The Internet of Things (IoT) is a kind of advanced information technology that has grabbed the attention of society. Stimulators and sensors were generally known as smart devices in this ecosystem. In parallel, IoT security provides new challenges. Internet connection and the possibility of communication with smart gadgets cause gadgets to indulge in human life. Thus, safety is essential in devising IoT. IoT contains three notable features: intelligent processing, overall perception, and reliable transmission. Due to the IoT span, the security of transmitting data becomes a crucial factor for system security. This study designs a slime mold optimization with ElGamal Encryption with a Hybrid Deep-Learning-Based Classification (SMOEGE-HDL) model in an IoT environment. The proposed SMOEGE-HDL model mainly encompasses two major processes, namely data encryption and data classification. At the initial stage, the SMOEGE technique is applied to encrypt the data in an IoT environment. For optimal key generation in the EGE technique, the SMO algorithm has been utilized. Next, in the later stage, the HDL model is utilized to carry out the classification process. In order to boost the classification performance of the HDL model, the Nadam optimizer is utilized in this study. The experimental validation of the SMOEGE-HDL approach is performed, and the outcomes are inspected under distinct aspects. The proposed approach offers the following scores: 98.50% for specificity, 98.75% for precision, 98.30% for recall, 98.50% for accuracy, and 98.25% for F1-score. This comparative study demonstrated the enhanced performance of the SMOEGE-HDL technique compared to existing techniques.

Download full-text PDF

Source
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC10302786PMC
http://dx.doi.org/10.3390/s23125596DOI Listing

Publication Analysis

Top Keywords

elgamal encryption
8
encryption hybrid
8
hybrid deep-learning-based
8
deep-learning-based classification
8
internet things
8
smoege-hdl model
8
iot environment
8
hdl model
8
iot
7
classification
5

Similar Publications

Secure PUF-Based Authentication Systems.

Sensors (Basel)

August 2024

Institute of Science and Engineering, Kanazawa University, Kanazawa 920-1192, Ishikawa, Japan.

The Internet of Things faces significant security challenges, particularly in device authentication. Traditional methods of PUF-based authentication protocols do not fully address IoT's unique security needs and resource constraints. Existing solutions like Identity-Based Encryption with Physically Unclonable Functions enhance security but still struggle with protecting data during transmission.

View Article and Find Full Text PDF

Considering the granularity of embedded data in the design of reversible data hiding scheme has important research significance for the permission control and management of multi-granularity information. To broaden the application possibilities of encrypted data in cloud environments, the researchers propose a fine-grained reversible data hiding method leveraging the cipher-text redundancy of ElGamal encryption. Initially, prior to the encryption process, pixels are organized into a full binary tree based on fine-grained access permissions.

View Article and Find Full Text PDF

A Hybrid Cryptosystem Incorporating a New Algorithm for Improved Entropy.

Entropy (Basel)

February 2024

Centro de Investigación en Computación, Instituto Politécnico Nacional, Ciudad de México 07738, Mexico.

Today, safeguarding sensitive content through encryption is crucial. This work presents a hybrid cryptosystem for images that employs both asymmetric and symmetric encryption. The asymmetric component involves applying the Diffie-Hellman protocol and the ElGamal cryptosystem to securely transmit two constants.

View Article and Find Full Text PDF

Possibility of decryption speed-up by parallel processing in CCA secure hashed ElGamal.

PLoS One

December 2023

Faculty of Information Science and Technology, Kim Chaek University of Technology, Pyong Yang, Democratic People's Republic of Korea.

In order to prove the ElGamal CCA(Chosen Ciphertext Attack) security in the random oracle model, it is necessary to use the group where ICDH(Interactive Computational Diffie Hellman) assumption holds. Until now, only bilinear group with complex algebraic structure has been known as the ICDH group. In this paper, we introduce the ICDH group with simple algebraic structure.

View Article and Find Full Text PDF

The Internet of Things (IoT) is a kind of advanced information technology that has grabbed the attention of society. Stimulators and sensors were generally known as smart devices in this ecosystem. In parallel, IoT security provides new challenges.

View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!