{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,10]],"date-time":"2025-12-10T08:19:06Z","timestamp":1765354746625,"version":"3.40.5"},"reference-count":45,"publisher":"Wiley","license":[{"start":{"date-parts":[[2020,10,28]],"date-time":"2020-10-28T00:00:00Z","timestamp":1603843200000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2020,10,28]]},"abstract":"<jats:p>With the rapid development of the Internet, the security of network multimedia data has attracted increasingly more attention. The moving target defense (MTD) and cyber mimic defense (CMD) approaches provide a new way to solve this problem. To enhance the security of network multimedia data, this paper proposes a mimic encryption box for network multimedia data security. The mimic encryption box can directly access the network where the multimedia device is located, automatically complete the negotiation, provide safe and convenient encryption services, and effectively prevent network attacks. According to the principles of dynamization, diversification, and randomization, the mimic encryption box uses a reconfigurable encryption algorithm to encrypt network data and uses IP address hopping, port number hopping, protocol camouflage, and network channel change to increase the attack threshold. Second, the mimic encryption box has a built-in pseudorandom number generator and key management system, which can generate an initial random key and update the key with the hash value of the data packet to achieve \u201cone packet, one key.\u201d Finally, through the cooperation of the ARM and the FPGA, an access control list can be used to filter illegal data and monitor the working status of the system in real time. If an abnormality is found, the feedback reconstruction mechanism is used to \u201cclean\u201d the FPGA to make it work normally again. The experimental results and analysis show that the mimic encryption box designed in this paper has high network encryption performance and can effectively prevent data leakage. At the same time, it provides a mimic security defense mechanism at multiple levels, which can effectively resist a variety of network attacks and has high security.<\/jats:p>","DOI":"10.1155\/2020\/8868672","type":"journal-article","created":{"date-parts":[[2020,10,30]],"date-time":"2020-10-30T01:05:13Z","timestamp":1604019913000},"page":"1-24","source":"Crossref","is-referenced-by-count":8,"title":["Mimic Encryption Box for Network Multimedia Data Security"],"prefix":"10.1155","volume":"2020","author":[{"given":"Xiabing","family":"Zhou","sequence":"first","affiliation":[{"name":"School of Computer Science and Technology, Soochow University, Suzhou 215006, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3455-4901","authenticated-orcid":true,"given":"Bin","family":"Li","sequence":"additional","affiliation":[{"name":"School of Information Engineering, Zhengzhou University, Zhengzhou 450001, China"}]},{"given":"Yanrong","family":"Qi","sequence":"additional","affiliation":[{"name":"School of Information Engineering, Zhengzhou University, Zhengzhou 450001, China"}]},{"given":"Wanying","family":"Dong","sequence":"additional","affiliation":[{"name":"School of Information Engineering, Zhengzhou University, Zhengzhou 450001, China"}]}],"member":"311","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.2964280"},{"first-page":"112","article-title":"Multimedia big data security,","author":"P. Chauhan","key":"2"},{"first-page":"1","article-title":"Intensifying multimedia Information security using comprehensive cipher","author":"V. Nikhila","key":"3"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1016\/j.jocs.2014.10.006"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2935513"},{"first-page":"983","article-title":"A Time-based self-cleaning control mechanism in moving target defense","author":"H. Zhou","key":"6"},{"first-page":"821","article-title":"Overview on moving target network defense","author":"X. Zhou","key":"7"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1049\/cje.2020.02.017"},{"first-page":"627","article-title":"Mitigating crossfire attacks using SDN-based moving target defense","author":"A. Aydeger","key":"9"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.11.045"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/lwc.2018.2797916"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0177111"},{"first-page":"553","article-title":"The Impact of address changes and host diversity on the effectiveness of moving target defense strategy","author":"J. Zheng","key":"13"},{"issue":"2","key":"14","doi-asserted-by":"crossref","first-page":"163","DOI":"10.1109\/TDSC.2015.2443790","article-title":"Assessing the effectiveness of moving target defenses using security models","volume":"13","author":"J. B. Hong","year":"2015","journal-title":"IEEE Transactions on Dependable & Secure Computing"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1155\/2016\/8927169"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2015.2467358"},{"first-page":"738","article-title":"Adversary-aware IP address randomization for proactive agility against sophisticated attackers","author":"J. H. Jafarian","key":"17"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2017.0085"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2017.0086"},{"first-page":"2910","article-title":"Security research of redundancy in mimic defense system","author":"B. Ma","key":"20"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/cc.2017.8068772"},{"first-page":"50","article-title":"A novel framework for zero-day attacks detection and response with cyberspace mimic defense architecture","author":"W. Liu","key":"22"},{"first-page":"2658","article-title":"The architecture of distributed storage system under mimic defense theory","author":"H. Li","key":"23"},{"first-page":"1","article-title":"A novel network security algorithm based on encrypting text into a white-page image","author":"A. Abusukhon","key":"24"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1080\/09720529.2019.1569821"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/access.2018.2832854"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/4657831"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.3906\/elk-1303-12"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.08.007"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1109\/jsyst.2019.2896064"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-020-01860-z"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1109\/tcsii.2019.2939826"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.18576\/amis\/120214"},{"first-page":"1","article-title":"A design of the ethernet firewall Based on FPGA","author":"S. Lin","key":"34"},{"first-page":"400","article-title":"Packet filtering for IPV4 protocol using FPGA","author":"S. M. Keni","key":"35"},{"first-page":"132","article-title":"Net FPGA-based firewall solution for 5G multi-tenant architectures","author":"R. Ricart-Sanchez","key":"36"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.1142\/s0218126616500328"},{"issue":"5","key":"38","first-page":"3350","article-title":"High throughput evaluation of SHA-1 implementation using unfolding transformation","volume":"11","author":"S. Suhaili","year":"2016","journal-title":"ARPN Journal of Engineering and Applied Sciences"},{"issue":"1","key":"39","first-page":"52","article-title":"Circuit and system design for optimal lightweight AES encryption on FPGA","volume":"45","author":"M. M. Wong","year":"2018","journal-title":"IAENG International Journal of Computer Science"},{"first-page":"95","article-title":"A new security approach to support the operations of ECC and AES algorithms on FPGA","author":"A. Hafsa","key":"40"},{"issue":"1","key":"41","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1049\/iet-cdt.2016.0033","article-title":"High-performance elliptic curve cryptography processor over NIST prime fields","volume":"11","author":"M. S. Hossain","year":"2016","journal-title":"IET Computers & Digital Techniques"},{"key":"42","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2018.07.005"},{"key":"43","doi-asserted-by":"publisher","DOI":"10.1049\/cje.2018.11.006"},{"key":"44","doi-asserted-by":"publisher","DOI":"10.1155\/2016\/6371403"},{"first-page":"928","article-title":"Design of reconfigurable LFSR for VLSI IC testing in ASIC and FPGA","author":"K. N. Devika","key":"45"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/8868672.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/8868672.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/8868672.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,30]],"date-time":"2020-10-30T01:05:15Z","timestamp":1604019915000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2020\/8868672\/"}},"subtitle":[],"editor":[{"given":"Zhihua","family":"Xia","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2020,10,28]]},"references-count":45,"alternative-id":["8868672","8868672"],"URL":"https:\/\/doi.org\/10.1155\/2020\/8868672","relation":{},"ISSN":["1939-0122","1939-0114"],"issn-type":[{"type":"electronic","value":"1939-0122"},{"type":"print","value":"1939-0114"}],"subject":[],"published":{"date-parts":[[2020,10,28]]}}}