Network security in resource-constrained environments has become a critical challenge due to limited memory, power restrictions, and vulnerabilities to encryption attacks. Traditional approaches, such as Proxy Re-Encryption (PRE) and Lightweight Symmetric Asymmetric Encryption (LSAE), often sufferfrom computational overhead, latency, and inefficiency in real-timesystems. To address theseconcerns, this workproposesaSecureHashedIdentityMessageAuthentication (SHIMA) model that ensures data integrity, authentication, and efficient end-to-end encryption.Theproposed schemeintegrates SHIMAwithimprovedalgorithmssuchasAdvancedEncryption RSA (AERSA), Mono-alphabetic key substitution, and a modifiedCaesarcipher,therebyachievingenhancedsecurityand reduced latency. Simulation results demonstrate that SHIMA minimizes time complexity, improves packet delivery ratio, and increases throughput when compared to conventional schemes like PRE and LSAE. This framework provides a robust foundation for efficient, scalable, and secure communication across networked environments
Introduction
1. Introduction
With the growth of cloud computing, wireless networks, and distributed systems, ensuring secure, efficient, and low-latency data transmission has become essential. Traditional encryption models—such as RSA, Proxy Re-Encryption (PRE), and Lightweight Symmetric Asymmetric Encryption (LSAE)—face scalability, latency, and vulnerability issues, especially under real-time and resource-constrained conditions.
2. Problem Statement
Conventional encryption methods are limited by:
High computational costs
Key management difficulties
Vulnerabilities to brute-force, replay, and insider attacks
Identity-Based Encryption (IBE) helps reduce reliance on Public Key Infrastructure (PKI), but modern attacks require even more robust and lightweight models.
3. Proposed Solution: SHIMA Framework
The Secure Hashed Identity Message Authentication (SHIMA) framework introduces a multi-layered, lightweight, and highly secure encryption scheme to address these challenges.
Key Features:
Assigns unique hashed identities for each session
Minimizes re-encryption delays
Enhances authentication, confidentiality, and integrity
Reduces overhead in real-time and IoT environments
4. Core Components of SHIMA
Component
Function
Advanced Encryption RSA (AERSA)
Optimizes RSA with non-prime randomization for faster and stronger encryption
SHIMA Identity Hashing
Generates 160-bit identity-based hashes per message; resists forgery and replay attacks
Trapdoor Generation
Uses 512-bit padded message blocks and 80 hash rounds to secure identities
Mono-Alphabetic Substitution
Adds confusion layer by substituting characters (e.g., A→U, B→N)
Modified Caesar Cipher
Applies key-dependent character shifts to resist frequency analysis
Secure Transmission
Verifies hashed identity at receiver before decryption
Attack Resistance
Combines layers to prevent brute-force, replay, insider, and cryptanalytic attacks
5. Performance Benefits
Lower latency and reduced re-encryption overhead
Improved packet delivery ratio and throughput
Suitable for:
IoT networks
Wireless communication
Cloud-based and distributed systems
6. Motivation and Need
SHIMA addresses the urgent demand for secure and lightweight encryption systems capable of operating in environments with:
Limited power, memory, or processing (e.g., IoT devices)
High-speed real-time communication needs
Increasing risk of identity spoofing and adaptive cyberattacks
7. Literature Survey Highlights
Prior methods and studies (2015–2024) attempted to improve encryption efficiency, identity-based security, searchable encryption, and cryptographic resilience. However, most face one or more of the following limitations:
High implementation complexity
Scalability issues
Vulnerability to keyword guessing, insider threats, or cryptanalysis
Lack of real-world adaptability
Poor performance under low-resource or real-time conditions
Conclusion
Withtheincreasingrelianceonnetworkedcommunicationsystems, the need for secure, efficient, and scalable encryption mechanisms has become more critical than ever. Conventional methods such as Proxy Re-Encryption (PRE) and Lightweight Symmetric Asymmetric Encryption (LSAE) offer certain advantages but are limited by latency, computational complexity, and vulnerability to adaptive attacks.
The proposed Secure Hashed Identity Message Authentication (SHIMA) framework addresses these challenges by combining identity-based hashing with layered cryptographic techniques such as AERSA, mono-alphabetic substitution, and modified Caesar cipher. This integration ensures that transmitted data maintains its confidentiality,authenticity,andintegritywhilealsominimizingre- encryption delays.
