Enhancement of IoT device security using an Improved Elliptic Curve Cryptography algorithm and malware detection utilizing deep LSTM

被引:17
作者
Devi, R. Aiyshwariya [1 ]
Arunachalam, A. R. [1 ]
机构
[1] Dr MGR Educ & Res Inst, Dept Comp Sci & Engn, Chennai 600095, India
来源
HIGH-CONFIDENCE COMPUTING | 2023年 / 3卷 / 02期
关键词
Deep LSTM; Improved Elliptic Curve Cryptography; Malware detection; Prediction of different kinds of attacks; IoT gadgets; AUTHENTICATION SCHEME; INTERNET; MULTIPLICATION; ENCRYPTION;
D O I
10.1016/j.hcc.2023.100117
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of things (IoT) has become more popular due to the development and potential of smart technology aspects. Security concerns against IoT infrastructure, applications, and devices have grown along with the need for IoT technologies. Enhanced system security protocols are difficult due to the diverse capabilities of IoT devices and the dynamic, ever-changing environment, and simply applying basic security requirements is dangerous. Therefore, this proposed work designs a malware detection and prevention approach for secure data transmission among IoT gadgets. The malware detection approach is designed with the aid of a deep learning approach. The initial process is identifying attack nodes from normal nodes through a trust value using contextual features. After discovering attack nodes, these are considered for predicting different kinds of attacks present in the network, while some preprocessing and feature extraction strategies are applied for effective classification. The Deep LSTM classifier is applied for this malware detection approach. Once completed malware detection, prevention is performed with the help of the Improved Elliptic Curve Cryptography (IECC) algorithm. A hybrid MA-BW optimization is adopted for selecting the optimal key during transmission. Python 3.8 software is used to test the performance of the proposed approach, and several existing techniques are considered to evaluate its performance. The proposed approach obtained 95% of accuracy, 5% of error value and 92% of precision. In addition, the improved ECC algorithm is also compared with some existing algorithm which takes 6.02 s of execution time. Compared to the other methods, the proposed approach provides better security to IoT gadgets during data transmission. (c) 2023 The Author(s). Published by Elsevier B.V. on behalf of Shandong University. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).
引用
收藏
页数:14
相关论文
共 32 条
[1]   Design and implementation of automated IoT security testbed [J].
Abu Waraga, Omnia ;
Bettayeb, Meriem ;
Nasir, Qassim ;
Abu Talib, Manar .
COMPUTERS & SECURITY, 2020, 88
[2]   Automated Detection of Parkinson's Disease Based on Multiple Types of Sustained Phonations Using Linear Discriminant Analysis and Genetically Optimized Neural Network [J].
Ali, Liaqat ;
Zhu, Ce ;
Zhang, Zhonghao ;
Liu, Yipeng .
IEEE JOURNAL OF TRANSLATIONAL ENGINEERING IN HEALTH AND MEDICINE, 2019, 7
[3]   Improved Blowfish Algorithm-Based Secure Routing Technique in IoT-Based WSN [J].
Alotaibi, Majid .
IEEE ACCESS, 2021, 9 (09) :159187-159197
[4]   Conditional Privacy-Preserving Authentication Scheme Without Using Point Multiplication Operations Based on Elliptic Curve Cryptography (ECC) [J].
Alshudukhi, Jalawi Sulaiman ;
Mohammed, Badiea Abdulkarem ;
Al-Mekhlafi, Zeyad Ghaleb .
IEEE ACCESS, 2020, 8 :222032-222040
[5]   Threat of Adversarial Attacks on DL-Based IoT Device Identification [J].
Bao, Zhida ;
Lin, Yun ;
Zhang, Sicheng ;
Li, Zixin ;
Mao, Shiwen .
IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (11) :9012-9024
[6]   Network Intrusion Detection for IoT Security Based on Learning Techniques [J].
Chaabouni, Nadia ;
Mosbah, Mohamed ;
Zemmari, Akka ;
Sauvignac, Cyrille ;
Faruki, Parvez .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (03) :2671-2701
[7]   A Lightweight ECC-Based Authentication Scheme for Internet of Things (IoT) [J].
Hammi, Badis ;
Fayad, Achraf ;
Khatoun, Rida ;
Zeadally, Sherali ;
Begriche, Youcef .
IEEE SYSTEMS JOURNAL, 2020, 14 (03) :3440-3450
[8]   IoT Device security through dynamic hardware isolation with cloud-Based update [J].
Hategekimana, Festus ;
Whitaker, Taylor J. L. ;
Pantho, Md Jubaer Hossain ;
Bobda, Christophe .
JOURNAL OF SYSTEMS ARCHITECTURE, 2020, 109
[9]   An Unsupervised Deep Learning Model for Early Network Traffic Anomaly Detection [J].
Hwang, Ren-Hung ;
Peng, Min-Chun ;
Huang, Chien-Wei ;
Lin, Po-Ching ;
Van-Linh Nguyen .
IEEE ACCESS, 2020, 8 :30387-30399
[10]   An LSTM-Based Deep Learning Approach for Classifying Malicious Traffic at the Packet Level [J].
Hwang, Ren-Hung ;
Peng, Min-Chun ;
Van-Linh Nguyen ;
Chang, Yu-Lun .
APPLIED SCIENCES-BASEL, 2019, 9 (16)