A. O. Abdalrahman, K. K. Jabbar, Araz B. Karim, O. Y. Abdulhammed
{"title":"物联网与云计算集成的安全通信","authors":"A. O. Abdalrahman, K. K. Jabbar, Araz B. Karim, O. Y. Abdulhammed","doi":"10.24271/psr.2022.160802","DOIUrl":null,"url":null,"abstract":"One advanced technology that is expanding quickly in the communications area is the integration of Cloud computing with the IoT. This is because it is quick, easy, and inexpensive to use. Since the information sent between the sender and recipient is vulnerable to threats and attacks through eavesdropping or unauthorized, in this paper, encryption technology is used to protect the information that is sent from the intelligent building to the smartphone-controlled, where the information sent between the two parties is encrypted by relying on the Henon map, new diffusion technique and the XoR function. Several measures were used to measure the quality of the proposed system as Histogram, NPCR, PSNR, SSIM, QIU, MAE, and Entropy, as the results proved the strength, high-security effectiveness, and robustness of the proposed system.","PeriodicalId":33835,"journal":{"name":"Passer Journal","volume":" ","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Secure Communication of the Integrated IoT and Cloud Computing\",\"authors\":\"A. O. Abdalrahman, K. K. Jabbar, Araz B. Karim, O. Y. Abdulhammed\",\"doi\":\"10.24271/psr.2022.160802\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"One advanced technology that is expanding quickly in the communications area is the integration of Cloud computing with the IoT. This is because it is quick, easy, and inexpensive to use. Since the information sent between the sender and recipient is vulnerable to threats and attacks through eavesdropping or unauthorized, in this paper, encryption technology is used to protect the information that is sent from the intelligent building to the smartphone-controlled, where the information sent between the two parties is encrypted by relying on the Henon map, new diffusion technique and the XoR function. Several measures were used to measure the quality of the proposed system as Histogram, NPCR, PSNR, SSIM, QIU, MAE, and Entropy, as the results proved the strength, high-security effectiveness, and robustness of the proposed system.\",\"PeriodicalId\":33835,\"journal\":{\"name\":\"Passer Journal\",\"volume\":\" \",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Passer Journal\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.24271/psr.2022.160802\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Passer Journal","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.24271/psr.2022.160802","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Secure Communication of the Integrated IoT and Cloud Computing
One advanced technology that is expanding quickly in the communications area is the integration of Cloud computing with the IoT. This is because it is quick, easy, and inexpensive to use. Since the information sent between the sender and recipient is vulnerable to threats and attacks through eavesdropping or unauthorized, in this paper, encryption technology is used to protect the information that is sent from the intelligent building to the smartphone-controlled, where the information sent between the two parties is encrypted by relying on the Henon map, new diffusion technique and the XoR function. Several measures were used to measure the quality of the proposed system as Histogram, NPCR, PSNR, SSIM, QIU, MAE, and Entropy, as the results proved the strength, high-security effectiveness, and robustness of the proposed system.