Metaheuristic Lightweight Cryptography for Security Enhancement in Internet of Things  

在线阅读下载全文

作  者:Mahmoud Ragab Ehab Bahaudien Ashary 

机构地区:[1]Information Technology Department,Faculty of Computing and Information Technology,King Abdulaziz University,Jeddah,21589,Saudi Arabia [2]Centre of Artificial Intelligence for Precision Medicines,King Abdulaziz University,Jeddah,21589,Saudi Arabia [3]Mathematics Department,Faculty of Science,Al-Azhar University,Naser City,11884,Cairo,Egypt [4]Electrical and Computer Engineering Department,Faculty of Engineering,King Abdulaziz University,Jeddah,21589,Saudi Arabia

出  处:《Computers, Materials & Continua》2022年第8期3009-3023,共15页计算机、材料和连续体(英文)

基  金:This work was funded by the Deanship of Scientific Research(DSR),King Abdulaziz University,Jeddah,under Grant No.(D-387-135-1443).

摘  要:The advancements made in Internet of Things(IoT)is projected to alter the functioning of healthcare industry in addition to increased penetration of different applications.However,data security and private are challenging tasks to accomplish in IoT and necessary measures to be taken to ensure secure operation.With this background,the current paper proposes a novel lightweight cryptography method for enhance the security in IoT.The proposed encryption algorithm is a blend of Cross Correlation Coefficient(CCC)and Black Widow Optimization(BWO)algorithm.In the presented encryption technique,CCC operation is utilized to optimize the encryption process of cryptography method.The projected encryption algorithm works in line with encryption and decryption processes.Optimal key selection is performed with the help of Artificial Intelligence(AI)tool named BWO algorithm.With the combination of AI technique and CCC operation,optimal security operation is improved in IoT.Using different sets of images collected from databases,the projected technique was validated in MATLAB on the basis of few performance metrics such as encryption time,decryption time,Peak Signal to Noise Ratio(PSNR),CC,Error,encryption time and decryption time.The results were compared with existing methods such as Elliptical Curve cryptography(ECC)and Rivest-Shamir-Adleman(RSA)and the supremacy of the projected method is established.

关 键 词:Security images encryption time correlation coefficient black widow optimization artificial intelligence decryption time 

分 类 号:TP309.7[自动化与计算机技术—计算机系统结构]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象