549CCD16220A
C0D998DEE50C22550EA6637F5AFA
x 0 0.918347421094373
r 1 f 10.485174284360704
r 2 f 18.936817384042791
r 3 f 9.195731663827418
r 4 f 3.038618376892133
v 1 0.843728376417384
v 2 0.172865272648265
v 3 0.447162948327648
v 4 0.728395273521837
a a = 256   bytes   ( a 1 , a 2 , , a 256 )
b b = 256   bytes   b 1 , b 2 , , b 256
Table 3. The proposed authenticated secure image transmission system simulation parameters.
Table 3. The proposed authenticated secure image transmission system simulation parameters.
Gray-Scale Image Size 256 × 256
Channel codingTypeConvolutional
Encoder
Code Rate 1 / 2
OFDM parametersSub-carrier ( N s c )256
FFT length256
Cyclic prefix (CP)32
AttacksAWGN σ 2 = 0.01 ,   0.05 , 0.10 ,   0.15 ,   0.20
Salt and Pepper noise σ 2 = 0.02
Speckle noise σ 2 = 0.02
Key
Performance
Indicators
(KPI)
Visual Quality Metrics (Clarity investigation) E b N 0   v s . B E R
E b N 0   v s . P S N R
Encryption
Quality Metrics
(Statistical Analysis)
N P C R
U A C I
r x y , Histogram,
Key space
Table 4. AWGN channel effect at zero mean μ = 0 and over certain ranges of noise variances ( σ 2 = 0.01 , 0.05 , 0.10 , 0.15 , 0.20 ) .
Table 4. AWGN channel effect at zero mean μ = 0 and over certain ranges of noise variances ( σ 2 = 0.01 , 0.05 , 0.10 , 0.15 , 0.20 ) .
Noise   Var .   ( σ 2 ) 0.01 0.05 0.10 0.15 0.20
F F T Decrypted ImageSensors 23 07843 i001Sensors 23 07843 i002Sensors 23 07843 i003Sensors 23 07843 i004Sensors 23 07843 i005
P S N R ( d B ) I n f 28.6397 14.515 8.8606 6.56 × 10 2
F r F T Decrypted ImageSensors 23 07843 i006Sensors 23 07843 i007Sensors 23 07843 i008Sensors 23 07843 i009Sensors 23 07843 i010
P S N R ( d B ) I n f 28.6397 14.515 8.8606 6.56 × 10 2
M P F r T T Decrypted ImageSensors 23 07843 i011Sensors 23 07843 i012Sensors 23 07843 i013Sensors 23 07843 i014Sensors 23 07843 i015
P S N R ( d B ) I n f 28.6397 14.515 8.8606 6.56 × 10 2
Table 5. B E R performances of the proposed F F T , F r F T and M P F r F T coded OFDM under Salt and Pepper noise, noise density d = 0.02 .
Table 5. B E R performances of the proposed F F T , F r F T and M P F r F T coded OFDM under Salt and Pepper noise, noise density d = 0.02 .
E b N 0
( d B )
B E R
F F T F r F T M P F r F T
0 0.1239 0.1117 0.1667
2 0.0314 0.0274 0.0484
4 0.0067 0.0053 0.0102
6 0.0017 0.0014 0.0022
8 8.60 × 10 4 8.21 × 10 4 8.59 × 10 4
10 7.59 × 10 4 7.74 × 10 4 7.58 × 10 4
Table 6. P S N R performances of the proposed F F T , F r F T and M P F r F T coded OFDM under Salt & Pepper noise, noise density d = 0.02 .
Table 6. P S N R performances of the proposed F F T , F r F T and M P F r F T coded OFDM under Salt & Pepper noise, noise density d = 0.02 .
E b N 0   ( d B ) P S N R   ( d B )
F F T F r F T M P F r F T
0 9.0709 9.5156 7.7798
2 15.0297 15.6164 13.1508
4 21.7511 22.6765 19.9282
6 27.5973 28.3270 26.6475
8 30.6554 30.8548 30.6579
10 31.1966 31.1123 31.2009
Table 7. B E R and P S N R performance for FFT, FrFT, MPFrFT Coded OFDM over Salt and Pepper noise attack, d = 0.02 , at E b N 0 = 2 , 8 , 16 d B .
Table 7. B E R and P S N R performance for FFT, FrFT, MPFrFT Coded OFDM over Salt and Pepper noise attack, d = 0.02 , at E b N 0 = 2 , 8 , 16 d B .
E b N 0   ( d B ) 2   d B 8   d B 16   d B
FFTDecrypted
Image
Sensors 23 07843 i016Sensors 23 07843 i017Sensors 23 07843 i018
B E R 0.0314 8.60 × 10 4 7.58 × 10 4
P S N R ( d B ) 15.0297 30.6554 31.2009
FrFTDecrypted
Image
Sensors 23 07843 i019Sensors 23 07843 i020Sensors 23 07843 i021
B E R 0.0274 8.21 × 10 4 7.58 × 10 4
P S N R ( d B ) 9.5156 30.8548 31.2009
MP-FrFTDecrypted
Image
Sensors 23 07843 i022Sensors 23 07843 i023Sensors 23 07843 i024
B E R 0.0484 8.59 × 10 4 7.58 × 10 4
P S N R ( d B ) 13.1508 30.6579 31.2009
Table 8. B E R and P S N R performances of the proposed F F T , F r F T and M P F r F T coded OFDM under Speckle noise attack; noise variance δ 2 = 0.02 .
Table 8. B E R and P S N R performances of the proposed F F T , F r F T and M P F r F T coded OFDM under Speckle noise attack; noise variance δ 2 = 0.02 .
E b N 0
( d B )
B E R P S N R   ( d B )
F F T F r F T M P F r F T F F T F r F T M P F r F T
0 0.1026 0.0920 0.1444 9.8868 10.3628 8.4049
2 0.0213 0.0178 0.0340 16.7095 17.5063 14.6790
4 0.0028 0.0020 0.0050 25.4816 27.0542 22.9900
