Improved bio-inspired security scheme for privacy-preserving in the internet of things

Yasmine Harbi, Allaoua Refoufi, Zibouda Aliouat, Saad Harous

Research output: Contribution to journalArticlepeer-review

Abstract

Internet of things (IoT) allows the interconnection between physical devices to improve human lives by offering daily services intelligently. The IoT devices are embedded with sensors and actuators to control our physical world and share personal information via wireless channels. To secure data transmission in the IoT, privacy-preserving is highly necessary. Conventional cryptographic techniques are basic tools to secure wireless communications. However, they cannot be adopted in IoT applications because of resource-constrained devices. Bio-inspired cryptography optimizes conventional cryptography and provides lightweight security solutions for resource-constrained devices. Recently, an encryption security scheme was proposed to secure multimedia communications in IoT. In this paper, we demonstrate that this scheme is prone to several security attacks. Then, we propose a bio-inspired security scheme to achieve privacy-preserving in the IoT. The improved scheme is based on a genetic algorithm and a chaotic system to encrypt/decrypt multimedia data. We formally verified the security of the proposed scheme using the AVISPA tool and evaluated its performance using NS-3. The security and performance results show that our proposed scheme is more secure and efficient than recent related methods.

Original languageEnglish
Pages (from-to)2488-2502
Number of pages15
JournalPeer-to-Peer Networking and Applications
Volume15
Issue number6
DOIs
Publication statusPublished - Nov 2022
Externally publishedYes

Keywords

  • Bio-inspired encryption
  • Chaotic cryptography
  • Genetic algorithm
  • IoT
  • Lightweight cryptography
  • Wireless sensor networks

ASJC Scopus subject areas

  • Software
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Improved bio-inspired security scheme for privacy-preserving in the internet of things'. Together they form a unique fingerprint.

Cite this