2022
DOI: 10.1016/j.jksuci.2019.12.008
|View full text |Cite
|
Sign up to set email alerts
|

Data privacy preservation in MAC aware Internet of things with optimized key generation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
5

Relationship

1
4

Authors

Journals

citations
Cited by 9 publications
(8 citation statements)
references
References 23 publications
0
8
0
Order By: Relevance
“…This evaluation is undergone for three sets of data sets. The resultant acquired by the presented work (WNU) is compared over the existing models, like AAP‐CSA, 30 CM‐LA, 35 BS‐WOA, 36 GA, 37 and PSO 38…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…This evaluation is undergone for three sets of data sets. The resultant acquired by the presented work (WNU) is compared over the existing models, like AAP‐CSA, 30 CM‐LA, 35 BS‐WOA, 36 GA, 37 and PSO 38…”
Section: Resultsmentioning
confidence: 99%
“…This evaluation is undergone for three sets of data sets. The resultant acquired by the presented work (WNU) is compared over the existing models, like AAP-CSA, 30 CM-LA, 35 BS-WOA, 36 GA, 37 and PSO. 38 This evaluation is undergone in terms of the cost function, chosen-ciphertext attack (CCA), key sensitivity, attacks as well.…”
Section: Simulation Proceduresmentioning
confidence: 99%
“…The previous work focuses on the data privacy preservation framework in MAC with the 'optimal key generation process'. As a novelty, the key is optimally selected by the hybridized Cuckoo Mated Lion Algorithm (CM-LA) model [35]. The optimization leads to the production of the optimal key this obviously enhances and assures the security crisis.…”
Section: Elgamal Cryptosystem For Data Privacy Preservationmentioning
confidence: 99%
“…The adopted cross layer protocol was executed in MATLAB R2019a and the corresponding outcomes were achieved. Accordingly, the performance of the presented secured cross layer protocol was compared over the other security protocols based on approaches like GA [30], PSO [31], FF [32], CS [33], LA [34] and CM-LA [35]. Here, validation was carried out with respect to varied measures like MAC overhead (seconds) and MAC protection frequency (%)by varying the number of nodes from 250, 500, 750 and 1000.In addition, analysis was done by varying the threshold from 0.3, 0.4, 0.5 and 0.7 and the results were observed.…”
Section: Simulation Setupmentioning
confidence: 99%
“…Since the new contribution, the purposes for optimizing the respective private key using the new EPO algorithm. Also, the encryption message ∈ 1 and the public key is defined as the pair i 1 ≡ ( ′ ) ; 2 ≡ i mod , where refers the random number [25].…”
Section: Encryption Of Shares Using Epo-epkc Algorithmmentioning
confidence: 99%