{"id":"https://openalex.org/W4389576022","doi":"https://doi.org/10.1109/vtc2023-fall60731.2023.10333478","title":"CellSecure: Securing Image Data in Industrial Internet-of-Things via Cellular Automata and Chaos-Based Encryption","display_name":"CellSecure: Securing Image Data in Industrial Internet-of-Things via Cellular Automata and Chaos-Based Encryption","publication_year":2023,"publication_date":"2023-10-10","ids":{"openalex":"https://openalex.org/W4389576022","doi":"https://doi.org/10.1109/vtc2023-fall60731.2023.10333478"},"language":"en","primary_location":{"id":"doi:10.1109/vtc2023-fall60731.2023.10333478","is_oa":false,"landing_page_url":"https://doi.org/10.1109/vtc2023-fall60731.2023.10333478","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE 98th Vehicular Technology Conference (VTC2023-Fall)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5078300087","display_name":"Ali Hassan","orcid":"https://orcid.org/0000-0002-9677-1613"},"institutions":[{"id":"https://openalex.org/I29698356","display_name":"HITEC University","ror":"https://ror.org/013d87239","country_code":"PK","type":"education","lineage":["https://openalex.org/I29698356"]}],"countries":["PK"],"is_corresponding":true,"raw_author_name":"Hassan Ali","raw_affiliation_strings":["HITEC University Taxila,Department of Electrical Engineering,Taxila,Pakistan","Department of Electrical Engineering, HITEC University Taxila, Taxila, Pakistan"],"affiliations":[{"raw_affiliation_string":"HITEC University Taxila,Department of Electrical Engineering,Taxila,Pakistan","institution_ids":["https://openalex.org/I29698356"]},{"raw_affiliation_string":"Department of Electrical Engineering, HITEC University Taxila, Taxila, Pakistan","institution_ids":["https://openalex.org/I29698356"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005946268","display_name":"Muhammad Shahbaz Khan","orcid":"https://orcid.org/0000-0002-7166-6681"},"institutions":[{"id":"https://openalex.org/I251738","display_name":"Edinburgh Napier University","ror":"https://ror.org/03zjvnn91","country_code":"GB","type":"education","lineage":["https://openalex.org/I251738"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Muhammad Shahbaz Khan","raw_affiliation_strings":["Edinburgh Napier University,School of Computing, Engineering and the Built Environment,Edinburgh,UK","School of Computing, Engineering and the Built Environment, Edinburgh Napier University, Edinburgh, UK"],"affiliations":[{"raw_affiliation_string":"Edinburgh Napier University,School of Computing, Engineering and the Built Environment,Edinburgh,UK","institution_ids":["https://openalex.org/I251738"]},{"raw_affiliation_string":"School of Computing, Engineering and the Built Environment, Edinburgh Napier University, Edinburgh, UK","institution_ids":["https://openalex.org/I251738"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5074460563","display_name":"Maha Driss","orcid":"https://orcid.org/0000-0001-8236-8746"},"institutions":[{"id":"https://openalex.org/I83259278","display_name":"Manouba University","ror":"https://ror.org/0503ejf32","country_code":"TN","type":"education","lineage":["https://openalex.org/I83259278"]},{"id":"https://openalex.org/I142024983","display_name":"Prince Sultan University","ror":"https://ror.org/053mqrf26","country_code":"SA","type":"education","lineage":["https://openalex.org/I142024983"]}],"countries":["SA","TN"],"is_corresponding":false,"raw_author_name":"Maha Driss","raw_affiliation_strings":["Prince Sultan University,Robotics and Internet-of-Things Laboratory,Riyadh,Saudi Arabia","RIADI Laboratory, National School of Computer Sciences University of Manouba, Manouba, Tunisia","Robotics and Internet-of-Things Laboratory, Prince Sultan University, Riyadh, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Prince Sultan University,Robotics and Internet-of-Things Laboratory,Riyadh,Saudi Arabia","institution_ids":["https://openalex.org/I142024983"]},{"raw_affiliation_string":"RIADI Laboratory, National School of Computer Sciences University of Manouba, Manouba, Tunisia","institution_ids":["https://openalex.org/I83259278"]},{"raw_affiliation_string":"Robotics and Internet-of-Things Laboratory, Prince Sultan University, Riyadh, Saudi Arabia","institution_ids":["https://openalex.org/I142024983"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100754273","display_name":"Jawad Ahmad","orcid":"https://orcid.org/0000-0001-6289-8248"},"institutions":[{"id":"https://openalex.org/I251738","display_name":"Edinburgh Napier University","ror":"https://ror.org/03zjvnn91","country_code":"GB","type":"education","lineage":["https://openalex.org/I251738"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Jawad Ahmad","raw_affiliation_strings":["Edinburgh Napier University,School of Computing, Engineering and the Built Environment,Edinburgh,UK","School of Computing, Engineering and the Built Environment, Edinburgh Napier University, Edinburgh, UK"],"affiliations":[{"raw_affiliation_string":"Edinburgh Napier