Skip to main content

Advertisement

Log in

A High Security Symmetric Key Generation by Using Genetic Algorithm Based on a Novel Similarity Model

  • Published:
Mobile Networks and Applications Aims and scope Submit manuscript

Abstract

Encryption technology has a great influence on data security. There are many encryptions have been proposed. In general, the encryptions with higher complexity will provide higher security, but it will also consume a lot of computing resources. In some cases, these high complexity method may not suitable such as Internet of Thing devices. This is because Internet of Thing device has lower computing power due to the size and the limited battery. Therefore, most of Internet of Thing (IoT) devices are used symmetric encryption as the main method. However, this kind of symmetric encryption algorithms are easy to occur weak keys such as data encryption algorithm (DES). This will expose IoT devices to high risk environments. In this study, a new fitness function has given and then a Genetic Algorithm-based symmetric key generation is proposed. As the simulation results, our proposed method can provide higher randomness and very low probability to occur the weak keys so that the data security in IoT environment will be increased significantly.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

References

  1. Zhang C, Cho HH, Chen CY, Shih TK, Chao HC (2019) Fuzzy-based 3-D stream traffic Lightweighting over Mobile P2P network. IEEE Syst J 14(2):1840–1851

    Article  Google Scholar 

  2. Chao HC, Cho HH, Shih TK, Chen CY (2019) Bacteria-inspired network for 5G Mobile communication. IEEE Netw 33(4):138–145

    Article  Google Scholar 

  3. Suliman A, Husain Z, Abououf M, Alblooshi M, Salah K (2018) Monetization of IoT data using smart contracts. IET Netw 8(1):32–37

    Article  Google Scholar 

  4. Huang H, Savkin AV, Huang C (2020) Drone routing in a time-dependent network: towards low cost and large range parcel delivery. IEEE Trans Ind Inform 17:1526

    Article  Google Scholar 

  5. Min Z, Yang G, Wang J, Kim GJ (2019) A privacy-preserving BGN-type parallel Homomorphic encryption algorithm based on LWE. J Internet Technol 20(7):2189–2200

    Google Scholar 

  6. Boussif M, Aloui N, Cherif A (2018) Secured cloud computing for medical data based on watermarking and encryption. IET Netw 7(5):294–298

    Article  Google Scholar 

  7. Chen CY, Chao HC (2014) A survey of key distribution in wireless sensor networks. Secur Commun Netw 7(12):2495–2508

    Article  Google Scholar 

  8. Impressive IoT Statistics (2020-2021) Data analysis & market share. Available: https://financesonline.com/iot-statistics/. Accessed April 2021

  9. Cho HH, Wu HT, Lai CF, Shih TK, Tseng FH (2020) Intelligent charging path planning for IoT network over Blockchain-based edge architecture. IEEE Internet Things J 8(4):2379–2394

  10. Tseng FH, Cho HH, Chou LD, Shih TK, Chao HC (2016) An efficient power conservation scheme in non-zero-sum duty-cycle game for wireless sensor networks. Int J Sensor Netw 21(4):242–251

    Article  Google Scholar 

  11. Cho HH, Shih TK, Chao HC (2015) A robust coverage scheme for UWSNs using the spline function. IEEE Sensors J 16(11):3995–4002

    Article  Google Scholar 

  12. Bellare M, Desai A, Jokipii E, Rogaway P (1997) A concrete security treatment of symmetric encryption. In proceedings IEEE 38th annual symposium on foundations of computer science, pp 394–403

    Google Scholar 

  13. Bellare M, Rogaway P (1994) Optimal asymmetric encryption. In workshop on the theory and application of of cryptographic techniques. Springer, Berlin, Heidelberg, pp 92–111

    MATH  Google Scholar 

  14. Estrellado MEL, Sison AM, Tanguilig BT III (2016) Test Bank management system applying Rasch model and data encryption standard (DES) algorithm. Int J Mod Educ Comput Sci 8(10):1–8

    Article  Google Scholar 

  15. Needham RM, Schroeder MD (1978) Using encryption for authentication in large networks of computers. Commun ACM 21(12):993–999

