figshare
Browse

Cryptography in IoT Using Elliptic Curve Cryptography with Adaptive Hunter-Prey Optimization

dataset
posted on 2025-02-18, 06:20 authored by C.A. Yogaraja, R.S. Sankarasubramanian, M. Geetha, R. Keerthanadevi

The Internet of Things (IoT) is utilized in different applications and the increasing connectivity of IoT devices raises significant concerns regarding data security and privacy. Security is a major aspect and a fundamental necessity in IoT design. The rise in cyberattacks necessitates the development of an effective strategic approach to safeguard IoT systems. Better data security in IoT has become a significant challenge and this issue can be addressed by evaluating proper encryption techniques while storing data in IoT environments. Cryptographic techniques should be lightweight, efficient, and versatile to the limited computational resources of IoT devices. This work proposes an approach called Elliptic Curve Cryptography (ECC) with the Adaptive Hunter Prey Optimization (AHPO) algorithm for providing data security in IoT. The encryption technique ECC provides a robust and lightweight encryption mechanism and the AHPO is employed for optimal key generation and management processes, enhancing both security and efficiency. Then, the encrypted data are hashed by the MD-5 algorithm. The suggested model addresses the need for reduced computational load and power consumption in IoT environments and maintaining a high level of security. Experimental outcomes demonstrate the efficacy of this approach in optimizing cryptographic operations, making it a feasible solution to secure IoT networks.

This work proposes an approach called Elliptic Curve Cryptography (ECC) with the Adaptive Hunter Prey Optimization (AHPO) algorithm for providing data security in IoT.

The encryption technique ECC provides a robust and lightweight encryption mechanism and the AHPO is employed for optimal key generation and management processes, enhancing both security and efficiency.

Then, the encrypted data are hashed by the MD-5 algorithm.

The suggested model addresses the need for reduced computational load and power consumption in IoT environments and maintaining a high level of security.

Experimental outcomes demonstrate the efficacy of this approach in optimizing cryptographic operations, making it a feasible solution to secure IoT networks.

This work proposes an approach called Elliptic Curve Cryptography (ECC) with the Adaptive Hunter Prey Optimization (AHPO) algorithm for providing data security in IoT.

The encryption technique ECC provides a robust and lightweight encryption mechanism and the AHPO is employed for optimal key generation and management processes, enhancing both security and efficiency.

Then, the encrypted data are hashed by the MD-5 algorithm.

The suggested model addresses the need for reduced computational load and power consumption in IoT environments and maintaining a high level of security.

Experimental outcomes demonstrate the efficacy of this approach in optimizing cryptographic operations, making it a feasible solution to secure IoT networks.

The major contributions are:

To present cryptography in IoT using Elliptic Curve Cryptography (ECC) with Adaptive Hunter-Prey Optimization (AHPO).

To present encryption using the ECC and the optimal key generation using AHPO.

To compare different performances of the suggested ECC-AHPO over various conventional cryptographic approaches.

To present cryptography in IoT using Elliptic Curve Cryptography (ECC) with Adaptive Hunter-Prey Optimization (AHPO).

To present encryption using the ECC and the optimal key generation using AHPO.

To compare different performances of the suggested ECC-AHPO over various conventional cryptographic approaches.

History