{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T13:26:50Z","timestamp":1767706010769,"version":"build-2065373602"},"reference-count":27,"publisher":"MDPI AG","issue":"13","license":[{"start":{"date-parts":[[2020,6,28]],"date-time":"2020-06-28T00:00:00Z","timestamp":1593302400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"publisher","award":["2018R1A2B6009620"],"award-info":[{"award-number":["2018R1A2B6009620"]}],"id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>Along with the recent growth of Internet of Things (IoT) security camera market, there have been a number of personal information leakage incidents from security attacks targeting such cameras. Therefore, a permutation-based video encryption algorithm was proposed to secure video streams in low-performance processors such as IoT security cameras. However, existing permutation-based video encryption algorithms are vulnerable to known-plaintext attacks since they use the same permutation list for every frame. Moreover, situation deduction based on the color composition is possible. In this paper, we propose a new permutation-based video encryption algorithm that updates the permutation list for every frame using a crypto secure pseudo-random number generator without significantly increasing memory usage. By doing so, the algorithm becomes robust to known-plaintext attacks, which has been a common problem with existing permutation-based video encryption algorithms. In addition, color channel separation can prevent attackers from deducing situations through color composition. Pre-compression encryption is applied to make the algorithm robust to data loss because of packet loss. We implement the proposed algorithm and conduct an experiment to show its performance in terms of probability of data loss because of packet loss, encryption speed, and memory usage.<\/jats:p>","DOI":"10.3390\/s20133627","type":"journal-article","created":{"date-parts":[[2020,6,29]],"date-time":"2020-06-29T11:17:17Z","timestamp":1593429437000},"page":"3627","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["JLVEA: Lightweight Real-Time Video Stream Encryption Algorithm for Internet of Things"],"prefix":"10.3390","volume":"20","author":[{"given":"Junhyeok","family":"Yun","sequence":"first","affiliation":[{"name":"School of Computer Engineering &amp; Applied Mathematics, Computer System Institute, Hankyong National University, Jungang-ro, Anseong-si, Gyeonggi-do 17579, Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4896-7400","authenticated-orcid":false,"given":"Mihui","family":"Kim","sequence":"additional","affiliation":[{"name":"School of Computer Engineering &amp; Applied Mathematics, Computer System Institute, Hankyong National University, Jungang-ro, Anseong-si, Gyeonggi-do 17579, Korea"}]}],"member":"1968","published-online":{"date-parts":[[2020,6,28]]},"reference":[{"key":"ref_1","first-page":"13","article-title":"A review on security in smart home development","volume":"15","author":"Robles","year":"2010","journal-title":"IJAST"},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Lin, H., and Bergmann, N.W. (2016). IoT privacy and security challenges for smart home environments. Information, 7.","DOI":"10.3390\/info7030044"},{"key":"ref_3","first-page":"1594","article-title":"Smart contract-based access control for the internet of things","volume":"6","author":"Zhang","year":"2018","journal-title":"IEEE IoT-J"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"86384","DOI":"10.1109\/ACCESS.2019.2926354","article-title":"Sensitive and energetic IoT access control for managing cloud electronic health records","volume":"7","author":"Riad","year":"2019","journal-title":"IEEE Access"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"9305","DOI":"10.1016\/j.ijleo.2016.07.024","article-title":"An efficient chaos pseudo-random number generator applied to video encryption","volume":"127","author":"Xu","year":"2016","journal-title":"Optik"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"335","DOI":"10.20965\/jaciii.2020.p0335","article-title":"HEVC Video Encryption Algorithm Based on Integer Dynamic Coupling Tent Mapping","volume":"24","author":"Liu","year":"2020","journal-title":"JACIII"},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Gusmeroli, S., Piccione, S., and Rotondi, D. IoT access control issues: A capability based approach. Proceedings of the 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, Washington, DC, USA.","DOI":"10.1109\/IMIS.2012.38"},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Zhang, Z.K., Cho, M.C.Y., Wang, C.W., Hsu, C.W., Chen, C.K., and Shieh, S. (2014, January 17). IoT security: Ongoing challenges and research opportunities. Proceedings of the 2014 IEEE 7th International Conference on Service-Oriented Computing and Applications, Matsue, Japan.","DOI":"10.1109\/SOCA.2014.58"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"419","DOI":"10.1007\/s00530-017-0568-3","article-title":"Efficient HEVC selective stream encryption using chaotic logistic map","volume":"24","author":"Sallam","year":"2018","journal-title":"Multimedia Syst."