{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T14:16:41Z","timestamp":1753885001631,"version":"3.41.2"},"reference-count":25,"publisher":"World Scientific Pub Co Pte Ltd","issue":"04","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Image Grap."],"published-print":{"date-parts":[[2023,7]]},"abstract":"<jats:p> One of the most significant challenges appears to be securing the Internet of Things (IoT) communication network. As a corollary, information security has become the basis for establishing trustworthiness in IoT network communication. Cryptography is one of the ways for securing information in this case. However, the majority of current approaches are static, making them subject to security threats. As a consequence, a new concept, dynamic encryption, is growing rapidly in IoT communication. In this paper, a dynamic encryption algorithm (DSIT) has been proposed to secure IoT communication. This algorithm is based on Feistel and Substitution\u2013Permutation Network. DSIT is a block cipher that takes the 64-bit block of plaintext, 64-bit secret key, and a secret dynamic box (D-box) as input. It produces a 64-bit ciphertext by performing eight rounds of the DSIT algorithm. For each round, the key and D-box are updated. This dynamic effect provides high security to a dynamic IoT network. The proposed algorithm has been executed in IoT environment using Raspberry Pi 3 Model B[Formula: see text] and 50% average Avalanche effect has been achieved. The proposed algorithm efficiently encrypts the image data to secure the communication and high resistant to cryptanalysis attacks. <\/jats:p>","DOI":"10.1142\/s0219467823500353","type":"journal-article","created":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T09:42:27Z","timestamp":1654076547000},"source":"Crossref","is-referenced-by-count":1,"title":["DSIT: A Dynamic Lightweight Cryptography Algorithm for Securing Image in IoT Communication"],"prefix":"10.1142","volume":"23","author":[{"given":"Navdeep","family":"Lata","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering, I.K.\u00a0Gujral Punjab Technical University, Kapurthala, Punjab, India"}]},{"given":"Raman","family":"Kumar","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, I.K.\u00a0Gujral Punjab Technical University, Kapurthala, Punjab, India"}]}],"member":"219","published-online":{"date-parts":[[2022,7,1]]},"reference":[{"key":"S0219467823500353BIB001","first-page":"1","author":"Singh S.","year":"2017","journal-title":"J. Ambient Intell. Humaniz. Comput."},{"key":"S0219467823500353BIB003","doi-asserted-by":"crossref","first-page":"10979","DOI":"10.1007\/s00521-018-3801-x","volume":"32","author":"Elhoseny M.","year":"2018","journal-title":"Neural Comput. Appl."},{"issue":"3","key":"S0219467823500353BIB005","doi-asserted-by":"crossref","first-page":"1947","DOI":"10.1007\/s11277-020-07134-3","volume":"112","author":"Dhanda S. S.","year":"2020","journal-title":"Wirel. Pers. Commun."},{"issue":"1","key":"S0219467823500353BIB007","doi-asserted-by":"crossref","first-page":"012072","DOI":"10.1088\/1742-6596\/1717\/1\/012072","volume":"1717","author":"Shamala L. M.","year":"2021","journal-title":"J. Phys., Conf. Ser."},{"key":"S0219467823500353BIB009","first-page":"102533","volume":"53","author":"Mishra Z.","year":"2020","journal-title":"J. Inf. Secur. Appl."},{"key":"S0219467823500353BIB010","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1007\/978-981-15-7486-3_26","volume-title":"Nanoelectronics, Circuits and Communication Systems","author":"Mishra Z.","year":"2021"},{"issue":"6","key":"S0219467823500353BIB011","doi-asserted-by":"crossref","first-page":"8987","DOI":"10.48048\/wjst.2021.8987","volume":"18","author":"Mohindra A. R.","year":"2021","journal-title":"Walailak J. Sci. Technol."