Simulation results validate that SHIMA outperforms existing models by achieving lower latency, reduced time complexity, higher packet delivery ratios, and improved throughput performance. Furthermore, its lightweight design makes it suitable for resource-constrained devices in IoT and wireless environments as well as for larger-scale distributed cloud systems.
Thus, SHIMA provides a balanced solution that combines robustness with practicality, making it a strong candidate for next- generation secure communication frameworks.
References
[1] X. Duan and X. Wang, “Authentication handover and privacy protection in 5G HetNets using software-defined networking,” IEEE Communications Magazine, vol. 53, no. 4, pp. 28–35, Apr. 2015.
[2] Y.Feng and C. Zhaohui, “Overview of SM9 identification and cryptography algorithm,” Information Security Research, vol. 2, no. 11, pp. 1008–1027, 2016.
[3] S.R.Shree,A.C.Chelvan,andM.Rajesh,“AnefficientRSA cryptosystem by applying cuckoo search optimization algorithm,” Concurrency and Computation: Practice and Experience, vol. 31, no. 12, Jun. 2019.
[4] W. Jiajia, Y. Chuanwei, W. Lei, and S. Jiaqi, “Research on LTE decryptionmethodbasedonairinterface,”Electronics Products World, vol. 26, no. 8, pp. 40–42, 2019.
[5] F.Liu,W.Huo,Y.Han,S.Yang,andX.Li,“Studyonnetwork security based on PCA and BP neural network under green communication,” IEEE Access, vol. 8, pp. 53733–53749, 2020.
[6] B. Chen, L. Wu, H. Wang, L. Zhou, and D. He, “A blockchain-based searchable public-key encryption with forward and backward privacy for cloud-assisted vehicular social networks,” IEEE Transactions on Vehicular Technology, pp. 1–1, 2019.
[7] L. J. L. Sujan, V. D. Telagadi, C. G. Raghavendra, B. M. J. Srujan,R.B.VinayPrasad,B.D.Parameshachari,andK.L. Hemalatha, “Joint reduction of sidelobe and PMEPR in multicarrierradarsignal,”inCognitiveInformaticsandSoft Computing:ProceedingsofCISC2020,SpringerSingapore, 2021, pp. 457–464.
[8] B. Chen, L. Wu, N. Kumar, K.-K. R. Choo, and D. He, “Lightweightsearchablepublic-keyencryptionwithforward privacy over IIoT outsourced data,” IEEE Transactions on Emerging Topics in Computing, 2019.
[9] S.-F. Sun, X. Yuan, J. K. Liu, R. Seinfeld, A. Sakzad, V. Vo, and S. Nepal, “Practical backward-secure searchable encryption from symmetric puncturable encryption,” in Proceedings of the 2018 ACM SIGSAC Conference on ComputerandCommunicationsSecurity,pp.763–780,2018.
[10] P. R. Nalla and K. M. Chalavadi, “Iris classification based on sparse representations using on-line dictionary learning for large-scale de-duplication applications,” SpringerPlus, vol. 4, no. 238, 2015.
[11] Y. Miao, J. Weng, X. Liu, K.-K. R. Choo, Z. Liu, and H. Li, “Enablingverifiablemultiplekeywordsearchoverencrypted clouddata,”InformationSciences,vol.465,pp.21–37,2018.
[12] M.Naveed,S.Kamara,andC.V.Wright,“Inferenceattacks on property-preserving encrypted databases,” in Proceedings of the 22nd ACM SIGSAC Conference on ComputerandCommunicationsSecurity,pp.644–655,2015.
[13] L.Sun, C. Xu, M. Zhang, K. Chen, and H. Li, “Secure searchable public key encryption against insider keyword guessing attacks from indistinguishability obfuscation,”
[14] G.HemanthKumarandG.P.Ramesh,“Reducingpower feasting and extend network life time of IoT devices through localization,”InternationalJournalofAdvancedScienceand Technology, vol. 28, no. 12, pp. 297–305, 2019.
[15] “Lightweight authenticated-encryption scheme for Internet of Things based on publish-subscribe communication,” IEEE Access, pp. 60539–60551, 2019.