},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Kartsch, V., Guermandi, M., Benatti, S., Montagna, F., and Benini, L. (2019, January 11). An Energy-Efficient IoT node for HMI applications based on an ultra-low power Multicore Processor. Proceedings of the 2019 IEEE Sensors Applications Symposium, Sophia Antipolis, France.","DOI":"10.1109\/SAS.2019.8705984"},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Jayakumar, H., Lee, K., Lee, W.S., Raha, A., Kim, Y., and Raghunathan, V. Powering the internet of things. Proceedings of the 2014 International Symposium on Low Power Electronics and Design, La Jolla, CA, USA.","DOI":"10.1145\/2627369.2631644"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1016\/S1353-4858(10)70006-4","article-title":"Advanced encryption standard (AES)","volume":"2009","author":"Heron","year":"2009","journal-title":"Netw. Secur."},{"key":"ref_13","unstructured":"Lee, H.J., Lee, S.J., Yoon, J.H., Cheon, D.H., and Lee, J.I. (2020, June 23). The SEED encryption algorithm. Available online: http:\/\/citeseerx.ist.psu.edu\/viewdoc\/summary?doi=10.1.1.374.3466."},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Liu, F., and Koenig, H. (2005, January 19). Puzzle-A novel video encryption algorithm. Proceedings of the IFIP International Conference on Communications and Multimedia Security, Berlin, Germany.","DOI":"10.1007\/11552055_9"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"1","DOI":"10.9790\/9622-0707030105","article-title":"Video encryption algorithm and key management using perfect shuffle","volume":"7","author":"Sultana","year":"2017","journal-title":"IJERA"},{"key":"ref_16","unstructured":"Shelby, Z., Hartke, K., and Bormann, C. (2020, June 23). The constrained application protocol. Available online: https:\/\/datatracker.ietf.org\/doc\/rfc7252\/."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"2710","DOI":"10.1016\/j.adhoc.2013.05.003","article-title":"DTLS based security and two-way authentication for the Internet of Things","volume":"11","author":"Kothmayr","year":"2013","journal-title":"Ad Hoc Networks"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Nurrohman, A., and Abdurohman, M. (2018, January 3). High Performance Streaming Based on H264 and Real Time Messaging Protocol (RTMP). Proceedings of the 2018 6th International Conference on Information and Communication Technology, Bandung, Indonesia.","DOI":"10.1109\/ICoICT.2018.8528770"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Hamalainen, P., Alho, T., Hannikainen, M., and Hamalainen, T.D. (2006, January 30). Design and implementation of low-area and low-power AES encryption hardware core. Proceedings of the 9th EUROMICRO Conference on Digital System Design, Dubrovnik, Croatia.","DOI":"10.1109\/DSD.2006.40"},{"key":"ref_20","first-page":"116","article-title":"MPEG Encryption by Zigzag, Partitioning and Swapping","volume":"10","author":"Akhter","year":"2010","journal-title":"IJCSNS"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"25722","DOI":"10.1109\/ACCESS.2020.2969768","article-title":"IEEE Access Special Section Editorial: Trusted Computing","volume":"8","author":"Yan","year":"2020","journal-title":"IEEE Access"},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Gen\u00e7, Z.A., Lenzini, G., and Ryan, P.Y. (2019, January 27). NoCry: No More Secure Encryption Keys for Cryptographic Ransomware. Proceedings of the International Workshop on Emerging Technologies for Authorization and Authentication, Luxembourg City, Luxembourg.","DOI":"10.1007\/978-3-030-39749-4_5"},{"key":"ref_23","unstructured":"(2020, June 22). GnuTLS. Available online: https:\/\/www.gnutls.org\/."},{"key":"ref_24","unstructured":"(2020, May 20). PyCrypto. Available online: https:\/\/pypi.org\/project\/pycrypto\/."},{"key":"ref_25","unstructured":"(2020, May 20). BCM2837\u2013 Raspberry Pi Documentation. Available online: https:\/\/www.raspberrypi.org\/documentation\/hardware\/raspberrypi\/bcm2837\/README.md."},{"key":"ref_26","unstructured":"Zhou, X., and Tang, X. (2011, January 22). Research and implementation of RSA algorithm for encryption and decryption. Proceedings of the 2011 6th International Forum on Strategic Technology, Harbin, China."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1007\/s102070100002","article-title":"The elliptic curve digital signature algorithm (ECDSA)","volume":"1","author":"Johnson","year":"2001","journal-title":"IJIS"}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/20\/13\/3627\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T09:44:00Z","timestamp":1760175840000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/20\/13\/3627"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6,28]]},"references-count":27,"journal-issue":{"issue":"13","published-online":{"date-parts":[[2020,7]]}},"alternative-id":["s20133627"],"URL":"https:\/\/doi.org\/10.3390\/s20133627","relation":{},"ISSN":["1424-8220"],"issn-type":[{"type":"electronic","value":"1424-8220"}],"subject":[],"published":{"date-parts":[[2020,6,28]]}}}