Published: Aug. 2, 2024
Language: Английский
Published: Aug. 2, 2024
Language: Английский
IEEE Access, Journal Year: 2024, Volume and Issue: 12, P. 82926 - 82937
Published: Jan. 1, 2024
Language: Английский
Citations
1International Journal of Information Technology, Journal Year: 2024, Volume and Issue: unknown
Published: July 29, 2024
Language: Английский
Citations
1Journal of Cyber Security Technology, Journal Year: 2024, Volume and Issue: unknown, P. 1 - 27
Published: Oct. 11, 2024
Remote patient monitoring, particularly for the elderly, is gaining popularity due to Internet of Medical Things (IoMT). However, IoMT devices are highly vulnerable cyber attacks related data confidentiality. Hence, lightweight cryptographic algorithms found be necessary ensure safe transfer in such devices. This paper introduces a Dynamic Lightweight Symmetric Encryption Algorithm (DLSEA) order challenge issues real-time security and privacy. DLSEA executed on Arduino Uno (ATmega328P) Mega (ATmega2560) microcontrollers by using Proteus simulation tool that employs 64-bit temporal secret key block cipher encryption data. Several experiments were conducted payloads varying sizes record execution time, energy consumption, RAM usage, ROM usage avalanche effect. The demonstrated between 128-512 bytes, requires 2.49-3.27 ms ATmega2560, which 47% faster than similar algorithm known as PRESENT. Additionally, 46% more energy-efficient, with decreased 41.81% 57.19% compared Experimental results also show satisfies plaintext sensitivity test, rigorous criteria test (i.e., ~50%).
Language: Английский
Citations
1Applied Soft Computing, Journal Year: 2024, Volume and Issue: unknown, P. 112579 - 112579
Published: Dec. 1, 2024
Language: Английский
Citations
1Published: Jan. 28, 2024
The Industrial Internet of Things (IIoT) is receiving greater attention as it strives to capitalize on significant potential in the Industry 4.0 landscape. IIoT has asserted its dominance worldwide market by introducing many products almost every industry. Significant hurdles emerge data privacy and security when comes serving a huge number requests for automated real-world collection monitoring across industrial applications within purview IIoT. This paper presents Harris Hawks Optimization (HHO) based cryptographic algorithm incorporated with feature selection faster secure communication between cloud computing. main idea behind strategically encrypt sensitive portion request rather than encrypting whole created sending processing. To evaluate performance proposed algorithm, three parameters, fitness key, encryption time, decryption are computed through application two different datasets. HHObased key compared against other swarm intelligence algorithms, such Grey Wolf Optimizer (GWO), Salp Swarm Algorithm (SSA), Particle (PSO). Encryption times selection. experimental results validate robustness efficiency algorithm.
Language: Английский
Citations
1Automated Software Engineering, Journal Year: 2024, Volume and Issue: 31(2)
Published: May 23, 2024
Language: Английский
Citations
12021 International Conference on Data Analytics for Business and Industry (ICDABI), Journal Year: 2022, Volume and Issue: unknown, P. 165 - 169
Published: Oct. 25, 2022
The Cloud of Things (CoT) has transformed communication and network technologies by expanding the Iimitation IoT devices. is a fusion Computing with that provides endless storage, networking, compute capabilities to substantially boosted applications in healthcare, automotive, agriculture, education, welfare, businesses. Even though scalable, faster, cost-effective, remotely accessible,it also faces many challenges like interoperability, compatibility, performance, longevity, security. Security biggest hurdle adopting because it directly involves users' private data. Researchers academicians are equally concerned proposed various lightweight block ciphers (LWBC) secure user's In this paper, relative cryptographic strength three measured performing Cryptanalysis metaheuristic algorithms using framework. chosen SIMON, SPECK, PRESENT ciphers, which belong different categories Lightweight Block Ciphers (LWBC), Cuckoo Search (CS), Whale optimization Algorithm (WOA), Salp Swarm (SSA). result experiments shows SIMON SPECK strong while relatively weak cipher. Also, (CS) found be better than both WOA SSA. However, for keys, able break all completely.X
Language: Английский
Citations
4Advances in computer and electrical engineering book series, Journal Year: 2024, Volume and Issue: unknown, P. 1 - 30
Published: Dec. 6, 2024
A substitution box (S-box) is a fundamental component in cryptographic algorithms that enhance data security by providing complex mapping between input and output values. S-box strengthens the encryption decryption process introducing nonlinearity protecting encrypted against various differential linear cryptanalytic attacks. The problem of generating an with optimal properties challenging falls under category NP-Hard problems. This study proposes hybrid approach combining Particle Swarm optimization algorithm (PSO) Booster to construct highly nonlinear low computational efforts. PSO algorithm, assisted Transfer function Random Key (RK), utilized navigate large permutation search space find acceptable properties. works based on random applications local operators for shuffling elements each other transforming elements' arrangement, resulting modified increased nonlinearity.
Language: Английский
Citations
0Published: Aug. 2, 2024
Language: Английский
Citations
0