EGCrypto: A Low-Complexity Elliptic Galois Cryptography Model for Secure Data Transmission in IoT

被引:17
作者
Kaur, Manjit [1 ]
Alzubi, Ahmad Ali [2 ]
Walia, Tarandeep Singh [3 ]
Yadav, Vaishali [4 ]
Kumar, Naresh [5 ]
Singh, Dilbag [6 ,7 ]
Lee, Heung-No [8 ]
机构
[1] SR Univ, Sch Comp Sci & Artificial Intelligence, Warangal 506371, Telangana, India
[2] King Saud Univ, Community Coll, Dept Comp Sci, Riyadh 11421, Saudi Arabia
[3] Lovely Profess Univ, Sch Comp Applicat, Phagwara 144411, Punjab, India
[4] Manipal Univ Jaipur, Dept Comp & Commun Engn, Jaipur 303007, India
[5] Maharaja Surajmal Inst Technol, Dept Comp Sci & Engn, New Delhi 110058, India
[6] New York Univ Grossman Sch Med, Ctr Biomed Imaging, Dept Radiol, New York, NY 10016 USA
[7] Gwangju Inst Sci & Technol, Blockchain Intelligence Convergence Ctr, Gwangju 61005, South Korea
[8] Gwangju Inst Sci & Technol, Sch Elect Engn & Comp Sci, Gwangju 61005, South Korea
关键词
Cryptography; Internet of Things; Encryption; Steganography; Security; Elliptic curve cryptography; Data models; Data security; Galois fields; Hyperparameter optimization; the Internet of Things; secure communication; cryptography; steganography; elliptic Galois; differential evolution; hyperparameters; encryption; CURVE CRYPTOGRAPHY; COVID-19; DETECTION; NEURAL-NETWORK; STEGANOGRAPHY; EFFICIENT; INTERNET; SYSTEM; CLASSIFICATION; ENCRYPTION;
D O I
10.1109/ACCESS.2023.3305271
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, data security has been a challenging endeavor, especially when the data is being transmitted every second. Internet of Things (IoT) involves continuously sending data over public networks, making the data vulnerable to various security threats. Therefore, ensuring the secure end-to-end communication of IoT data is critical. Cryptography and steganography have proven effective in providing secure connectivity for IoT devices. However, challenges in existing approaches include scalability, computational complexity, implementation, key management, trade-offs, evolving threats, and hyperparameter tuning. Therefore, in this paper, we propose EGCrypto, an efficient and secure model for IoT networks. EGCrypto utilizes a low-complexity elliptic Galois cryptography approach along with matrix XOR steganography to enhance security. To optimize its performance, we employ the zoning evolution of control attributes and adaptive mutation based self-adaptive differential evolution with fitness and diversity ranking. These techniques are utilized to fine-tune the hyperparameters of EGCrypto, enhancing its effectiveness and efficiency. The confidential IoT data is encrypted using low-complexity elliptic Galois cryptography. Following encryption, the encrypted data is embedded or hidden into cover blocks of an image, which are selected using the optimization algorithm. This ensures secure data communication in IoT architectures, as the encrypted data is transferred safely and can be easily recovered and decrypted at the receiving end. The experimental results demonstrate that EGCrypto outperforms competitive models with improvements of 1.8473% in peak signal to noise ratio (PSNR), 1.5490% in strutural similarity index metric (SSIM), 1.7682% in normalized root mean square error (NRMSE), 1.3829% in carrier capacity, and 1.9372% in embedding efficiency.
引用
收藏
页码:90739 / 90748
页数:10
相关论文
共 33 条
  • [1] A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security
    Al-Garadi, Mohammed Ali
    Mohamed, Amr
    Al-Ali, Abdulla Khalid
    Du, Xiaojiang
    Ali, Ihsan
    Guizani, Mohsen
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2020, 22 (03): : 1646 - 1685
  • [2] Implementation of cryptography in steganography for enhanced security
    Antonio, Harianto
    Prasad, P. W. C.
    Alsadoon, Abeer
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (23) : 32721 - 32734
  • [3] Baccouri S., 2023, P IEEE INT C ADV SYS, P1
  • [4] Effects of instruction-set extensions on an embedded processor:: A case study on elliptic-curve cryptography over GF(2m)
    Bartolini, Sandro
    Branovic, Irina
    Giorgi, Roberto
    Martinelli, Enrico
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2008, 57 (05) : 672 - 685
  • [5] Differential evolution algorithm with fitness and diversity ranking-based mutation operator
    Cheng, Jianchao
    Pan, Zhibin
    Liang, Hao
    Gao, Zhaoqi
    Gao, Jinghuai
    [J]. SWARM AND EVOLUTIONARY COMPUTATION, 2021, 61
  • [6] Low-Complexity Elliptic Curve Cryptography Processor Based on Configurable Partial Modular Reduction Over NIST Prime Fields
    Choi, Piljoo
    Lee, Mun-Kyu
    Kim, Ji-Hoon
    Kim, Dong Kyue
    [J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2018, 65 (11) : 1703 - 1707
  • [7] Self-Adaptive Differential Evolution Algorithm With Zoning Evolution of Control Parameters and Adaptive Mutation Strategies
    Fan, Qinqin
    Yan, Xuefeng
    [J]. IEEE TRANSACTIONS ON CYBERNETICS, 2016, 46 (01) : 219 - 232
  • [8] Enabling Secure Cross-Modal Retrieval Over Encrypted Heterogeneous IoT Databases With Collective Matrix Factorization
    Guo, Cheng
    Jia, Jing
    Jie, Yingmo
    Liu, Charles Zhechao
    Choo, Kim-Kwang Raymond
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (04): : 3104 - 3113
  • [9] COVID-19 Detection Through Transfer Learning Using Multimodal Imaging Data
    Horry, Michael J.
    Chakraborty, Subrata
    Paul, Manoranjan
    Ulhaq, Anwaar
    Pradhan, Biswajeet
    Saha, Manas
    Shukla, Nagesh
    [J]. IEEE ACCESS, 2020, 8 : 149808 - 149824
  • [10] EC-Crypto: Highly Efficient Area-Delay Optimized Elliptic Curve Cryptography Processor
    Javeed, Khalid
    El-Moursy, Ali
    Gregg, David
    [J]. IEEE ACCESS, 2023, 11 : 56649 - 56662