An Effective Signcryption with Optimization Algorithm for IoT-enabled Secure Data Transmission

被引:0
作者
Chinnappa, A. [1 ]
Vijayakumaran, C. [1 ]
机构
[1] SRM Inst Sci & Technol, Sch Comp, Dept Comp Technol, Kattankulathur 603203, Tamil Nadu, India
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2022年 / 73卷 / 02期
关键词
Security; Internet of Things; encryption; optimal key generation; metaheuristics; KRILL HERD ALGORITHM; SCHEME;
D O I
10.32604/cmc.2022.027858
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of Things (IoT) allows several low resources and controlled devices to interconnect, calculate processes and make decisions in the communication network. In the heterogeneous environment for IoT devices, several challenging issues such as energy, storage, efficiency, and security. The design of encryption techniques enables the transmission of the data in the IoT environment in a secured way. The proper selection of optimal keys helps to boost the encryption performance. With this motivation, the study presents a signcryption with quantum chaotic krill herd algorithm for secured data transmission (SCQCKH-SDT) in IoT environment. The proposed SCQCKHSDT technique aims to effectively encrypts the data by the use of optimal keys generated by the CQKH algorithm. The proposed SCQCKH-SDT technique initially employs the signcryption technique for the encryption of data. In order to optimize the secrecy, the optimal key generation process is carried out using Chaotic Krill Herd (CQKH) algorithm. The CQKH algorithm incorporates the concept of quantum computing and chaotic theory into the traditionalKHalgorithm. The performance validation of the SCQCKH-SDT technique is performed using benchmark dataset. An extensive comparative analysis reported the superior performance of the SCQCKH-SDT technique over the recent approaches.
引用
收藏
页码:4017 / 4031
页数:15
相关论文
共 30 条
[1]   Quantum based Whale Optimization Algorithm for wrapper feature selection [J].
Agrawal, R. K. ;
Kaur, Baljeet ;
Sharma, Surbhi .
APPLIED SOFT COMPUTING, 2020, 89
[2]   Lightweight cryptography system for IoT devices using DNA [J].
Al-Husainy, Mohammed Abbas Fadhil ;
Al-Shargabi, Bassam ;
Aljawarneh, Shadi .
COMPUTERS & ELECTRICAL ENGINEERING, 2021, 95
[3]  
[Anonymous], 2015, INT J COMPUTER NETWO
[4]  
Chowdhery A, 2018, IEEE INT CONF SENS, P19
[5]   Hybrid data encryption model integrating multi-objective adaptive genetic algorithm for secure medical data communication over cloud-based healthcare systems [J].
Denis, R. ;
Madhubala, P. .
MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (14) :21165-21202
[6]   A lightweight and secure two-factor authentication scheme for wireless body area networks in health-care IoT [J].
Fotouhi, Mahdi ;
Bayat, Majid ;
Das, Ashok Kumar ;
Far, Hossein Abdi Nasib ;
Pournaghi, S. Morteza ;
Doostari, M. A. .
COMPUTER NETWORKS, 2020, 177
[7]  
Hameed A, 2019, 2019 INTERNATIONAL CONFERENCE ON INNOVATION AND INTELLIGENCE FOR INFORMATICS, COMPUTING, AND TECHNOLOGIES (3ICT)
[8]   Partial image encryption using format-preserving encryption in image processing systems for Internet of things environment [J].
Jang, Wonyoung ;
Lee, Sun-Young .
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2020, 16 (03)
[9]  
Jeong J., 2018, P INT C INF SCI APPL, P361
[10]   An efficient approach for enhancing security in Internet of Things using the optimum authentication key [J].
Kalyani G. ;
Chaudhari S. .
International Journal of Computers and Applications, 2020, 42 (03) :306-314