Data cryptography in the Internet of Things using the artificial bee colony algorithm in a smart irrigation system

被引:16
作者
Mousavi, Seyyed Keyvan [1 ]
Ghaffari, Ali [2 ]
机构
[1] Islamic Azad Univ, Dept Comp Engn, Urmia Branch, Orumiyeh, Iran
[2] Islamic Azad Univ, Dept Comp Engn, Tabriz Branch, Tabriz, Iran
关键词
IoT; Security; Cryptography; Artificial bee colony; SENSOR NETWORKS; OPTIMIZATION; SHA-256; SCHEME;
D O I
10.1016/j.jisa.2021.102945
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) includes various technologies, including sensing devices, Radio-Frequency Identification (RFID), and Microelectromechanical Systems (MEMS). Despite numerous advantages of IoT, security and privacy are important challenges. IoT infrastructures are frequently attacked by different invaders, including white hat hackers whose mission is to test the system's penetrability. Other attacks are orchestrated by adversaries that misuse system vulnerabilities to seize information for personal benefits. Hence, security is a key factor and fundamental requirement of IoT design. Thus, increased cyberattacks call for an appropriate strategic plan to ensure IoT security. Enhancing data security in IoT has proved to be a major concern, and one solution to mitigate this is to apply suitable encryption techniques when storing data in the IoT. An intruder will be able to control IoT devices without physical access if the network is not secure enough. To overcome this challenge, this paper proposes a security design based on Elliptic-Curve Cryptography (ECC), the SHA-256 (Secure Hash Algorithm 256) algorithm, and the Artificial Bee Colony (ABC) algorithm to boost the security of IoT-based smart irrigation systems. The proposed model applies the ABC algorithm to generate the private key for ECC. The results show that the optimal encoding and decoding times were 100 and 150 iterations, respectively. Moreover, compared to 3DES&ECC&SHA-256 and RC4&ECC&SHA-256, the total throughput of the proposed model was about 50.04% and 55.29% higher in encryption and 51.36% and 58.41% higher in decryption. The evaluation indicates a significant improvement (>50%) in the throughput rate. The performance results obtained indicate the efficiency and effectiveness of the proposed scheme in terms of performance and security.
引用
收藏
页数:16
相关论文
共 56 条
[21]  
Lin Zou, 2020, Frontier Computing. Theory, Technologies and Applications (FC 2019). Lecture Notes in Electrical Engineering (LNEE 551), P541, DOI 10.1007/978-981-15-3250-4_68
[22]   USE OF ELLIPTIC-CURVES IN CRYPTOGRAPHY [J].
MILLER, VS .
LECTURE NOTES IN COMPUTER SCIENCE, 1986, 218 :417-426
[23]   Public Key Cryptography Using Harmony Search Algorithm [J].
Mitra, Suman ;
Mahapatra, Gautam ;
Balas, Valentina E. ;
Chattaraj, Ranjan .
INNOVATIONS IN INFRASTRUCTURE, 2019, 757 :1-11
[24]   Security of internet of things based on cryptographic algorithms: a survey [J].
Mousavi, Seyyed Keyvan ;
Ghaffari, Ali ;
Besharat, Sina ;
Afshari, Hamed .
WIRELESS NETWORKS, 2021, 27 (02) :1515-1555
[25]   Security of Internet of Things using RC4 and ECC Algorithms (Case Study: Smart Irrigation Systems) [J].
Mousavi, Seyyed Keyvan ;
Ghaffari, Ali ;
Besharat, Sina ;
Afshari, Hamed .
WIRELESS PERSONAL COMMUNICATIONS, 2021, 116 (03) :1713-1742
[26]   Improving the security of internet of things using cryptographic algorithms: a case of smart irrigation systems [J].
Mousavi, Seyyed Keyvan ;
Ghaffari, Ali ;
Besharat, Sina ;
Afshari, Hamed .
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 12 (02) :2033-2051
[27]  
Mullai A, 2020, INT J INF TECHNOL
[28]   An efficient cluster head election based on optimized genetic algorithm for movable sinks in IoT enabled HWSNs [J].
Nandan, Aridaman Singh ;
Singh, Samayveer ;
Awasthi, Lalit K. .
APPLIED SOFT COMPUTING, 2021, 107
[29]  
Poonia Ajeet S., 2020, Soft Computing: Theories and Applications. Proceedings of SoCTA 2018. Advances in Intelligent Systems and Computing (AISC 1053), P1419, DOI 10.1007/978-981-15-0751-9_130
[30]   Secure data hiding by fruit fly optimization improved hybridized seeker algorithm [J].
Roselin Kiruba, R. ;
Sree Sharmila, T. .
MULTIDIMENSIONAL SYSTEMS AND SIGNAL PROCESSING, 2021, 32 (02) :405-430