Volume 16 , Issue 1 , PP: 85-100, 2024 | Cite this article as | XML | Html | PDF | Full Length Article
Abhishek Kumar 1 * , Samta Jain Goyal 2 , Sumit Kumar 3 , Hitesh Kumar Sharma 4
Doi: https://doi.org/10.54216/FPA.160107
IoT devices have transformed smart cities and healthcare. The expanding usage of IoT devices creates major security threats, leaving critical systems vulnerable to sophisticated and persistent assaults. Our hybrid IoT security approach employs homomorphic encryption and improved MobileNet to protect data and simplify feature extraction. Our extensive testing and assessment prove that the proposed structure makes IoT settings more resistant to sophisticated persistent attacks. We discovered superior methodologies for F1 score, accuracy, precision, and memory performance measurement. To ensure data privacy and security during analysis and transmission, homomorphic encryption is incorporated. Our ablation research lays out each framework component's contributions. To increase system speed, it emphasizes safe data processing, real-time analytical optimization, lightweight feature extraction, and privacy-preserving computing. The scalability study indicates that the framework can scale with IoT installations while maintaining peak performance and resource efficiency. Finally, the hybrid IoT security architecture improves IoT security. It provides a full and effective security solution for IoT infrastructure. Lawmakers, business experts, and students in the sector may learn from this research regarding genuine IoT security systems.
Advanced Persistent Threats , Data Privacy , Encryption , Feature Extraction , Homomorphic Encryption , Internet of Things , Lightweight , MobileNet , Security Frameworks , Threat Mitigation.
[1] M. Zhang, Y. Zhang, Y. Jiang, and J. Shen, "Obfuscating EVES algorithm and its application in fair electronic transactions in public clouds," IEEE Systems Journal, pp. 1–9, 2019.
[2] X. Li, Y. Zhu, J. Wang, Z. Liu, Y. Liu, and M. Zhang, "On the soundness and security of privacy-preserving SVM for outsourcing data classification," IEEE Transactions on Dependable and Secure Computing, vol. 15, no. 5, pp. 906–912, 2018.
[3] Z. Liu, X. Huang, Z. Hu, M. K. Khan, H. Seo, and L. Zhou, "On emerging family of elliptic curves to secure internet of things: ECC comes of age," IEEE Transactions on Dependable and Secure Computing, vol. 14, no. 3, pp. 237–248, 2017.
[4] M. Zhang, Y. Yao, Y. Jiang, B. Li, and C. Tang, "Accountable mobile E-commerce scheme in intelligent cloud system transactions," Journal of Ambient Intelligence and Humanized Computing, vol. 9, no. 6, pp. 1889–1899, 2018.
[5] R. Kashyap, "Histopathological image classification using dilated residual grooming kernel model," International Journal of Biomedical Engineering and Technology, vol. 41, no. 3, p. 272, 2023. [Online]. Available: https://doi.org/10.1504/ijbet.2023.129819
[6] V. Roy and S. Shukla, "Mth Order FIR Filtering for EEG Denoising Using Adaptive Recursive Least Squares Algorithm," 2015 International Conference on Computational Intelligence and Communication Networks (CICN), 2015, pp. 401-404, doi: 10.1109/CICN.2015.85.
[7] E. Ramirez-Asis, R. P. M. Bolivar, L. A. Gonzales, S. Chaudhury, R. Kashyap, W. F. Alsanie, G. K. Viju, "A Lightweight Hybrid Dilated Ghost Model-Based Approach for the Prognosis of Breast Cancer," Computational Intelligence and Neuroscience, vol. 2022, Article ID 9325452, 10 pages, 2022. [Online]. Available: https://doi.org/10.1155/2022/9325452
[8] C. Gentry, "Fully homomorphic encryption using ideal lattices," in Proceedings of the 41st annual ACM symposium on Theory of Computing (STOC '09), pp. 169–178, ACM, New York, NY, USA, 2009.
