Data cryptography in the Internet of Things using the artificial bee colony algorithm in a smart irrigation system

被引:16
作者
Mousavi, Seyyed Keyvan [1 ]
Ghaffari, Ali [2 ]
机构
[1] Islamic Azad Univ, Dept Comp Engn, Urmia Branch, Orumiyeh, Iran
[2] Islamic Azad Univ, Dept Comp Engn, Tabriz Branch, Tabriz, Iran
关键词
IoT; Security; Cryptography; Artificial bee colony; SENSOR NETWORKS; OPTIMIZATION; SHA-256; SCHEME;
D O I
10.1016/j.jisa.2021.102945
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) includes various technologies, including sensing devices, Radio-Frequency Identification (RFID), and Microelectromechanical Systems (MEMS). Despite numerous advantages of IoT, security and privacy are important challenges. IoT infrastructures are frequently attacked by different invaders, including white hat hackers whose mission is to test the system's penetrability. Other attacks are orchestrated by adversaries that misuse system vulnerabilities to seize information for personal benefits. Hence, security is a key factor and fundamental requirement of IoT design. Thus, increased cyberattacks call for an appropriate strategic plan to ensure IoT security. Enhancing data security in IoT has proved to be a major concern, and one solution to mitigate this is to apply suitable encryption techniques when storing data in the IoT. An intruder will be able to control IoT devices without physical access if the network is not secure enough. To overcome this challenge, this paper proposes a security design based on Elliptic-Curve Cryptography (ECC), the SHA-256 (Secure Hash Algorithm 256) algorithm, and the Artificial Bee Colony (ABC) algorithm to boost the security of IoT-based smart irrigation systems. The proposed model applies the ABC algorithm to generate the private key for ECC. The results show that the optimal encoding and decoding times were 100 and 150 iterations, respectively. Moreover, compared to 3DES&ECC&SHA-256 and RC4&ECC&SHA-256, the total throughput of the proposed model was about 50.04% and 55.29% higher in encryption and 51.36% and 58.41% higher in decryption. The evaluation indicates a significant improvement (>50%) in the throughput rate. The performance results obtained indicate the efficiency and effectiveness of the proposed scheme in terms of performance and security.
引用
收藏
页数:16
相关论文
共 56 条
[1]   An image encryption approach using particle swarm optimization and chaotic map [J].
Ahmad M. ;
Alam M.Z. ;
Umayya Z. ;
Khan S. ;
Ahmad F. .
International Journal of Information Technology, 2018, 10 (3) :247-255
[2]   Globalized firefly algorithm and chaos for designing substitution box [J].
Alhadawi, Hussam S. ;
Lambic, Dragan ;
Zolkipli, Mohamad Fadli ;
Ahmad, Musheer .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 55
[3]   Artificial bee colony optimization based energy-efficient wireless network interface selection for industrial mobile devices [J].
ArunKumar, S. ;
Kumar, B. Vinoth ;
Pandi, M. .
COMPUTER COMMUNICATIONS, 2020, 154 :1-10
[4]   Medical Image Security Using Dual Encryption with Oppositional Based Optimization Algorithm [J].
Avudaiappan, T. ;
Balasubramanian, R. ;
Pandiyan, S. Sundara ;
Saravanan, M. ;
Lakshmanaprabu, S. K. ;
Shankar, K. .
JOURNAL OF MEDICAL SYSTEMS, 2018, 42 (11)
[5]   Secure and Trust-Aware Routing Scheme in Wireless Sensor Networks [J].
Beheshtiasl, Azam ;
Ghaffari, Ali .
WIRELESS PERSONAL COMMUNICATIONS, 2019, 107 (04) :1799-1814
[6]   Clustering based on whale optimization algorithm for IoT over wireless nodes [J].
Bozorgi, Seyed Mostafa ;
Hajiabadi, Mahdi Rohani ;
Hosseinabadi, Ali Asghar Rahmani ;
Sangaiah, Arun Kumar .
SOFT COMPUTING, 2021, 25 (07) :5663-5682
[7]   Applying PSO Based Technique for Analysis of Geffe Generator Cryptosystem [J].
Din, Maiya ;
Pal, Saibal K. ;
Muttoo, S. K. .
HARMONY SEARCH AND NATURE INSPIRED OPTIMIZATION ALGORITHMS, 2019, 741 :741-749
[8]   Cryptanalysis of SDES Using Genetic and Memetic Algorithms [J].
Dworak, Kamil ;
Nalepa, Jakub ;
Boryczka, Urszula ;
Kawulok, Michal .
RECENT DEVELOPMENTS IN INTELLIGENT INFORMATION AND DATABASE SYSTEMS, 2016, 642 :3-14
[9]   An Efficient Artificial Bee Colony Algorithm With an Improved Linkage Identification Method [J].
Gao, Hao ;
Fu, Zheng ;
Pun, Chi-Man ;
Zhang, Jun ;
Kwong, Sam .
IEEE TRANSACTIONS ON CYBERNETICS, 2022, 52 (06) :4400-4414
[10]  
Gilbert H, 2004, LECT NOTES COMPUT SC, V3006, P175