},{"key":"S0219467823500353BIB012","doi-asserted-by":"crossref","first-page":"102240","DOI":"10.1016\/j.adhoc.2020.102240","volume":"106","author":"Medileh S.","year":"2020","journal-title":"Ad Hoc Netw."},{"issue":"2","key":"S0219467823500353BIB013","doi-asserted-by":"crossref","first-page":"293","DOI":"10.3390\/sym11020293","volume":"11","author":"Rajesh S.","year":"2019","journal-title":"Symmetry"},{"key":"S0219467823500353BIB014","first-page":"363","volume-title":"Int. Workshop Fast Software Encryption","author":"Wheeler D. J.","year":"1994"},{"key":"S0219467823500353BIB015","first-page":"363","volume-title":"Int. Conf. Cryptology in India","author":"Kaps J.-P.","year":"2008"},{"key":"S0219467823500353BIB016","first-page":"254","volume":"2010","author":"Yarrkov E.","year":"2010","journal-title":"Cryptol. ePrint Arch."},{"issue":"5","key":"S0219467823500353BIB017","first-page":"3732","volume":"9","author":"Bhandari R.","year":"2019","journal-title":"Int. J. Electr. Comput. Eng."},{"issue":"4","key":"S0219467823500353BIB019","first-page":"315","volume":"14","author":"Mohanraj V.","year":"2017","journal-title":"Walailak J. Sci. Technol."},{"issue":"6","key":"S0219467823500353BIB020","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1109\/MCE.2018.2851722","volume":"7","author":"Habib M. A.","year":"2018","journal-title":"IEEE Consum. Electron. Mag."},{"key":"S0219467823500353BIB021","doi-asserted-by":"crossref","first-page":"2283","DOI":"10.1007\/s11277-020-07476-y","volume":"114","author":"Vahi A.","year":"2020","journal-title":"Wirel. Pers. Commun."},{"key":"S0219467823500353BIB022","first-page":"450","volume-title":"Int. Workshop Cryptographic Hardware and Embedded Systems","author":"Bogdanov A.","year":"2007"},{"key":"S0219467823500353BIB023","first-page":"8972","volume":"18","author":"Tiwari M. G. D.","year":"2021","journal-title":"Walailak J. Sci. Technol."},{"key":"S0219467823500353BIB024","doi-asserted-by":"crossref","first-page":"1850020","DOI":"10.1142\/S0219467818500201","volume":"18","author":"Sharma H.","year":"2018","journal-title":"Int. J. Image Graph."},{"issue":"1","key":"S0219467823500353BIB025","doi-asserted-by":"crossref","first-page":"143","DOI":"10.3390\/s19010143","volume":"19","author":"Wang Z.","year":"2019","journal-title":"Sensors"},{"volume-title":"Understanding Cryptography: A Textbook for Students and Practitioners","year":"2009","author":"Paar C.","key":"S0219467823500353BIB026"},{"key":"S0219467823500353BIB027","first-page":"1","author":"Biswas A.","year":"2020","journal-title":"J. Ambient Intell. Humaniz. Comput."},{"issue":"1","key":"S0219467823500353BIB028","first-page":"191","volume":"3","author":"Omari A. H.","year":"2009","journal-title":"Int. J. Comput."},{"issue":"3","key":"S0219467823500353BIB029","doi-asserted-by":"crossref","first-page":"4203","DOI":"10.48084\/etasr.2743","volume":"9","author":"Al-Omari A. H.","year":"2019","journal-title":"Eng. Technol. Appl. Sci. Res."},{"issue":"8","key":"S0219467823500353BIB030","first-page":"2759","volume":"62","author":"Fadhil M. S.","year":"2021","journal-title":"Iraqi J. Sci."}],"container-title":["International Journal of Image and Graphics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S0219467823500353","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,4]],"date-time":"2023-08-04T06:00:39Z","timestamp":1691128839000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/10.1142\/S0219467823500353"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,1]]},"references-count":25,"journal-issue":{"issue":"04","published-print":{"date-parts":[[2023,7]]}},"alternative-id":["10.1142\/S0219467823500353"],"URL":"https:\/\/doi.org\/10.1142\/s0219467823500353","relation":{},"ISSN":["0219-4678","1793-6756"],"issn-type":[{"type":"print","value":"0219-4678"},{"type":"electronic","value":"1793-6756"}],"subject":[],"published":{"date-parts":[[2022,7,1]]},"article-number":"2350035"}}