Next Article in Journal
Rwin-FPN++: Rwin Transformer with Feature Pyramid Network for Dense Scene Text Spotting
Next Article in Special Issue
Aspects of Cyber Security in Autonomous and Connected Vehicles
Previous Article in Journal
An Optimized Neuro_Fuzzy Based Regression Trees for Disease Prediction Framework
Previous Article in Special Issue
Privacy-by-Design and Minimization within a Small Electronic Health Record: The Health360 Case Study
 
 
Article
Peer-Review Record

A Secure Real-Time IoT Data Stream Based on Improved Compound Coupled Map Lattices

Appl. Sci. 2022, 12(17), 8489; https://doi.org/10.3390/app12178489
by Shyi-Tsong Wu
Reviewer 1: Anonymous
Appl. Sci. 2022, 12(17), 8489; https://doi.org/10.3390/app12178489
Submission received: 31 July 2022 / Revised: 21 August 2022 / Accepted: 22 August 2022 / Published: 25 August 2022
(This article belongs to the Special Issue AI and Security in Cyber Physical System Design)

Round 1

Reviewer 1 Report

The paper proses an improvement for the coupled map lattices chaotic systems based on the Logistic map and Tent map, respectively. The paper is well organized and provides sufficient background information about the problem and the tools. The authors specify the tools used for implementation, the proposed improvement can be reproduced and the results are sustained through figures and tables. Also, the authors discuss security and performance analysis. Although the paper is well-written overall, I have the following suggestions:

1.       Mention that “mod 1” means the fractional part (see eq 8, for example).

2.       Specify for eq 4 what represents function f.

3.       Add some recent references (there is no reference from the last five years).

4.       Add a comparison with more recent similar existing works.

Author Response

Dear reviewers:

Firstly, the author wishes to thank the reviewers for the great care to our paper and the very useful comments. We have made several modifications in response to the comments and suggestions. The places with modifications were marked in the revised version printed in red color. The replies to the questions raised by reviewers and the revised manuscript were provided in attached files.

We would like to express our gratitude to the reviewers again. The valuable comments have enriched the submitted paper deeply. Thank you very much!

Sincerely,

Shyi-Tsong Wu

Author Response File: Author Response.pdf

Reviewer 2 Report

The study on the previous research work is very poor, the research did not well outline the current state of the art regarding the work associated to "Secure data stream," and it did not provide a foundational understanding from the various numbers of references that are available in the public domain. Aside from that, the paper has a very limited number of references, which is the single most problematic aspect of it. The majority of the previously published works that are referenced here are older than ten years.

While there is an excessive amount of discussion on the history of "Chaos Theory" and the "conceptualization of an Improved technique," the simulation scenarios are entirely absent, and there are no details on how the simulation is carried out, which can be presented in detail and be supported by diagrams. This is despite the fact that there is a great deal of discussion on the background of "Chaos Theory" and the "conceptualization of an Improved technique."

Before moving on to discuss the findings, the experimental scenarios need to be thoroughly developed, which is one of the things that needs to be addressed in the revision of Section 4.

There is a need for a paragraph that is supported by a table for a comparison of the results of this study with those of previous studies, as well as a need to emphasise the extremely important significant differences between the two studies.

The number of references is very low, but the worst part is that they are all more than a decade old, with the exception of two (2013 and 2014), which are still old as far as the trend of contemporary research within the research area is concerned.

 

·         **[In the Abstract]…This is an incomplete sentence “In this paper, we presented an improved chaotic stream cipher based on CML with improvement to overcome the weakness” which is very important and needs to be rephrased…

 

·         Review the entire lexical structure of the paper

Comments for author File: Comments.pdf

Author Response

Dear reviewers:

Firstly, the author wishes to thank the reviewers for the great care to our paper and the very useful comments. We have made several modifications in response to the comments and suggestions. The places with modifications were marked in the revised version printed in red color. The replies to the questions raised by reviewers and the revised manuscript were provided in attached files.

We would like to express our gratitude to the reviewers again. The valuable comments have enriched the submitted paper deeply. Thank you very much!

Sincerely,

 

Shyi-Tsong Wu

Author Response File: Author Response.pdf

Back to TopTop