University,School of Computing, Engineering and the Built Environment,Edinburgh,UK","institution_ids":["https://openalex.org/I251738"]},{"raw_affiliation_string":"School of Computing, Engineering and the Built Environment, Edinburgh Napier University, Edinburgh, UK","institution_ids":["https://openalex.org/I251738"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5068020099","display_name":"William J. Buchanan","orcid":"https://orcid.org/0000-0003-0809-3523"},"institutions":[{"id":"https://openalex.org/I251738","display_name":"Edinburgh Napier University","ror":"https://ror.org/03zjvnn91","country_code":"GB","type":"education","lineage":["https://openalex.org/I251738"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"William J. Buchanan","raw_affiliation_strings":["Edinburgh Napier University,School of Computing, Engineering and the Built Environment,Edinburgh,UK","School of Computing, Engineering and the Built Environment, Edinburgh Napier University, Edinburgh, UK"],"affiliations":[{"raw_affiliation_string":"Edinburgh Napier University,School of Computing, Engineering and the Built Environment,Edinburgh,UK","institution_ids":["https://openalex.org/I251738"]},{"raw_affiliation_string":"School of Computing, Engineering and the Built Environment, Edinburgh Napier University, Edinburgh, UK","institution_ids":["https://openalex.org/I251738"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5082150685","display_name":"Nikolaos Pitropakis","orcid":"https://orcid.org/0000-0002-3392-9970"},"institutions":[{"id":"https://openalex.org/I251738","display_name":"Edinburgh Napier University","ror":"https://ror.org/03zjvnn91","country_code":"GB","type":"education","lineage":["https://openalex.org/I251738"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Nikolaos Pitropakis","raw_affiliation_strings":["Edinburgh Napier University,School of Computing, Engineering and the Built Environment,Edinburgh,UK","School of Computing, Engineering and the Built Environment, Edinburgh Napier University, Edinburgh, UK"],"affiliations":[{"raw_affiliation_string":"Edinburgh Napier University,School of Computing, Engineering and the Built Environment,Edinburgh,UK","institution_ids":["https://openalex.org/I251738"]},{"raw_affiliation_string":"School of Computing, Engineering and the Built Environment, Edinburgh Napier University, Edinburgh, UK","institution_ids":["https://openalex.org/I251738"]}]}],"institutions":[],"countries_distinct_count":4,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5078300087"],"corresponding_institution_ids":["https://openalex.org/I29698356"],"apc_list":null,"apc_paid":null,"fwci":0.9825,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.78557133,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":97,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12162","display_name":"Cellular Automata and Applications","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9782999753952026,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.8296493291854858},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8133010864257812},{"id":"https://openalex.org/keywords/scrambling","display_name":"Scrambling","score":0.5372412800788879},{"id":"https://openalex.org/keywords/chaotic","display_name":"Chaotic","score":0.520821213722229},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.46408435702323914},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.44764092564582825},{"id":"https://openalex.org/keywords/probabilistic-encryption","display_name":"Probabilistic encryption","score":0.4447435140609741},{"id":"https://openalex.org/keywords/data-security","display_name":"Data security","score":0.43105578422546387},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.42894691228866577},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.4262950122356415},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4231995940208435},{"id":"https://openalex.org/keywords/security-analysis","display_name":"Security analysis","score":0.41257500648498535},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3681783080101013},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3393855094909668},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.28649452328681946},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.20690873265266418},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.17178994417190552}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.8296493291854858},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8133010864257812},{"id":"https://openalex.org/C182548165","wikidata":"https://www.wikidata.org/wiki/Q2261483","display_name":"Scrambling","level":2,"score":0.5372412800788879},{"id":"https://openalex.org/C2777052490","wikidata":"https://www.wikidata.org/wiki/Q5072826","display_name":"Chaotic","level":2,"score":0.520821213722229},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.46408435702323914},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.44764092564582825},{"id":"https://openalex.org/C54569210","wikidata":"https://www.wikidata.org/wiki/Q7246854","display_name":"Probabilistic