An Effective Signcryption with Optimization Algorithm for IoT-enabled Secure Data Transmission

被引:0
|
作者
Chinnappa, A. [1 ]
Vijayakumaran, C. [1 ]
机构
[1] SRM Inst Sci & Technol, Sch Comp, Dept Comp Technol, Kattankulathur 603203, Tamil Nadu, India
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2022年 / 73卷 / 02期
关键词
Security; Internet of Things; encryption; optimal key generation; metaheuristics; KRILL HERD ALGORITHM; SCHEME;
D O I
10.32604/cmc.2022.027858
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of Things (IoT) allows several low resources and controlled devices to interconnect, calculate processes and make decisions in the communication network. In the heterogeneous environment for IoT devices, several challenging issues such as energy, storage, efficiency, and security. The design of encryption techniques enables the transmission of the data in the IoT environment in a secured way. The proper selection of optimal keys helps to boost the encryption performance. With this motivation, the study presents a signcryption with quantum chaotic krill herd algorithm for secured data transmission (SCQCKH-SDT) in IoT environment. The proposed SCQCKHSDT technique aims to effectively encrypts the data by the use of optimal keys generated by the CQKH algorithm. The proposed SCQCKH-SDT technique initially employs the signcryption technique for the encryption of data. In order to optimize the secrecy, the optimal key generation process is carried out using Chaotic Krill Herd (CQKH) algorithm. The CQKH algorithm incorporates the concept of quantum computing and chaotic theory into the traditionalKHalgorithm. The performance validation of the SCQCKH-SDT technique is performed using benchmark dataset. An extensive comparative analysis reported the superior performance of the SCQCKH-SDT technique over the recent approaches.
引用
收藏
页码:4017 / 4031
页数:15
相关论文
共 50 条
  • [1] IoT-Enabled Plant Monitoring System with Power Optimization and Secure Authentication
    Huda, Samsul
    Nogami, Yasuyuki
    Rahayu, Maya
    Akada, Takuma
    Hossain, Md Biplob
    Musthafa, Muhammad Bisri
    Jie, Yang
    Anh, Le Hoang
    [J]. Computers, Materials and Continua, 2024, 81 (02): : 3165 - 3187
  • [2] A blockchain-orchestrated deep learning approach for secure data transmission in IoT-enabled healthcare system
    Kumar, Prabhat
    Kumar, Randhir
    Gupta, Govind P.
    Tripathi, Rakesh
    Jolfaei, Alireza
    Islam, A. K. M. Najmul
    [J]. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2023, 172 : 69 - 83
  • [3] A secure data transmission framework for IoT enabled healthcare
    Saif, Sohail
    Das, Priya
    Biswas, Suparna
    Khan, Shakir
    Haq, Mohd Anul
    Kovtun, Viacheslav
    [J]. HELIYON, 2024, 10 (16)
  • [4] Jointly optimization for activity recognition in secure IoT-enabled elderly care applications
    Tao, Ming
    Li, Xueqiang
    Wei, Wenhong
    Yuan, Huaqiang
    [J]. APPLIED SOFT COMPUTING, 2021, 99
  • [5] A Secure and IoT-Enabled Data Sharing System Based on IPFS and IOTA Blockchain
    Huang, Tse-Yang
    Chen, Yu-Chi
    Hsieh, Tsung-Chen
    Chang, Huan-Chi
    Chang, Chih-Chieh
    [J]. PROCEEDINGS OF 2023 5TH BLOCKCHAIN AND INTERNET OF THINGS CONFERENCE, BIOTC 2023, 2023, : 50 - 57
  • [6] Secure Critical Data Reclamation Scheme for Isolated Clusters in IoT-Enabled WSN
    Ullah, Ata
    Azeem, Muhammad
    Ashraf, Humaira
    Jhanjhi, N. Z.
    Nkenyereye, Lewis
    Humayun, Mamoona
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (04) : 2669 - 2677
  • [7] IoT-enabled Web warehouse architecture: a secure approach
    Rashid Mehmood
    Maqbool Uddin Shaikh
    Rongfang Bie
    Hussain Dawood
    Hassan Dawood
    [J]. Personal and Ubiquitous Computing, 2015, 19 : 1157 - 1167
  • [8] A Secure Face Recognition for IoT-enabled Healthcare System
    Sardar, Alamgir
    Umer, Saiyed
    Rout, Ranjeet K. R.
    Wang, Shui-Hua
    Tanveer, M.
    [J]. ACM TRANSACTIONS ON SENSOR NETWORKS, 2023, 19 (03)
  • [9] IoT-enabled Web warehouse architecture: a secure approach
    Mehmood, Rashid
    Shaikh, Maqbool Uddin
    Bie, Rongfang
    Dawood, Hussain
    Dawood, Hassan
    [J]. PERSONAL AND UBIQUITOUS COMPUTING, 2015, 19 (07) : 1157 - 1167
  • [10] Fog-assisted secure healthcare data aggregation scheme in IoT-enabled WSN
    Ullah, Ata
    Said, Ghawar
    Sher, Muhammad
    Ning, Huansheng
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2020, 13 (01) : 163 - 174