    Article  Google Scholar 

  16. Amorado RV, Sison AM, Medina RP (2019) Enhanced data encryption standard (DES) algorithm based on filtering and striding techniques. In proceedings of the 2019 2nd international conference on information science and systems, pp 252–256

    Google Scholar 

  17. Singh G (2013) A study of encryption algorithms (RSA, DES, 3DES and AES) for information security. Int J Comput Appl 67(19):33–38

    Google Scholar 

  18. Vuppala A, Roshan RS, Nawaz S, Ravindra JVR (2020) An efficient optimization and secured triple data encryption standard using enhanced key scheduling algorithm. Proc Comput Sci 171:1054–1063

    Article  Google Scholar 

  19. Niu Y, Zhang J, Wang A, Chen C (2019) An efficient collision power attack on AES encryption in edge computing. IEEE Access 7:18734–18748

    Article  Google Scholar 

  20. Langenberg B, Pham H, Steinwandt R (2020) Reducing the cost of implementing the advanced encryption standard as a quantum circuit. IEEE Trans Quantum Eng 1:1–12

    Article  Google Scholar 

  21. Deng L, Yang Y, Chen Y, Wang X (2018) Aggregate signature without pairing from certificateless cryptography. J Internet Technol 19(5):1479–1486

    Google Scholar 

  22. Martínez R, Casellas R, Moreolo MS, Fabrega JM, Vilalta R, Muñoz R, Otero G (2020) Experimental evaluation of an on-line RSA algorithm for SDN-controlled optical metro networks with VCSEL-based S-BVTs. In: In 2020 IEEE international conference on optical network design and modeling (ONDM), pp 1–6

    Google Scholar 

  23. Hoffman, P., & Wijngaards, W. (2012). Elliptic curve digital signature algorithm (DSA) for dnssec. document RFC6605

    Google Scholar 

  24. Hong DL (2020) A new digital signature scheme based on the hardness of some expanded root problems. Proc Comput Sci 171:541–550

    Article  Google Scholar 

  25. Tsai MY, Cho HH, Chen CY, Chen WM (2020) A novel genetic algorithm-based DES key generation scheme. In international conference on bio-inspired information and communication technologies. Springer, Cham, pp 199–211

    Google Scholar 

  26. Hussain I, Negi MC, Pandey N (2017) A secure IoT-based power plant control using RSA and DES encryption techniques in data link layer. In 2017 IEEE international conference on Infocom technologies and unmanned systems (trends and future directions)(ICTUS), pp 464–470

    Google Scholar 

  27. Gong T, Huang H, Li P, Zhang K, Jiang H (2015) A medical healthcare system for privacy protection based on IoT. In 2015 IEEE 17th international symposium on parallel architectures, algorithms and programming (PAAP), pp 217–222

    Google Scholar 

  28. Uluagac AS, Beyah RA, Copeland JA (2010) Time-based dynamic keying and en-route filtering (TICK) for wireless sensor networks. In 2010 IEEE global telecommunications conference GLOBECOM 2010, pp 1–6

    Book  Google Scholar 

  29. Tsai CW, Rodrigues JJ (2013) Metaheuristic scheduling for cloud: a survey. IEEE Syst J 8(1):279–291

    Article  Google Scholar 

  30. Nazeer MI, Mallah GA, Bhatra R, Memon RA (2018) Implication of genetic algorithm in cryptography to enhance security. Int J Adv Comput Sci Appl 9(6):375–379

    Google Scholar 

  31. DES, Available: https://github.com/nkengasongatem/java-des-mplementation. Accessed Dec 2019

Download references

Acknowledgments

This research was partly funded by the Ministry of Science and Technology of the R.O.C. under grants MOST 108-2221-E-197 -012 -MY3.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hsin-Hung Cho.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Tsai, MY., Cho, HH. A High Security Symmetric Key Generation by Using Genetic Algorithm Based on a Novel Similarity Model. Mobile Netw Appl 26, 1386–1396 (2021). https://doi.org/10.1007/s11036-021-01753-1

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11036-021-01753-1

Keywords

Navigation