An Effective Signcryption with Optimization Algorithm for IoT-enabled Secure Data Transmission
نویسندگان
چکیده
Internet of Things (IoT) allows several low resources and controlled devices to interconnect, calculate processes make decisions in the communication network. In heterogeneous environment for IoT devices, challenging issues such as energy, storage, efficiency, security. The design encryption techniques enables transmission data a secured way. proper selection optimal keys helps boost performance. With this motivation, study presents signcryption with quantum chaotic krill herd algorithm (SCQCKH-SDT) environment. proposed SCQCKH-SDT technique aims effectively encrypts by use generated CQKH algorithm. initially employs data. order optimize secrecy, key generation process is carried out using Chaotic Krill Herd (CQKH) incorporates concept computing theory into traditional KH performance validation performed benchmark dataset. An extensive comparative analysis reported superior over recent approaches.
منابع مشابه
An Eecient Scheme for Secure Message Transmission Using Proxy-signcryption
Previous proxy signature schemes enable a principal to have a trusted proxy agent sign messages on its behalf. We present a proxy signature scheme that combines the functionality of proxy signing and en-cryption. This proxy-signcryption scheme is useful for applications that are based on unreliable datagram style network communication model where messages are individually signed and not seriall...
متن کاملAn IOT-enabled System for Marine Data Acquisition and Cartography
Current satellite communication remains very expensive and impractical for most small to mid-sized vessels, and at the same time marine wireless networking is lack of network coverage. To solve this problem, this paper proposes a novel IOT (Internet of Things) enabled system for marine data acquisition and cartography based on Ship Ad-hoc Networks (SANET’s). Ships are equipped with Very High Fr...
متن کاملAn ILP-based DMA Data Transmission Optimization Algorithm for MPSoC
With the rapid development of integrated circuit design technology and the processed tasks and data volumes growing, MPSoC is becoming increasingly popular in a variety of applications. In MPSoC design, parallelism is a very important issue, for example, how to realize task parallelism and data parallelism. Focusing on this issue, this paper analyzes the role of DMA and presents an ILP-Based DM...
متن کاملAn Optimization K-Modes Clustering Algorithm with Elephant Herding Optimization Algorithm for Crime Clustering
The detection and prevention of crime, in the past few decades, required several years of research and analysis. However, today, thanks to smart systems based on data mining techniques, it is possible to detect and prevent crime in a considerably less time. Classification and clustering-based smart techniques can classify and cluster the crime-related samples. The most important factor in the c...
متن کاملUltra Low Power Symmetric Pass Gate Adiabatic Logic with CNTFET for Secure IoT Applications
With the advent and development of the Internet of Things, new needs arose and more attention was paid to these needs. These needs include: low power consumption, low area consumption, low supply voltage, higher security and so on. Many solutions have been proposed to improve each one of these needs. In this paper, we try to reduce the power consumption and enhance the security by using SPGAL, ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Computers, materials & continua
سال: 2022
ISSN: ['1546-2218', '1546-2226']
DOI: https://doi.org/10.32604/cmc.2022.027858