[9] Z. Brakerski and V. Vaikuntanathan, "Efficient fully homomorphic encryption from (standard) LWE," in Proceedings of the IEEE 52nd Annual Symposium on Foundations of Computer Science (FOCS '11), pp. 97–106, Palm Springs, Calif, USA, October 2011.
[10] Z. Brakerski and V. Vaikuntanathan, "Fully homomorphic encryption from ring-LWE and security for key dependent messages," in Advances in Cryptology – CRYPTO 2011, R. Phillip, Ed., vol. 6841, pp. 505–524, Springer, Berlin, Germany, 2011.
[11] M. van Dijk, C. Gentry, S. Halevi, and V. Vaikuntanathan, "Fully homomorphic encryption over the integers," in Advances in cryptology—EUROCRYPT 2010, H. Gilbert, Ed., vol. 6110, pp. 24–43, Springer, Berlin, Germany, 2010.
[12] F. Armknecht and T. Strufe, "An efficient distributed privacy-preserving recommendation system," in Proceedings of the 2011 the 10th IFIP Annual Mediterranean Ad Hoc Networking Workshop, Med-Hoc-Net'2011, pp. 65–70, Italy, June 2011.
[13] C. Bosch, A. Peter, P. Hartel, and W. Jonker, "SOFIR: Securely outsourced Forensic image recognition," in Proceedings of the 2014 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2014, pp. 2694–2698, Italy, May 2014.
[14] Jeckmans, A. Peter, and P. Hartel, "Efficient privacy-enhanced familiarity-based recommender system," in Computer Security – ESORICS 2013, J. Crampton, S. Jajodia, and K. Mayes, Eds., vol. 8134 of Lecture Notes in Computer Science, pp. 400–417, Springer Berlin Heidelberg, Berlin, Heidelberg, 2013.
[15] V. Roy et al., “Detection of sleep apnea through heart rate signal using Convolutional Neural Network,” International Journal of Pharmaceutical Research, vol. 12, no. 4, pp. 4829-4836, Oct-Dec 2020.
[16] R. Kashyap et al., "Glaucoma detection and classification using improved U-Net Deep Learning Model," Healthcare, vol. 10, no. 12, p. 2497, 2022. [Online]. Available: https://doi.org/10.3390/healthcare10122497
[17] Vinodkumar Mohanakurup, Syam Machinathu Parambil Gangadharan, Pallavi Goel, Devvret Verma, Sameer Alshehri, Ramgopal Kashyap, Baitullah Malakhil, "Breast Cancer Detection on Histopathological Images Using a Composite Dilated Backbone Network," Computational Intelligence and Neuroscience, vol. 2022, Article ID 8517706, 10 pages, 2022. [Online]. Available: https://doi.org/10.1155/2022/8517706
[18] L. Li, R. Lu, K.-K. R. Choo, A. Datta, and J. Shao, "Privacy-preserving-outsourced association rule mining on vertically partitioned databases," IEEE Transactions on Information Forensics and Security, vol. 11, no. 8, pp. 1547–1861, 2016.
[19] B. Wang, Y. Zhan, and Z. Zhang, "Cryptanalysis of a symmetric fully homomorphic encryption scheme," IEEE Transactions on Information Forensics and Security, vol. 13, no. 6, pp. 1460–1467, 2018.
[20] Roy, V., Shukla, S. Effective EEG Motion Artifacts Elimination Based on Comparative Interpolation Analysis. Wireless Pers Commun 97, 6441–6451 (2017). https://doi.org/10.1007/s11277-017-4846-3.
[21] S. Stalin, V. Roy, P. K. Shukla, A. Zaguia, M. M. Khan, P. K. Shukla, A. Jain, "A Machine Learning-Based Big EEG Data Artifact Detection and Wavelet-Based Removal: An Empirical Approach," Mathematical Problems in Engineering, vol. 2021, Article ID 2942808, 11 pages, 2021. [Online]. Available: https://doi.org/10.1155/2021/2942808
[22] K. Lenstra, H. W. Lenstra Jr., and L. Lovász, "Factoring polynomials with rational coefficients," Mathematische Annalen, vol. 261, no. 4, pp. 515–534, 1982.