encryption","level":3,"score":0.4447435140609741},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.43105578422546387},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.42894691228866577},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.4262950122356415},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4231995940208435},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.41257500648498535},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3681783080101013},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3393855094909668},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.28649452328681946},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.20690873265266418},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.17178994417190552}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/vtc2023-fall60731.2023.10333478","is_oa":false,"landing_page_url":"https://doi.org/10.1109/vtc2023-fall60731.2023.10333478","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE 98th Vehicular Technology Conference (VTC2023-Fall)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.550000011920929}],"awards":[],"funders":[{"id":"https://openalex.org/F4320334322","display_name":"HORIZON EUROPE Framework Programme","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W2007326055","https://openalex.org/W3005115714","https://openalex.org/W3008319366","https://openalex.org/W3022797367","https://openalex.org/W3037160582","https://openalex.org/W3118401597","https://openalex.org/W3194478349","https://openalex.org/W4210663935","https://openalex.org/W4213321098","https://openalex.org/W4213452758","https://openalex.org/W4220860940","https://openalex.org/W4280499654","https://openalex.org/W4308437198","https://openalex.org/W4313595987","https://openalex.org/W4319068553","https://openalex.org/W4361007006"],"related_works":["https://openalex.org/W936781193","https://openalex.org/W4297633779","https://openalex.org/W69312893","https://openalex.org/W2349686135","https://openalex.org/W84934912","https://openalex.org/W2353936545","https://openalex.org/W2153933599","https://openalex.org/W4360996053","https://openalex.org/W2532773099","https://openalex.org/W2352125166"],"abstract_inverted_index":{"In":[0],"the":[1,133,139,145,174,177,200,207],"era":[2],"of":[3,50,144,176,191,196],"Industrial":[4],"IoT":[5],"(IIoT)":[6],"and":[7,27,38,61,83,96,116,142,193],"Industry":[8],"4.0,":[9],"ensuring":[10],"secure":[11],"data":[12,21,37,59,123],"transmission":[13],"has":[14,168],"become":[15],"a":[16,75,156,194],"critical":[17,71],"concern.":[18],"Among":[19],"other":[20],"types,":[22],"images":[23,52],"are":[24],"widely":[25],"transmitted":[26],"utilized":[28],"across":[29],"various":[30],"IIoT":[31,82],"applications,":[32],"ranging":[33],"from":[34],"sensor-generated":[35],"visual":[36],"real-time":[39],"remote":[40],"monitoring":[41],"to":[42,137,172],"quality":[43],"control":[44],"in":[45,124,132,152,206],"production":[46],"lines.":[47],"The":[48,87,98],"encryption":[49,78,115,134],"these":[51,70],"is":[53,148,163],"essential":[54],"for":[55,81,108,120,150],"maintaining":[56],"operational":[57],"integrity,":[58],"confidentiality,":[60],"seamless":[62],"integration":[63],"with":[64,93,188],"analytics":[65],"platforms.":[66],"This":[67,198],"paper":[68],"addresses":[69],"concerns":[72],"by":[73],"proposing":[74],"robust":[76],"image":[77],"algorithm":[79,88,184],"tailored":[80],"Cyber-Physical":[84],"Systems":[85],"(CPS).":[86],"combines":[89],"Rule-30":[90],"cellular":[91,101],"automata":[92,102],"chaotic":[94,140,158],"scrambling":[95],"substitution.":[97],"Rule":[99],"30":[100],"serves":[103],"as":[104],"an":[105,189],"efficient":[106],"mechanism":[107],"generating":[109],"pseudo-random":[110],"sequences":[111],"that":[112,182],"enable":[113],"fast":[114],"decryption":[117],"cycles":[118],"suitable":[119],"realtime":[121],"sensor":[122],"industrial":[125,154,208],"settings.":[126],"Most":[127],"importantly,":[128],"it":[129],"induces":[130],"non-linearity":[131],"algorithm.":[135,179],"Furthermore,":[136],"increase":[138],"range":[141],"keyspace":[143],"algorithm,":[146],"which":[147],"vital":[149],"security":[151,166],"distributed":[153],"networks,":[155],"hybrid":[157],"map,":[159],"i.e.,":[160],"logistic-sine":[161],"map":[162],"utilized.":[164],"Extensive":[165],"analysis":[167],"been":[169],"carried":[170],"out":[171],"validate":[173],"efficacy":[175],"proposed":[178],"Results":[180],"indicate":[181],"our":[183],"achieves":[185],"close-to-ideal":[186],"values,":[187],"entropy":[190],"7.99":[192],"correlation":[195],"0.002.":[197],"enhances":[199],"algorithm's":[201],"resilience":[202],"against":[203],"potential":[204],"cyber-attacks":[205],"domain.":[209]},"counts_by_year":[{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":4}],"updated_date":"2026-01-09T23:09:53.351390","created_date":"2025-10-10T00:00:00"}
