Encryption technology has a great influence on data security. There are many encryptions have been proposed. In general, the encryptions with higher complexity will provide higher security, but it will also consume a lot of computing resources. In some cases, these high complexity method may not suitable such as Internet of Thing devices. This is because Internet of Thing device has lower computing power due to the size and the limited battery. Therefore, most of Internet of Thing (IoT) devices are used symmetric encryption as the main method. However, this kind of symmetric encryption algorithms are easy to occur weak keys such as data encryption algorithm (DES). This will expose IoT devices to high risk environments. In this study, a new fitness function has given and then a Genetic Algorithm-based symmetric key generation is proposed. As the simulation results, our proposed method can provide higher randomness and very low probability to occur the weak keys so that the data security in IoT environment will be increased significantly.
This is a preview of subscription content, access via your institution.
Buy single article
Instant access to the full article PDF.
Tax calculation will be finalised during checkout.
Subscribe to journal
Immediate online access to all issues from 2019. Subscription will auto renew annually.
Tax calculation will be finalised during checkout.
Zhang C, Cho HH, Chen CY, Shih TK, Chao HC (2019) Fuzzy-based 3-D stream traffic Lightweighting over Mobile P2P network. IEEE Syst J 14(2):1840–1851
Chao HC, Cho HH, Shih TK, Chen CY (2019) Bacteria-inspired network for 5G Mobile communication. IEEE Netw 33(4):138–145
Suliman A, Husain Z, Abououf M, Alblooshi M, Salah K (2018) Monetization of IoT data using smart contracts. IET Netw 8(1):32–37
Huang H, Savkin AV, Huang C (2020) Drone routing in a time-dependent network: towards low cost and large range parcel delivery. IEEE Trans Ind Inform 17:1526
Min Z, Yang G, Wang J, Kim GJ (2019) A privacy-preserving BGN-type parallel Homomorphic encryption algorithm based on LWE. J Internet Technol 20(7):2189–2200
Boussif M, Aloui N, Cherif A (2018) Secured cloud computing for medical data based on watermarking and encryption. IET Netw 7(5):294–298
Chen CY, Chao HC (2014) A survey of key distribution in wireless sensor networks. Secur Commun Netw 7(12):2495–2508
Impressive IoT Statistics (2020-2021) Data analysis & market share. Available: https://financesonline.com/iot-statistics/. Accessed April 2021
Cho HH, Wu HT, Lai CF, Shih TK, Tseng FH (2020) Intelligent charging path planning for IoT network over Blockchain-based edge architecture. IEEE Internet Things J 8(4):2379–2394
Tseng FH, Cho HH, Chou LD, Shih TK, Chao HC (2016) An efficient power conservation scheme in non-zero-sum duty-cycle game for wireless sensor networks. Int J Sensor Netw 21(4):242–251
Cho HH, Shih TK, Chao HC (2015) A robust coverage scheme for UWSNs using the spline function. IEEE Sensors J 16(11):3995–4002
Bellare M, Desai A, Jokipii E, Rogaway P (1997) A concrete security treatment of symmetric encryption. In proceedings IEEE 38th annual symposium on foundations of computer science, pp 394–403
Bellare M, Rogaway P (1994) Optimal asymmetric encryption. In workshop on the theory and application of of cryptographic techniques. Springer, Berlin, Heidelberg, pp 92–111
Estrellado MEL, Sison AM, Tanguilig BT III (2016) Test Bank management system applying Rasch model and data encryption standard (DES) algorithm. Int J Mod Educ Comput Sci 8(10):1–8
Needham RM, Schroeder MD (1978) Using encryption for authentication in large networks of computers. Commun ACM 21(12):993–999
Amorado RV, Sison AM, Medina RP (2019) Enhanced data encryption standard (DES) algorithm based on filtering and striding techniques. In proceedings of the 2019 2nd international conference on information science and systems, pp 252–256
Singh G (2013) A study of encryption algorithms (RSA, DES, 3DES and AES) for information security. Int J Comput Appl 67(19):33–38
Vuppala A, Roshan RS, Nawaz S, Ravindra JVR (2020) An efficient optimization and secured triple data encryption standard using enhanced key scheduling algorithm. Proc Comput Sci 171:1054–1063
Niu Y, Zhang J, Wang A, Chen C (2019) An efficient collision power attack on AES encryption in edge computing. IEEE Access 7:18734–18748
Langenberg B, Pham H, Steinwandt R (2020) Reducing the cost of implementing the advanced encryption standard as a quantum circuit. IEEE Trans Quantum Eng 1:1–12
Deng L, Yang Y, Chen Y, Wang X (2018) Aggregate signature without pairing from certificateless cryptography. J Internet Technol 19(5):1479–1486
Martínez R, Casellas R, Moreolo MS, Fabrega JM, Vilalta R, Muñoz R, Otero G (2020) Experimental evaluation of an on-line RSA algorithm for SDN-controlled optical metro networks with VCSEL-based S-BVTs. In: In 2020 IEEE international conference on optical network design and modeling (ONDM), pp 1–6
Hoffman, P., & Wijngaards, W. (2012). Elliptic curve digital signature algorithm (DSA) for dnssec. document RFC6605
Hong DL (2020) A new digital signature scheme based on the hardness of some expanded root problems. Proc Comput Sci 171:541–550
Tsai MY, Cho HH, Chen CY, Chen WM (2020) A novel genetic algorithm-based DES key generation scheme. In international conference on bio-inspired information and communication technologies. Springer, Cham, pp 199–211
Hussain I, Negi MC, Pandey N (2017) A secure IoT-based power plant control using RSA and DES encryption techniques in data link layer. In 2017 IEEE international conference on Infocom technologies and unmanned systems (trends and future directions)(ICTUS), pp 464–470
Gong T, Huang H, Li P, Zhang K, Jiang H (2015) A medical healthcare system for privacy protection based on IoT. In 2015 IEEE 17th international symposium on parallel architectures, algorithms and programming (PAAP), pp 217–222
Uluagac AS, Beyah RA, Copeland JA (2010) Time-based dynamic keying and en-route filtering (TICK) for wireless sensor networks. In 2010 IEEE global telecommunications conference GLOBECOM 2010, pp 1–6
Tsai CW, Rodrigues JJ (2013) Metaheuristic scheduling for cloud: a survey. IEEE Syst J 8(1):279–291
Nazeer MI, Mallah GA, Bhatra R, Memon RA (2018) Implication of genetic algorithm in cryptography to enhance security. Int J Adv Comput Sci Appl 9(6):375–379
DES, Available: https://github.com/nkengasongatem/java-des-mplementation. Accessed Dec 2019
This research was partly funded by the Ministry of Science and Technology of the R.O.C. under grants MOST 108-2221-E-197 -012 -MY3.
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
About this article
Cite this article
Tsai, MY., Cho, HH. A High Security Symmetric Key Generation by Using Genetic Algorithm Based on a Novel Similarity Model. Mobile Netw Appl (2021). https://doi.org/10.1007/s11036-021-01753-1
- Information security
- Symmetric keys‧ genetic algorithms