6 1.39 × 10 4 8.58 × 10 5 0.0022 38.5823 40.6662 35.0743
8 3.07 × 10 8 0 3.11 × 10 4 75.1229 I n f 54.1514
10 0 0 3.84 × 10 6 I n f I n f I n f
Table 9. B E R and P S N R performance for FFT, FrFT, and MPFrFT Coded OFDM over Speckle noise attack, δ 2 = 0.02 , at E b N 0 = 2 , 8 , 8.50 d B .
Table 9. B E R and P S N R performance for FFT, FrFT, and MPFrFT Coded OFDM over Speckle noise attack, δ 2 = 0.02 , at E b N 0 = 2 , 8 , 8.50 d B .
E b N 0   ( d B ) 2   d B 8   d B 8.50   d B
FFTDecrypted
Image
Sensors 23 07843 i025Sensors 23 07843 i026Sensors 23 07843 i027
B E R 0.0213 3.07 × 10 8 0
P S N R ( d B ) 16.7095 75.1229 I n f
FrFTDecrypted
Image
Sensors 23 07843 i028Sensors 23 07843 i029Sensors 23 07843 i030
B E R 0.0178 0 0
P S N R ( d B ) 17.5063 I n f I n f
MP-FrFTDecrypted
Image
Sensors 23 07843 i031Sensors 23 07843 i032Sensors 23 07843 i033
B E R 0.0340 4.00 × 10 6 0
P S N R ( d B ) 14.6790 54.1514 I n f
Table 10. N P C R comparison among the proposed MPFrFT and FrFT-coded OFDM using Cameraman, Peppers and Boat standard gray-scale test images.
Table 10. N P C R comparison among the proposed MPFrFT and FrFT-coded OFDM using Cameraman, Peppers and Boat standard gray-scale test images.
ImageEncryption Scheme
M P F r F T F r F T
Cameraman 99.6661 98.6773
Peppers 99.4720 98.3463
Boat 99.1598 99.0762
Table 11. U A C I comparison among the proposed MPFrFT and FrFT-coded OFDM using Cameraman, Peppers and Boat standard gray-scale test images.
Table 11. U A C I comparison among the proposed MPFrFT and FrFT-coded OFDM using Cameraman, Peppers and Boat standard gray-scale test images.
ImageEncryption Scheme
M P F r F T F r F T
Cameraman 27.8645 26.8317
Peppers 24.0981 24.2064
Boat 21.8502 22.8703
Table 12. Correlation comparison among the proposed MPFrFT and FrFT-coded OFDM using Cameraman, Peppers and Boat standard gray-scale test images.
Table 12. Correlation comparison among the proposed MPFrFT and FrFT-coded OFDM using Cameraman, Peppers and Boat standard gray-scale test images.
ImageEncryption Scheme
M P F r F T F r F T
Lena 0.0011 0.0631
Cameraman 0.0033 0.0012
Peppers 0.00015 0.0039
Boat 4.11 × 10 4 0.0083
Table 13. Histogram analysis for the proposed MPFrFT-coded OFDM using Cameraman, Peppers and Boat standard gray-scale test images.
Table 13. Histogram analysis for the proposed MPFrFT-coded OFDM using Cameraman, Peppers and Boat standard gray-scale test images.
Test ImageOriginal Image Histogram M P F r F T
EncryptionDecryption
Sensors 23 07843 i034Sensors 23 07843 i035Sensors 23 07843 i036Sensors 23 07843 i037
Sensors 23 07843 i038Sensors 23 07843 i039Sensors 23 07843 i040Sensors 23 07843 i041
Sensors 23 07843 i042Sensors 23 07843 i043Sensors 23 07843 i044Sensors 23 07843 i045
Table 14. Performance comparison between the proposed cryptosystem results and other methods described in the literature for a Lena image of size 256 × 256.
Table 14. Performance comparison between the proposed cryptosystem results and other methods described in the literature for a Lena image of size 256 × 256.
CriteriaProposedRef. [48]Ref. [74]Ref. [75]Ref. [76]Ref. [77]
Key space 2 2200 - 2 942 2 441 --
Entropy7.99997.77717.99977.99747.90227.9973
CC-H 0.0011 -0.0219−0.00020.00210.00220.0044
CC-V 0.0127 -0.0004--
CC-V 0.0087 -0.0001--
NPCR (%)99.894599.740099.61199.612399.6299.63
UACI (%)33.528327.520033.47133.4633.46
Authentication××××
Encryption
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Hagras, E.A.A.; Aldosary, S.; Khaled, H.; Hassan, T.M. Physical Layer Authenticated Image Encryption for IoT Network Based on Biometric Chaotic Signature for MPFrFT OFDM System. Sensors 2023, 23, 7843. https://doi.org/10.3390/s23187843

AMA Style

Hagras EAA, Aldosary S, Khaled H, Hassan TM. Physical Layer Authenticated Image Encryption for IoT Network Based on Biometric Chaotic Signature for MPFrFT OFDM System. Sensors. 2023; 23(18):7843. https://doi.org/10.3390/s23187843

Chicago/Turabian Style

Hagras, Esam A. A., Saad Aldosary, Haitham Khaled, and Tarek M. Hassan. 2023. "Physical Layer Authenticated Image Encryption for IoT Network Based on Biometric Chaotic Signature for MPFrFT OFDM System" Sensors 23, no. 18: 7843. https://doi.org/10.3390/s23187843

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop