Srour Tarek, El-Bendary Mohsen A M, Eltokhy Mostafa, Abouelazm Atef E
Department of Electronics Technology, Faculty of Technology and Education, Helwan University, Cairo, Egypt.
Department of Electronics and Electrical Communications, Faculty of Electronic Engineering, Menoufia University, Menouf, Egypt.
Sci Rep. 2025 Aug 5;15(1):28567. doi: 10.1038/s41598-025-10022-0.
The vision of 5G and beyond networks is geared towards linking undersea, terrestrial, and space networks together. This vision involves transferring a massive amount of data with very high levels of security. This paper presents the proposed vision of 5G and beyond security to build a research gap of existing and related technique that lack the adaptation, boosting gradient and complexity analysis, through design and evaluate the adapted and graded security system. This paper focuses on designing a security approach to make up the lacks of existing techniques. The paper proposes a Loss-less Triple-level security system that secures the data without loss and high quality of extracted messages. The Triple-level security system consists of three combined/ merged security levels, the classified images are encrypted by two chaos-based tools, the encrypted images are embedded into another fake image or audio file using Singular Value Decomposition-Discrete Wavelet Transform (SVD-DWT) based techniques. Various simulation experiments have been executed to find the best integration between two-Dimensional (2D) Logistic map, SVD, and baker map techniques to ensure the integrity of plaintext and the transparency of the proposed approach. The result analysis of the various computerized experiments reveals that the time of algorithms are 2.13s for ciphering/hiding and 1.57s for deciphering/extracting. Hence, the time complexity of the proposed approach superiors the existing and related research works. The simulation results indicates a 100% perfect match between the original and decrypted. The performance evaluating of the proposed technique proves its robustness, low complexity and high reliability, where the original and extracted message similarity is 100%. The advanced wireless networks require reliable graded complexity security tools with various levels capabilities, therefore, the proposed adapted complexity/levels security system is suitable and applicable for 5G/beyond networks.
5G及未来网络的愿景旨在将海底、地面和空间网络连接在一起。这一愿景涉及以极高的安全性传输大量数据。本文提出了5G及未来安全的愿景,以弥补现有及相关技术在适应性、增强梯度和复杂性分析方面的研究空白,通过设计和评估适应性和分级安全系统来实现。本文着重设计一种安全方法来弥补现有技术的不足。该论文提出了一种无损三级安全系统,该系统能够确保数据无损失且提取的消息质量高。三级安全系统由三个组合/合并的安全级别组成,分类图像通过两种基于混沌的工具进行加密,加密后的图像使用基于奇异值分解-离散小波变换(SVD-DWT)的技术嵌入到另一个伪造图像或音频文件中。已经进行了各种模拟实验,以找到二维(2D)逻辑映射、SVD和面包师映射技术之间的最佳集成,以确保明文的完整性和所提方法的透明度。各种计算机实验的结果分析表明,加密/隐藏算法的时间为2.13秒,解密/提取算法的时间为1.57秒。因此,所提方法的时间复杂度优于现有及相关研究工作。模拟结果表明原始数据和解密后的数据完全匹配。对所提技术的性能评估证明了其鲁棒性、低复杂性和高可靠性,其中原始消息和提取消息的相似度为100%。先进的无线网络需要具有各种级别能力的可靠分级复杂性安全工具,因此,所提的适应性复杂性/级别安全系统适用于5G及未来网络。