Data privacy preservation in MAC aware Internet of things with optimized key generation

被引:9
|
作者
Kalyani, G. [1 ,3 ]
Chaudhari, Shilpa [2 ]
机构
[1] REVA Univ, Sch Comp & Informat Technol, Bangalore 560064, Karnataka, India
[2] MS Ramaiah Inst Technol, Dept CSE, Bangalore, Karnataka, India
[3] SNIST, Dept CSE, Hyderabad 501301, Telangana, India
关键词
ElGamal public key cryptosystem; Medium access control; Internet of thing; Optimization; Hybrid algorithm; ENERGY-EFFICIENT; IOT; NETWORKS; PROTOCOL; SECURE; ALGORITHM; SCHEME;
D O I
10.1016/j.jksuci.2019.12.008
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, the progression in Internet of Thing (IoT) has extensively influenced the model of wireless networking. As numerous wireless devices were emerged, the new Medium Access Control (MAC) and routing protocols has been introduced for assuring the end-to-end network efficiency. This paper aims to focus on the IEEE 802.15.4 MAC standards, where the security field is included in MAC header. The sensitive data security authentication on this MAC header is completely based on the method with the introduction of optimum authentication key using partially homomorphic encryption named ElGamal public key cryptosystem. More importantly, in this work, the ElGamal public key cryptosystem for securing IoT data is progressed by generating the optimal private key as well. For this optimal selection of key, this paper aims to establish a new hybrid optimization algorithm that hybrids the concept of Lion Algorithm (LA) and Cuckoo Search Algorithm (CS) named Cuckoo Mated-Lion Algorithm (CM-LA). Finally, the performance of the proposed working strategy is compared over other state-of-the-arts models by concerning various attacks, convergence and key sensitivity analysis, respectively. (C) 2019 The Authors. Published by Elsevier B.V. on behalf of King Saud University.
引用
收藏
页码:2062 / 2071
页数:10
相关论文
共 50 条
  • [1] Privacy Preservation in the Internet of Things
    Berrehili, Fatima Zahra
    Belmekki, Abdelhamid
    ADVANCES IN UBIQUITOUS NETWORKING 2, 2017, 397 : 163 - 175
  • [2] Location-Aware Service Recommendations With Privacy-Preservation in the Internet of Things
    Lin, Wenmin
    Zhang, Xuyun
    Qi, Lianyong
    Li, Weimin
    Li, Shancang
    Sheng, Victor S.
    Nepal, Surya
    IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS, 2021, 8 (01) : 227 - 235
  • [3] Advances of privacy preservation in internet of things
    Shanghai Key Laboratory for Trustworthy Computing, East China Normal University, Shanghai
    200062, China
    Jisuanji Yanjiu yu Fazhan, 10 (2341-2352):
  • [4] Survey on the location privacy preservation in the internet of things
    Beijing Key Laboratory of IOT Information Security, Institute of Information Engineering, The Chinese Academy of Sciences, Beijing
    100093, China
    不详
    100049, China
    不详
    102600, China
    不详
    710071, China
    Ruan Jian Xue Bao, (1-10):
  • [5] Privacy-Aware Authentication in the Internet of Things
    Gross, Hannes
    Hoelbl, Marko
    Slamanig, Daniel
    Spreitzer, Raphael
    CRYPTOLOGY AND NETWORK SECURITY, CANS 2015, 2015, 9476 : 32 - 39
  • [6] MAC-aware routing metrics for the internet of things
    Di Marco, R.
    Athanasiou, G.
    Mekikis, P. -V.
    Fischione, C.
    COMPUTER COMMUNICATIONS, 2016, 74 : 77 - 86
  • [7] Privacy preservation of the internet of medical things using blockchain
    Raj, Anu
    Prakash, Shiva
    HEALTH SERVICES AND OUTCOMES RESEARCH METHODOLOGY, 2024, 24 (01) : 112 - 139
  • [8] Privacy preservation of the internet of medical things using blockchain
    Anu Raj
    Shiva Prakash
    Health Services and Outcomes Research Methodology, 2024, 24 : 112 - 139
  • [9] Privacy Preservation Using Machine Learning in the Internet of Things
    El-Gendy, Sherif
    Elsayed, Mahmoud Said
    Jurcut, Anca
    Azer, Marianne A.
    MATHEMATICS, 2023, 11 (16)
  • [10] Internet of Things Context-Aware Privacy Architecture
    Rachid, Selt
    Challal, Yacine
    Nadjia, Benblidia
    2015 IEEE/ACS 12TH INTERNATIONAL CONFERENCE OF COMPUTER SYSTEMS AND APPLICATIONS (AICCSA), 2015,