Efficient Secure Image Encryption Using RFID with Blockchain Technology in IIoT: Challenges and Opportunities

Elangovan, V. R. and Nirmala, R. and Jayakarthik, R. and Tamilarasi, P. and Kiruthiga, R. (2022) Efficient Secure Image Encryption Using RFID with Blockchain Technology in IIoT: Challenges and Opportunities. In: The Convergence of Artificial Intelligence and Blockchain Technologies. WORLD SCIENTIFIC, pp. 159-179. ISBN 978-981-12-2507-9

Full text not available from this repository. (Request a copy)

Abstract

In industrial methods, cameras and intelligent image sensors are widely used in process design and also in quality control of the resulting product. In the Industrial Internet of Things (IIoT), the sensors are used to generate images that are constantly at risk of reporting and infringement. Given that third-party intrusion occurs, the only way to secure data that fades into IIoT environments is through traditional methods. Currently, blockchain technology is the main solution to trust problems and also to eliminate intrusion from third parties. The objective of this chapter is really to explore the mutual effect on supply chain transparency on Radio Frequency Identification (RFID), the IIoT, and blockchain technologies. Depends on the Number of Pixels per Change Rate (NPCR), and analysis of entropy information, the data can be analyzed. In support of a variety of attacks, we determine the power of an algorithm that is encrypted for image encryption. RFID technology affects all IIoT & blockchain systems strongly and significantly, which in fact will have a significant and positive impact on Supply Chain Transparency (SCT). Through each industrial & blockchain IoT technology, the RFID system has an indirect impact on SCT. This research was the first scientific test of SCT’s influence on RFID, IIoT, and blockchain technologies. To facilitate the generalization of the results, observations from the first wave may be repeated. The most recent measures are designed and tested with precision and consistency for the use of industrial IoT systems, including blockchain technology. This is the first research to examine the cumulative effect on supply chain technology of RFID, IIoT, and blockchain systems, Edwards-curve Digital Signature Algorithm (EdDSA), public key encryption using a variant of the Schnorr signature based on Edwards’ twisted curves. In an IIoT environment, images can be secured by providing an authorized solution based on a private blockchain when the images are encrypted. In this method, the image includes the cryptographic pixel values which are stored in the blockchain, checking the confidentiality and security of the data. We obtained the value of entropy closer to an absolute value of 8, which is protected against the attack of brute force. Thus, the suggested method is very effective in preventing data leakage and the security that is described in the encrypted results.

Item Type: Book Section
Subjects: Computer Science Engineering > Big Data
Divisions: Computer Applications
Depositing User: Mr IR Admin
Date Deposited: 19 Sep 2024 11:23
Last Modified: 19 Sep 2024 11:23
URI: https://ir.vistas.ac.in/id/eprint/6569

Actions (login required)

View Item
View Item