An efficient approach for enhancing security in Internet of Things using the optimum authentication key

被引:27
作者
Kalyani G. [1 ,2 ]
Chaudhari S. [3 ]
机构
[1] Research Center, School of C&IT, Reva University, Bangalore
[2] Department of CSE, SNIST, Hyderabad
[3] Department of Computer Science and Engineering, M.S Ramaiah Institute of Technology, Bangalore
关键词
classification; DNN; Homomorphic Encryption; IoT; sensitive data; SFF;
D O I
10.1080/1206212X.2019.1619277
中图分类号
学科分类号
摘要
Nowadays, Internet of Things (IoT) is turning into an attractive framework to drive a substantive jump on merchandise and enterprises through physical, digital, and social spaces. This paper enhances IoT security authentication by utilizing cryptographic-based methodologies. In this study, we secure IoT sensitive data with the help of Optimal Homomorphic Encryption (OHE) with high dependability. Sensitive data from IoT dataset are classified based on Deep Learning Neural Network structure (DNN). After classification, OHE performs sensitive data in the process of encryption and decryption. During encryption, the key is authenticated and the optimal key is selected by using Step size Fire Fly (SFF) optimization algorithm. This strategy can build up the encrypted key and attains the most prominent privacy-preserving data in IoT. The outcome shows that the performance of the proposed IoT security model achieves maximum key breaking time and less computational time with high security. © 2019, © 2019 Informa UK Limited, trading as Taylor & Francis Group.
引用
收藏
页码:306 / 314
页数:8
相关论文
共 29 条
[1]  
Qian Y., Jiang Y., Chen J., Et al., Towards decentralized IoT security enhancement: a blockchain approach, Comput Electr Eng, 72, pp. 266-273, (2018)
[2]  
Dawoud A., Shahristani S., Raun C., Deep learning and software-defined networks: towards secure IoT architecture, Internet Things, 3-4, pp. 82-89, (2018)
[3]  
Leveugle R., Mkhinini A., Maistri P., Hardware support for security in the internet of things: from lightweight countermeasures to accelerated homomorphic encryption, Information, 9, 5, pp. 114-128, (2018)
[4]  
Akatyev N., James J.I., Evidence identification in IoT networks based on threat assessment, Future Gener Comput Syst, 93, pp. 814-821, (2017)
[5]  
Yang Y., Zheng X., Guo W., Et al., Privacy-preserving fusion of IoT and big data for e-health, Future Gener Comput Syst, 86, pp. 1437-1455, (2018)
[6]  
Banerjee M., Lee J., Choo K.-K.R., A blockchain future for internet of things security: a position paper, Digital Commun Netw, 4, 3, pp. 149-160, (2018)
[7]  
Chifor B.-C., Bica I., Patriciu V.-V., Et al., A security authorization scheme for smart home internet of things devices, Future Gener Comput Syst, 86, pp. 740-749, (2018)
[8]  
Li T., Gao C., Jiang L., Et al., Publicly verifiable privacy-preserving aggregation and its application in IoT, J Netw Comput Appl, 126, pp. 39-44, (2018)
[9]  
Sha K., Wei W., Andrew Yang T., Et al., On security challenges and open issues in internet of things, Future Gener Comput Syst, 83, pp. 326-337, (2018)
[10]  
Khan M.A., Salah K., Iot security: review, blockchain solutions, and open challenges, Future Gener Comput Syst, 82, pp. 395-411, (2018)