Secure speech-recognition data transfer in the internet of things using a power system and a tried-and-true key generation technique

被引:0
|
作者
Wang, Zhe [1 ]
He, Shuangbai [1 ]
Li, Guoan [2 ]
机构
[1] China Southern Power Grid Co Ltd, Energy Res Inst, Guangzhou 510663, Guangdong, Peoples R China
[2] Hainan Power Grid Co Ltd, Sanya Power Supply Bur, Sanya 572099, Hainan, Peoples R China
关键词
Speech recognition (SR); Reptile search optimized hidden Markov model (RSO-HMM); Perceptual linear prediction (PLP); Elliptic curve cryptography (ECC);
D O I
10.1007/s10586-024-04649-3
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
To secure the privacy, confidentiality, and integrity of Speech Data (SD), the concept of secure Speech Recognition (SR) involves accurately recording and comprehending spoken language while employing diverse security processes. As the Internet of Things (IoT) rapidly evolves, the integration of SR capabilities into IoT devices gains significance. However, ensuring the security and privacy of private SD post-integration remains a critical concern. Despite the potential benefits, implementing the proposed Reptile Search Optimized Hidden Markov Model (RSO-HMM) for SR and integrating it with IoT devices may encounter complexities due to diverse device types. Moreover, the challenge of maintaining data security and privacy for assigned SD in practical IoT settings poses a significant hurdle. Ensuring seamless interoperability and robust security measures is essential. We introduce the Reptile Search Optimized Hidden Markov Model (RSO-HMM) for SR, utilizing retrieved aspects as speech data. Gathering a diverse range of SD from speakers with varying linguistic backgrounds enhances the accuracy of the SR system. Preprocessing involves Z-score normalization for robustness and mitigation of outlier effects. The Perceptual Linear Prediction (PLP) technique facilitates efficient extraction of essential acoustic data from speech sources. Addressing data security, Elliptic Curve Cryptography (ECC) is employed for encryption, particularly suited for resource-constrained scenarios. Our study evaluates the SR system, employing key performance metrics including accuracy, precision, recall, and F1 score. The thorough assessment demonstrates the system's remarkable performance, achieving an impressive accuracy of 96%. The primary objective revolves around appraising the system's capacity and dependability in accurately transcribing speech signals. By proposing a comprehensive approach that combines the RSO-HMM for SR, data preprocessing techniques, and ECC encryption, this study advocates for the wider adoption of SR technology within the IoT ecosystem. By tackling critical data security concerns, this approach paves the way for a safer and more efficient globally interconnected society, encouraging the broader utilization of SR technology in various applications.
引用
收藏
页码:14669 / 14684
页数:16
相关论文
共 18 条
  • [1] Secure transmission of simultaneous wireless information and power transfer system for Internet of things
    Yu, Shangzhi
    Zhu, Hongxing
    APPLIED MATHEMATICS AND NONLINEAR SCIENCES, 2022, 8 (01) : 2785 - 2792
  • [2] Secure data transfer aware grouping technique for cloud-assisted Internet of things applications
    Raheema, Alaa Q.
    Tarish, Hiba A.
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2023, 36 (01)
  • [3] Secure Data Provenance in Internet of Things using Hybrid Attribute based Crypt Technique
    S. Porkodi
    D. Kesavaraja
    Wireless Personal Communications, 2021, 118 : 2821 - 2842
  • [4] Secure Data Provenance in Internet of Things using Hybrid Attribute based Crypt Technique
    Porkodi, S.
    Kesavaraja, D.
    WIRELESS PERSONAL COMMUNICATIONS, 2021, 118 (04) : 2821 - 2842
  • [5] Two-phase Incentive-based Secure Key System for Data Management in Internet of Things
    Krishna, M. Bala
    Rodrigues, Joel J. P. C.
    2017 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2017,
  • [6] A Survey on Secure Data Transfer in the Development of Internet of Things (IoT) Applications Using LoRaWAN Technology
    Sowmya M.
    Sundaram S.M.
    Murugesan P.
    SN Computer Science, 5 (4)
  • [7] Integrated security for data transfer and access control using authentication and cryptography technique for Internet of things
    Sharma, Santosh Kumar
    Khuntia, Bonomali
    INTERNATIONAL JOURNAL OF KNOWLEDGE-BASED AND INTELLIGENT ENGINEERING SYSTEMS, 2020, 24 (04) : 303 - 309
  • [8] Improved Secure Internet of Things System using Web Services and Low Power Single-board Computers
    Bogdan-Iulian, Ciubotaru
    Vasilica-Gabriel, Sasu
    Alexandru, Mitrea Dan
    Nicolae, Goga
    Andrei, Vasilateanu
    2020 INTERNATIONAL CONFERENCE ON E-HEALTH AND BIOENGINEERING (EHB), 2020,
  • [9] Wireless power and data transfer system for internet of things over metal walls and metal shielded environments
    Oruganti, Sai Kiran
    Kaiyrakhmet, Olzhas
    Bien, Franklin
    2016 URSI ASIA-PACIFIC RADIO SCIENCE CONFERENCE (URSI AP-RASC), 2016, : 318 - 320
  • [10] Hardware Obfuscation of AES IP Core Using PUFs and PRNG: A Secure Cryptographic Key Generation Solution for Internet-of-Things Applications
    Chhabra S.
    Lata K.
    SN Computer Science, 3 (4)