Rivest-Shamir-Adleman Algorithm Optimized to Protect IoT Devices from Specific Attacks
Keywords:
Internet-of-Things (IoT), network security, fuzzy anomaly detection, Naïve Bayes classification, RSAAbstract
IoT devices are crucial in this modern world in many ways, as they provide support for environmental sensing, automation, and responsible resource conservation. The immense presence of IoT devices in everyday life is inevitable in the smart world. The predominant usage of IoT devices lurks the prying eyes of intentional hackers. Though there are several precautionary security systems and protocols available for generic wireless networks, it is observed that there is a need to formulate a state-of-the-art security mechanism exclusively for IoT network environments. This work is submitted here for the betterment of IoT network security. Three dedicated contributions are integrated in this work to achieve higher security scores in IoT network environments. Fast Fuzzy Anomaly Detector, Legacy Naïve Bayes Attack Classifiers, and Variable Security Schemer of Rivest-Shamir-Adleman algorithm are the novel modules introduced in this work abbreviated as ASORI (Attack Specific Security Optimized RSA for IoT). Captivating the advantages of the onboard IoT certification mechanism and selecting a dynamic security strategy are the novelties introduced in this work. ASORI model is tested with industrial standard network simulator OPNET to ensure the improved security along with vital network performance parameter betterments.
References
2. Quy V., Hau N., Anh D., Ngoc L. Smart healthcare IoT applications based on fog computing: architecture, applications and challenges. Complex & Intelligent Systems. 2022. vol. 8. pp. 3805–3815. DOI: 10.1007/s40747-021-00582-9.
3. Rejeb A., Rejeb K., Simske S., Treiblmaier H., Zailani S. The big picture on the internet of things and the smart city: a review of what we know and what we need to know. Internet of Things. 2022. vol. 19. DOI: 10.1016/j.iot.2022.100565.
4. Inayat U., Zia M., Mahmood S., Khalid H., Benbouzid M. Learning-Based Methods for Cyber Attacks Detection in IoT Systems: A Survey on Methods, Analysis, and Future Prospects. Electronics. 2022. vol. 11(9). DOI: 10.3390/electronics11091502.
5. Hatami M., Leinonen M., Chen Z., Pappas N., Codreanu M. On-Demand AoI Minimization in Resource-Constrained Cache-Enabled IoT Networks With Energy Harvesting Sensors. IEEE Transactions on Communications. 2022. vol. 70. no. 11. pp. 7446–7463. DOI: 10.1109/TCOMM.2022.3208873.
6. Nagaraju R, C V, J K, G M, Goyal SB, Verma C, Safirescu C, Mihaltan T. Secure Routing-Based Energy Optimization for IoT Application with Heterogeneous Wireless Sensor Networks. Energies. 2022. vol. 15(13). DOI: 10.3390/en15134777.
7. Fotohi R., Bari S., Yusefi M. Securing Wireless Sensor Networks against Denial-of-Sleep Attacks Using RSA Cryptography Algorithm and Interlock Protocol. International Journal of Communication Systems. 2019. vol. 33(4). DOI: 10.1002/dac.4234.
8. Yang S.-K., Shiue Y.-M., Su Z.-Y., Liu I.-H., Liu C.-G. An Authentication Information Exchange Scheme in WSN for IoT Applications. IEEE Access. 2020. vol. 8. pp. 9728–9738. DOI: 10.1109/ACCESS.2020.2964815.
9. Ullah A., Said G., Sher M., Ning H. Fog-assisted secure healthcare data aggregation scheme in IoT-enabled WSN. Peer-to-Peer Networking and Applications. 2020. vol. 13. pp. 163–174. DOI: 10.1007/s12083-019-00745-z.
10. Singh D., Kumar B., Singh S., Chand S. A Secure IoT-Based Mutual Authentication for Healthcare Applications in Wireless Sensor Networks Using ECC. International Journal of Healthcare Information Systems and Informatics. 2021. vol. 16. no. 2. pp. 21–48. DOI: 10.4018/IJHISI.20210401.oa2.
11. Ahmad A., Ullah A., Feng C., Khan M., Ashraf S., Adnan M., Nazir S., Ullah Khan H. Towards an Improved Energy Efficient and End-to-End Secure Protocol for IoT Healthcare Applications. Security and Communication Networks. 2020. vol. 2020. DOI: 10.1155/2020/8867792.
12. Nada A., Bayoumi M. Development of a constraint stabilization method of multibody systems based on fuzzy logic control. Multibody System Dynamics. 2024. vol. 61. pp. 233–265. DOI: 10.1007/s11044-023-09921-9.
13. Liu L., Xue D., Zhang S. General type industrial temperature system control based on fuzzy fractional-order PID controller. Complex and Intelligent Systems. 2023. vol. 9. pp. 2585–2597. DOI: 10.1007/s40747-021-00431-9.
14. Sivapriya N., Ravi T. Efficient Fuzzy based Multi-constraint Multicast Routing with Multi-criteria Enhanced Optimal Capacity–Delay Tradeoff. International Journal of Scientific & Technology Research. 2019. vol. 8(8). pp. 1468–1473.
15. Jasim A., Kashmar A. An Evaluation of RSA and a Modified SHA-3 for a New Design of Blockchain Technology. Artificial Intelligence for Smart Healthcare. EAI/Springer Innovations in Communication and Computing. Cham: Springer, 2023. pp. 477–489. DOI: 10.1007/978-3-031-23602-0_28.
16. Abid R., Iwendi C., Javed A., Rizwan M., Jalil Z., Anajemba J., Biamba C. An optimised homomorphic CRT-RSA algorithm for secure and efficient communication. Personal and Ubiquitous Computing. 2023. vol. 27. pp. 1405–1418. DOI: 10.1007/s00779-021-01607-3.
17. Anushiya R., Lavanya V. A new deep-learning with swarm based feature selection for intelligent intrusion detection for the Internet of things. Measurement: Sensors. 2023. vol. 26. DOI: 10.1016/j.measen.2023.100700.
18. Roldan-Gomez J., Boubeta-Puig J., Carrillo-Mondejar J., Manuel Castelo Gomez J., del Rincon J. An automatic complex event processing rules generation system for the recognition of real-time IoT attack patterns. Engineering Applications of Artificial Intelligence. 2023. vol. 123. DOI: 10.1016/j.engappai.2023.106344.
19. Size considerations for public and private keys. Available at: https://www.ibm.com/docs/en/zos/2.3.0?topic=certificates-size-considerations-public-private-keys (accessed 26.01.2024).
20. Visual Studio 2022. Available at: https://visualstudio.microsoft.com/vs/ (accessed 10.02.2024).
21. Features of C++ 20. Available at: https://www.geeksforgeeks.org/features-of-c-20/ (accessed 04.02.2024).
22. OPNET Network Simulator. Available at: https://opnetprojects.com/opnet-network-simulator/ (accessed 16.14.2024).
Published
How to Cite
Section
Copyright (c) R. Rita Jenifer, Unknown

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms: Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).