DS Journal of Digital Science and Technology (DS-DST)

Research Article | Open Access | Download Full Text

Volume 1 | Issue 1 | Year 2022 | Article Id: DST-V1I1P102 DOI: https://doi.org/10.59232/DST-V1I1P102

A Fog Computing Approach for Securing IoT Devices Data using DNA-ECC Cryptography

R.Surendiran, K. Raja

ReceivedRevisedAcceptedPublished
11 May 202229 Jun 202202 Jul 202209 Jul 2022

Citation

R.Surendiran, K. Raja. “A Fog Computing Approach for Securing IoT Devices Data using DNA-ECC Cryptography.” DS Journal of Digital Science and Technology, vol. 1, no. 1, pp. 10-16, 2022.

Abstract

In recent times, the Internet of Things (IoT) placed a vital role in various applications because various devices are connected to make communication effective. Most people utilize the IoT to gather private information and the gathered details are saved in a third-parties database. Intermediary access or unauthorised individuals attempting to access sensitive information during storage pose a threat to data confidentiality, integrity, and privacy. During this process, fog computing is worked with IoT devices because it collects a large volume of data and is computationally intensive.the security, energy consumption of fog nodes and IoT devices is critical because they generate data that can be exploited by attackers. in order to ensure data security, encryption is an effective method. Various encryption schemes exist, but each has its own constraints.in this paper we develop a DNA-based Elliptic Curve Cryptography technique with RedFox Optimization algorithmfor clustering (RF-DECC) to control data security in fog computing. Initially, the cluster heads are identified according to the Redfox optimization. Once clustering has been completed, the cluster head begins the data encryption process by encrypting cluster members' data with DNA-Elliptic Curve Cryptography (ECC). in comparison to other well-known public key cryptography algorithms, the ECC is the most lightweight cryptography. Using DNA with ECC increases encryption complexity by encoding DNA.Based on the experimental results, proposed RF-DECC method is superior in terms of delays, throughput, energy consumption, and the data security ratio. the proposed RF-DECC method improves the overall data security of 24%, 32% better than existing DIoTA and FUPA respectively.

Keywords

Fog computing, Encryption, IoT, DNA, Elliptic curve cryptography, Cluster head

References

[1] Mohamed Elhoseny et al., “Hybrid Optimization with Cryptography Encryption for Medical Image Security in Internet of Things,” Neural Computing and Applications, vol. 32, no. 15, pp. 10979-10993, 2020.

[CrossRef] [Google Scholar] [Publisher Link]

[2] Tarek Gaber et al., “Trust-Based Secure Clustering in WSN-Based Intelligent Transportation Systems,” Computer Networks, vol. 146, pp. 151-158, 2018.

[CrossRef] [Google Scholar] [Publisher Link]

[3] R. Surendiran, and K. Alagarsamy, "Privacy Conserved Access Control Enforcement in MCC Network with Multilayer Encryption," International Journal of Engineering Trends and Technology, vol. 4, no. 5, pp. 2217-2224, 2013.

[CrossRef] [Google Scholar] [Publisher Link]

[4] Mayank Dixit, Jitendra Kumar, and Rajesh Kumar, “Internet of Things and Its Challenges,” 2015 International Conference on Green Computing and Internet of Things, IEEE, pp. 810-814, 2015.

[CrossRef] [Google Scholar] [Publisher Link]

[5] Luis M. Vaquero, and Luis Rodero-Merino, “Finding Your Way in the Fog: Towards a Comprehensive Definition of Fog Computing,”ACM SIGCOMM Computer Communication Review, vol. 44, no. 5, pp. 27-32, 2014.

[CrossRef] [Google Scholar] [Publisher Link]

[6] S. Gavaskar et al., “Three Counter Defense Mechanism for TCP SYN Flooding Attacks,” International Journal of Computer Applications, vol. 6, no. 6, pp. 12-15, 2010.

[CrossRef] [Google Scholar] [Publisher Link]

[7] Jie Lin et al., “A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications,” IEEE Internet of Things Journal, vol. 4, no. 5, pp. 1125-1142, 2017.

[CrossRef] [Google Scholar] [Publisher Link]

[8] Opeyemi Osanaiye et al., ”From Cloud to Fog Computing: A Review and a Conceptual Live VM Migration Framework,” IEEE Access, vol. 5, pp. 8284–8300, 2017.

[CrossRef] [Google Scholar] [Publisher Link]

[9] R. Surendiran, and K. Alagarsamy, "A Novel Tree Based Security Approach for Smart Phones," International Journal of Computer Trends and Technology, vol. 3, no. 6, pp. 787-792, 2012. 

[CrossRef] [Google Scholar] [Publisher Link]

[10] Lei Xu et al., “DIoTA: Decentralized-Ledger-Based Framework for Data Authenticity Protection in Iot Systems,” IEEE Network, vol. 34, no. 1, pp. 38-46, 2020.

[CrossRef] [Google Scholar] [Publisher Link]

[11] S. Gavaskar, E. Ramaraj, and R. Surendiran, “A Compressed Anti IP Spoofing Mechanism Using Cryptography,” International Journal of Computer Science and Network Security, vol. 12, no. 11, pp. 137-140, 2012.

[Google Scholar] [Publisher Link]

[12] Arun Murugesan et al., “Analysis on Homomorphic Technique for Data Security in Fog Computing,” Transactions on Emerging Telecommunications Technologies, vol. 32, no. 9, p. E3990, 2021.

[CrossRef] [Google Scholar] [Publisher Link]

[13] V. Lakshman Narayana, and R. S. M. Lakshmi Patibandla, “An Efficient Fog‐Based Model for Secured Data Communication,” Integration of Cloud Computing with Internet of Things: Foundations, Analytics, and Applications, pp. 41-55, 2021.

[CrossRef] [Google Scholar] [Publisher Link]

[14] P. Chinnasamy et al., “Efficient Data Security Using Hybrid Cryptography on Cloud Computing,” Inventive Communication and Computational Technologies, Springer, Singapore, pp. 537-547, 2021.

[CrossRef] [Google Scholar] [Publisher Link]

[15] R. Surendiran, and K. Alagarsamy, “A Crtitical Approach for Intruder Detection in Mobile Devices,” SSRG International Journal of Computer Science and Engineering, vol. 1, no. 4, pp. 6-14, 2014.

[CrossRef] [Publisher Link]

[16] Saeed Javanmardi et al., “FUPE: A Security Driven Task Scheduling Approach for SDN-Based Iot–Fog Networks,” Journal of Information Security and Applications, vol. 60, p. 102853, 2021.

[CrossRef] [Google Scholar] [Publisher Link]

A Fog Computing Approach for Securing IoT Devices Data using DNA-ECC Cryptography