Skip to main content
Log in

An optimal metaheuristic optimization based ElGamal public key cryptosystem for privacy in IoT environment

  • Original article
  • Published:
International Journal of System Assurance Engineering and Management Aims and scope Submit manuscript

Abstract

Recent advancements in the field of internet of things (IoT) and networking technologies, maximum attention has been received in the field of privacy and security in IoT environment. The IoT devices are commonly employed to acquire real world person dataset, security and privacy pose a major challenging issue. To resolve these issues, this paper develops novel partially homomorphic encryption named ElGamal public key cryptosystem with optimal key generation using cross entropy with a red deer optimization algorithm (EGPKC-CERDA) for privacy preserving in IoT environment. The presented EGPKC-CERDA algorithm aims to focus on the IEEE 802.15.4 MAC standard where security field is kept at the MAC header. Besides, EGPKC technique with optimal authentication key creation is involved for secure authentication at the MAC header. Furthermore, the optimum key selection procedure for EGPKC is carried out by CERDA technique where cross entropy scheme is integrated into the RDA for improving the local and global optima. To assure the proficient results analysis of the EGPKC-CERDA algorithm, a series of experimentations were taken place and the results are investigated with respect to different dimensions. The resultant experimentation values ensured the superior outcome of the EGPKC-CERDA algorithm.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  • Abu-Elkheir M, Hayajneh M, Ali N (2013) Data management for the internet of things: design primitives and solution. Sensors 13(11):15582–15612

    Article  Google Scholar 

  • Alghamdi A, Alshamrani M, Alqahtani A, Al Ghamdi SSA, Harrathi R (2016) Secure data aggregation scheme in wireless sensor networks for IoT. In: Proceedings of the 2016 international symposium on networks, computers and communications (ISNCC), pp 1–5, IEEE, Hammamet, Tunisia, May 2016

  • Cecchinel C, Jimenez M, Mosser S, Riveill M (2014) An architecture to support the collection of big data in the internet of things. In: Proceedings of the 2014 IEEE world congress on services, pp 442–449, IEEE, Anchorage, AK, USA

  • Chen X, Li J, Huang X, Ma J, Lou W (2015) New publicly verifable databases with efficient updates. IEEE Trans Dependable Secure Comput 12(5):546–556

    Article  Google Scholar 

  • Dang TD, Hoang D (2017) A data protection model for fog computing. In: Second international conference fog mob edge computing (FMEC) vol 1, pp 24–32

  • Fard AF, Hajiaghaei-Keshteli M (2016) Red deer algorithm (RDA); a new optimization algorithm inspired by Red Deers’ mating. In: International conference on industrial engineering, IEEE (2016 e), pp 33–34

  • Gosman C, Dobre C, Pop F (2017) Privacy-preserving data aggregation in intelligent transportation systems. In: Proceedings of the 2017 IFIP/IEEE symposium on integrated network and service management (IM), pp 1059–1064, IEEE, Lisbon, Portugal, May 2017.

  • He W, Liu X, Nguyen H, Nahrstedt K, Abdelzaher T (2007) PDA: privacy-preserving data aggregation in wireless sensor networks. In: Proceedings of the INFOCOM 2007 26th IEEE international conference on computer communications, pp 2045–2053, IEEE, Anchorage, AK, USA, May 2007

  • He D, Kumar N, Zeadally S, Vinel A, Yang LT (2017) Efcient and privacy-preserving data aggregation scheme for smart grid against internal adversaries. IEEE Trans Smart Grid 8(5):2411–2419

    Article  Google Scholar 

  • Hu C, Li H, Huo Y, Xiang T, Liao X (2016) Secure and efficient data communication protocol for wireless body area networks. IEEE Trans Multi-Scale Comput Syst 2(2):94–107

    Article  Google Scholar 

  • Huo Y, Tian Y, Ma L, Cheng X, Jing T (2018) Jamming strategies for physical layer security. IEEE Wirel Commun 25(1):148–153

    Article  Google Scholar 

  • Kalyani G, Chaudhari S (2019) Data privacy preservation in MAC aware Internet of things with optimized key generation. J King Saud Univ-Comput Inf Sci. https://doi.org/10.1016/j.jksuci.2019.12.008

    Article  Google Scholar 

  • Karamitsios K, Orphanoudakis T (2017) Efficient IoT data aggregation for connected health applications. In: Proceedings of the 2017 IEEE symposium on computers and communications (ISCC), pp 1182–1185, IEEE, Heraklion, Greece, July 2017

  • Knirsch F, Eibl G, Engel D (2018) Error-resilient masking approaches for privacy preserving data aggregation. IEEE Trans Smart Grid 9(4):3351–3361

    Article  Google Scholar 

  • Li H, Lin X, Yang H, Liang X, Lu R, Shen X (2014) Eppdr: an efficient privacy-preserving demand response scheme with adaptive key evolution in smart grid. IEEE Trans Parallel Distrib Syst 25(8):2053–2064

    Article  Google Scholar 

  • Lu R (2016) Privacy-preserving multidimensional data aggregation. Wireless Netw 1(2):41–60

    Article  Google Scholar 

  • Lu R, Heung K, Lashkari AH, Ghorbani AA (2017a) A lightweight privacy-preserving data aggregation scheme for fog computing-enhanced IoT. IEEE Access 5:3302–3312

    Article  Google Scholar 

  • Lu R, Heung K, Lashkari AH, Ghorbani AA (2017b) A lightweight privacy-preserving data aggregation scheme for fog computingenhanced IoT. IEEE Access 5:3302–3312

    Article  Google Scholar 

  • Mahmoud MM, Saputro N, Akula PK, Akkaya K (2017) Privacypreserving power injection over a hybrid AMI/LTE smart grid network. IEEE Int Things J 4(4):870–880

    Article  Google Scholar 

  • Ming Y, Zhang X, Shen X (2019) Efcient privacy-preserving multidimensional data aggregation scheme in smart grid. IEEE Access 1(1):1–1

    Google Scholar 

  • Perera C, Ranjan R, Wang L, Khan SU, Zomaya AY (2015) Big data privacy in the internet of things era. IT Prof 17(3):32–39

    Article  Google Scholar 

  • Zhang Y, Zhao J, Zheng D, Deng K, Ren F, Zheng X (2018a) Privacyaware data collection and aggregation in IoT enabled fog computing. In: International conference on algorithms and architectures for parallel processing. Springer, Cham, pp 581–590

  • Zhang Y, Zhao J, Zheng D, Deng K, Ren F, Zheng X, Shu J (2018b) Privacy-preserving data aggregation against false data injection attacks in fog computing. Sensors 18(8):2659–2659

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to P. Devi.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Devi, P., Sathyalakshmi, S. & Subramanian, D.V. An optimal metaheuristic optimization based ElGamal public key cryptosystem for privacy in IoT environment. Int J Syst Assur Eng Manag (2021). https://doi.org/10.1007/s13198-021-01173-0

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s13198-021-01173-0

Keywords

Navigation