The Internet of Things (IoT) is a kind of advanced information technology that has grabbed the attention of society. Stimulators and sensors were generally known as smart devices in this ecosystem. In parallel, IoT security provides new challenges. Internet connection and the possibility of communication with smart gadgets cause gadgets to indulge in human life. Thus, safety is essential in devising IoT. IoT contains three notable features: intelligent processing, overall perception, and reliable transmission. Due to the IoT span, the security of transmitting data becomes a crucial factor for system security. This study designs a slime mold optimization with ElGamal Encryption with a Hybrid Deep-Learning-Based Classification (SMOEGE-HDL) model in an IoT environment. The proposed SMOEGE-HDL model mainly encompasses two major processes, namely data encryption and data classification. At the initial stage, the SMOEGE technique is applied to encrypt the data in an IoT environment. For optimal key generation in the EGE technique, the SMO algorithm has been utilized. Next, in the later stage, the HDL model is utilized to carry out the classification process. In order to boost the classification performance of the HDL model, the Nadam optimizer is utilized in this study. The experimental validation of the SMOEGE-HDL approach is performed, and the outcomes are inspected under distinct aspects. The proposed approach offers the following scores: 98.50% for specificity, 98.75% for precision, 98.30% for recall, 98.50% for accuracy, and 98.25% for F1-score. This comparative study demonstrated the enhanced performance of the SMOEGE-HDL technique compared to existing techniques.
Download full-text PDF |
Source |
---|---|
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC10302786 | PMC |
http://dx.doi.org/10.3390/s23125596 | DOI Listing |
Sensors (Basel)
August 2024
Institute of Science and Engineering, Kanazawa University, Kanazawa 920-1192, Ishikawa, Japan.
The Internet of Things faces significant security challenges, particularly in device authentication. Traditional methods of PUF-based authentication protocols do not fully address IoT's unique security needs and resource constraints. Existing solutions like Identity-Based Encryption with Physically Unclonable Functions enhance security but still struggle with protecting data during transmission.
View Article and Find Full Text PDFHeliyon
June 2024
Key Laboratory of Network and Information Security Under Chinese People Armed Police Force (PAP), Chinese People's Armed Police Force Engineering University, Xi'an, 710086, China.
Considering the granularity of embedded data in the design of reversible data hiding scheme has important research significance for the permission control and management of multi-granularity information. To broaden the application possibilities of encrypted data in cloud environments, the researchers propose a fine-grained reversible data hiding method leveraging the cipher-text redundancy of ElGamal encryption. Initially, prior to the encryption process, pixels are organized into a full binary tree based on fine-grained access permissions.
View Article and Find Full Text PDFEntropy (Basel)
February 2024
Centro de Investigación en Computación, Instituto Politécnico Nacional, Ciudad de México 07738, Mexico.
Today, safeguarding sensitive content through encryption is crucial. This work presents a hybrid cryptosystem for images that employs both asymmetric and symmetric encryption. The asymmetric component involves applying the Diffie-Hellman protocol and the ElGamal cryptosystem to securely transmit two constants.
View Article and Find Full Text PDFPLoS One
December 2023
Faculty of Information Science and Technology, Kim Chaek University of Technology, Pyong Yang, Democratic People's Republic of Korea.
In order to prove the ElGamal CCA(Chosen Ciphertext Attack) security in the random oracle model, it is necessary to use the group where ICDH(Interactive Computational Diffie Hellman) assumption holds. Until now, only bilinear group with complex algebraic structure has been known as the ICDH group. In this paper, we introduce the ICDH group with simple algebraic structure.
View Article and Find Full Text PDFSensors (Basel)
June 2023
School of Computer Science, Kyungil University, Gyeongsan 38428, Republic of Korea.
The Internet of Things (IoT) is a kind of advanced information technology that has grabbed the attention of society. Stimulators and sensors were generally known as smart devices in this ecosystem. In parallel, IoT security provides new challenges.
View Article and Find Full Text PDFEnter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!