An Intelligence Technique based Elliptic Curve Cryptography Algorithm for Secured Communication in Networks
An Intelligence Technique based Elliptic Curve Cryptography Algorithm for Secured Communication in Networks |
||
|
||
© 2024 by IJETT Journal | ||
Volume-72 Issue-1 |
||
Year of Publication : 2024 | ||
Author : Ramireddy Navatejareddy, M. Kavitha |
||
DOI : 10.14445/22315381/IJETT-V72I1P126 |
How to Cite?
Ramireddy Navatejareddy, M. Kavitha, "An Intelligence Technique based Elliptic Curve Cryptography Algorithm for Secured Communication in Networks," International Journal of Engineering Trends and Technology, vol. 72, no. 1, pp. 266-274, 2024. Crossref, https://doi.org/10.14445/22315381/IJETT-V72I1P126
Abstract
Cloud computing is a fictional extended computing application where cloud users can store their information remotely in the cloud and configure it from a common set of computer resources for high-quality sorting and convenience. Cloud computing is primarily emerging at the heart of the sensitive data cloud. Secured communication is vital in cloud computing and IoT with advanced optimization techniques. This work aims to provide a reliable and secure cloud-based communications service allowing customers to access their information dynamically. To achieve this, in this article, we advance advances in secure communications over the Adaptive Neuro-Fuzzy Inference System (ANFIS) with Chicken Swarm Optimization (CSO) and Elliptic Curve Cryptography Hellman algorithm (ACECC). At the initial stage, an intermediate database is created, and the ANFIS-CSO algorithm is implemented to manage the optimal classification of nodes from the cloud. Next, we calculate the important information based on the data gain. Finally, we spread ECC to encrypt sensitive information and investigate from databases. The investigation is conducted under the names of PSNR, MSE, and CC with the help of databases to evaluate performance. The convincing results underscore the fact that the proposed method is suitable for ensuring secure data transmission compared to existing techniques such as the Particle Swarm Optimization algorithm (PSO), Fuzzy, Whale Optimization Algorithm (WOA), Gravitational Search Algorithm (GSA), Cuckoo Search (CS) and Genetic Algorithm (GA) techniques.
Keywords
Elliptic curve cryptography, Chicken Swarm Optimization, Encryption, Decryption, Mean square error.
References
[1] Hua-Yi Lin, Meng-Yen Hsieh, and Kuan-Ching Li, “Flexible Group Key Management and Secure Data Transmission in Mobile Device Communications Using Elliptic Curve Diffie-Hellman Cryptographic System,” International Journal of Computational Science and Engineering, vol. 12, no. 1, pp. 47-52, 2016.
[CrossRef] [Google Scholar] [Publisher Link]
[2] Tarun Kumar Goyal, and Vineet Sahula, “Lightweight Security Algorithm for Low Power IoT Devices,” 2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI), Jaipur, India, pp. 1725-1729, 2016.
[CrossRef] [Google Scholar] [Publisher Link]
[3] Ioannis Chatzigiannakis, Andrea Vitaletti, and Apostolos Pyrgelis, “A Privacy-Preserving Smart Parking System Using an IoT Elliptic Curve Based Security Platform,” Computer Communications, vol. 89-90, pp. 165-177, 2016.
[CrossRef] [Google Scholar] [Publisher Link]
[4] Wen-Bin Hsieh, and Jenq-Shiou Leu, “Implementing a Secure VoIP Communication Over SIP-Based Networks,” Wireless Networks, vol. 24, no. 8, pp. 2915-2926, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[5] Darshana Pritam Shah, and Pritam Gajkumar Shah, “Revisting of Elliptical Curve Cryptography for Securing Internet of Things (IOT),” 2018 Advances in Science and Engineering Technology International Conferences (ASET), Dubai, Sharjah, Abu Dhabi, United Arab Emirates, pp. 1-3, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[6] Muneer Bani Yassein et al., “Comprehensive Study of Symmetric Key and Asymmetric Key Encryption Algorithms,” 2017 International Conference on Engineering and Technology (ICET), Antalya, Turkey, pp. 1-7, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[7] Zhen Wang et al., “Enhanced Instant Message Security and Privacy Protection Scheme for Mobile Social Network Systems,” IEEE Access, vol. 6, pp. 13706-13715, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[8] Sanjay Kumar, and R.K. Singh, “Secure Authentication Approach Using Diffie-Hellman Key Exchange Algorithm for WSN,” International Journal of Communication Networks and Distributed Systems, vol. 17, no. 2, pp. 189-201, 2016.
[CrossRef] [Google Scholar] [Publisher Link]
[9] Sangram Ray, G.P. Biswas, and Mou Dasgupta, “Secure Multi-Purpose Mobile-Banking Using Elliptic Curve Cryptography,” Wireless Personal Communications, vol. 90, no. 3, pp. 1331-1354, 2016.
[CrossRef] [Google Scholar] [Publisher Link]
[10] Pratima Deshpande et al., “Experimental Study of Diffie-Hellman Key Exchange Algorithm on Embedded Devices,” 2017 International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS), Chennai, India, pp. 2042-2047, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[11] A. Mullai, and K. Mani, “Enhancing the Security in RSA and Elliptic Curve Cryptography Based on Addition Chain Using Simplified Swarm Optimization and Particle Swarm Optimization for Mobile Devices,” International Journal of Information Technology, pp. 551- 564, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[12] Arjun Rawat, and Maroti Deshmukh, “Tree and Elliptic Curve Based Efficient and Secure Group Key Agreement Protocol,” Journal of Information Security and Applications, vol. 55, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[13] Balkis Bettoumi, and Ridha Bouallegue, “Evaluation of Authentication Based Elliptic Curve Cryptography in Wireless Sensor Networks in IoT Context,” 2018 26th International Conference on Software, Telecommunications and Computer Networks (SoftCOM), Split, Croatia, pp. 1-5, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[14] Titus Balan, Alexandra Balan, and Florin Sandu, “SDR Implementation of a D2D Security Cryptographic Mechanism,” IEEE Access, vol. 7, pp. 38847-38855, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[15] Daya Sagar Gupta, S.K. Hafizul Islam, and Mohammad S. Obaidat, “A Secure Identity-Based Deniable Authentication Protocol for MANETs,” 2019 International Conference on Computer, Information and Telecommunication Systems (CITS), Beijing, China, pp. 1-5, 2019.
[CrossRef] [Google Scholar] [Publisher Link]