EGCrypto: A Low-Complexity Elliptic Galois Cryptography Model for Secure Data Transmission in IoT

被引:18
作者
Kaur, Manjit [1 ]
Alzubi, Ahmad Ali [2 ]
Walia, Tarandeep Singh [3 ]
Yadav, Vaishali [4 ]
Kumar, Naresh [5 ]
Singh, Dilbag [6 ,7 ]
Lee, Heung-No [8 ]
机构
[1] SR Univ, Sch Comp Sci & Artificial Intelligence, Warangal 506371, Telangana, India
[2] King Saud Univ, Community Coll, Dept Comp Sci, Riyadh 11421, Saudi Arabia
[3] Lovely Profess Univ, Sch Comp Applicat, Phagwara 144411, Punjab, India
[4] Manipal Univ Jaipur, Dept Comp & Commun Engn, Jaipur 303007, India
[5] Maharaja Surajmal Inst Technol, Dept Comp Sci & Engn, New Delhi 110058, India
[6] New York Univ Grossman Sch Med, Ctr Biomed Imaging, Dept Radiol, New York, NY 10016 USA
[7] Gwangju Inst Sci & Technol, Blockchain Intelligence Convergence Ctr, Gwangju 61005, South Korea
[8] Gwangju Inst Sci & Technol, Sch Elect Engn & Comp Sci, Gwangju 61005, South Korea
关键词
Cryptography; Internet of Things; Encryption; Steganography; Security; Elliptic curve cryptography; Data models; Data security; Galois fields; Hyperparameter optimization; the Internet of Things; secure communication; cryptography; steganography; elliptic Galois; differential evolution; hyperparameters; encryption; CURVE CRYPTOGRAPHY; COVID-19; DETECTION; NEURAL-NETWORK; STEGANOGRAPHY; EFFICIENT; INTERNET; SYSTEM; CLASSIFICATION; ENCRYPTION;
D O I
10.1109/ACCESS.2023.3305271
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, data security has been a challenging endeavor, especially when the data is being transmitted every second. Internet of Things (IoT) involves continuously sending data over public networks, making the data vulnerable to various security threats. Therefore, ensuring the secure end-to-end communication of IoT data is critical. Cryptography and steganography have proven effective in providing secure connectivity for IoT devices. However, challenges in existing approaches include scalability, computational complexity, implementation, key management, trade-offs, evolving threats, and hyperparameter tuning. Therefore, in this paper, we propose EGCrypto, an efficient and secure model for IoT networks. EGCrypto utilizes a low-complexity elliptic Galois cryptography approach along with matrix XOR steganography to enhance security. To optimize its performance, we employ the zoning evolution of control attributes and adaptive mutation based self-adaptive differential evolution with fitness and diversity ranking. These techniques are utilized to fine-tune the hyperparameters of EGCrypto, enhancing its effectiveness and efficiency. The confidential IoT data is encrypted using low-complexity elliptic Galois cryptography. Following encryption, the encrypted data is embedded or hidden into cover blocks of an image, which are selected using the optimization algorithm. This ensures secure data communication in IoT architectures, as the encrypted data is transferred safely and can be easily recovered and decrypted at the receiving end. The experimental results demonstrate that EGCrypto outperforms competitive models with improvements of 1.8473% in peak signal to noise ratio (PSNR), 1.5490% in strutural similarity index metric (SSIM), 1.7682% in normalized root mean square error (NRMSE), 1.3829% in carrier capacity, and 1.9372% in embedding efficiency.
引用
收藏
页码:90739 / 90748
页数:10
相关论文
共 33 条
[31]   Lightweight Break-Glass Access Control System for Healthcare internet-of-Things [J].
Yang, Yang ;
Liu, Ximeng ;
Deng, Robert H. .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (08) :3610-3617
[32]   Secure Data Transportation With Software-Defined Networking and k-n Secret Sharing for High-Confidence IoT Services [J].
Yuan, Bin ;
Lin, Chen ;
Zhao, Huan ;
Zou, Deqing ;
Yang, Laurence Tianruo ;
Jin, Hai ;
Rong, Chunming .
IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (09) :7967-7981
[33]   Harnessing the Hybrid Cloud for Secure Big Image Data Service [J].
Zhang, Yushu ;
Huang, Hui ;
Xiang, Yong ;
Zhang, Leo Yu ;
He, Xing .
IEEE INTERNET OF THINGS JOURNAL, 2017, 4 (05) :1380-1388