Skip to main content
Log in

Improved bio-inspired security scheme for privacy-preserving in the internet of things

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

Internet of things (IoT) allows the interconnection between physical devices to improve human lives by offering daily services intelligently. The IoT devices are embedded with sensors and actuators to control our physical world and share personal information via wireless channels. To secure data transmission in the IoT, privacy-preserving is highly necessary. Conventional cryptographic techniques are basic tools to secure wireless communications. However, they cannot be adopted in IoT applications because of resource-constrained devices. Bio-inspired cryptography optimizes conventional cryptography and provides lightweight security solutions for resource-constrained devices. Recently, an encryption security scheme was proposed to secure multimedia communications in IoT. In this paper, we demonstrate that this scheme is prone to several security attacks. Then, we propose a bio-inspired security scheme to achieve privacy-preserving in the IoT. The improved scheme is based on a genetic algorithm and a chaotic system to encrypt/decrypt multimedia data. We formally verified the security of the proposed scheme using the AVISPA tool and evaluated its performance using NS-3. The security and performance results show that our proposed scheme is more secure and efficient than recent related methods.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14

Similar content being viewed by others

References

  1. Keoh SL, Kumar SS, Tschofenig H (2014) Securing the internet of things: A standardization perspective. IEEE Internet Things J 1(3):265–275

    Article  Google Scholar 

  2. Harbi Y, Aliouat Z, Harous S, Bentaleb A, Refoufi A (2019a) A review of security in internet of things. Wirel Pers Commun 108(1):325–344

  3. Harbi Y, Aliouat Z, Hammoudi S (2018a) Enhancement of iot applications dependability using bayesian networks. In: IFIP International Conference on Computational Intelligence and Its Applications, Springer, pp 487–497

  4. Ghadi M, Laouamer L, Moulahi T (2016) Securing data exchange in wireless multimedia sensor networks: perspectives and challenges. Multimed Tools Appl 75(6):3425–3451

    Article  Google Scholar 

  5. Asghari P, Rahmani AM, Javadi HHS (2019) Internet of things applications: A systematic review. Comput Netw 148:241–261

    Article  Google Scholar 

  6. Boussada R, Hamdane B, Elhdhili ME, Saidane LA (2019) Privacy-preserving aware data transmission for iot-based e-health. Comput Netw 162:106866

    Article  Google Scholar 

  7. Li R, Song T, Capurso N, Yu J, Couture J, Cheng X (2017) Iot applications on secure smart shopping system. IEEE Internet Things J 4(6):1945–1954

    Article  Google Scholar 

  8. Wollschlaeger M, Sauter T, Jasperneite J (2017) The future of industrial communication: Automation networks in the era of the internet of things and industry 4.0. IEEE Ind Electron Mag 11(1):17–27

  9. Harbi Y, Aliouat Z, Refoufi A, Harous S (2019b) Efficient end-to-end security scheme for privacy-preserving in iot. In: 2019 International Conference on Networking and Advanced Systems (ICNAS), IEEE, pp 1–6

  10. Harbi Y, Aliouat Z, Refoufi A, Harous S (2021) Recent security trends in internet of things: A comprehensive survey. IEEE Access 9:113292–113314

    Article  Google Scholar 

  11. Vaudenay S (2006) A classical introduction to cryptography: Applications for communications security. Springer Science & Business Media

  12. Harbi Y, Aliouat Z, Harous S, Bentaleb A (2018b) Secure data transmission scheme based on elliptic curve cryptography for internet of things. In: International Symposium on Modelling and Implementation of Complex Systems, Springer, pp 34–46

  13. McKay K, Bassham L, Sönmez Turan M, Mouha N (2016) Report on lightweight cryptography. Tech. rep, National Institute of Standards and Technology

    Google Scholar 

  14. Mohamed KS (2020) New trends in cryptography: Quantum, blockchain, lightweight, chaotic, and dna cryptography. In: New Frontiers in Cryptography, Springer, pp 65–87

  15. Rana S, Hossain S, Shoun HI, Kashem MA (2018) An effective lightweight cryptographic algorithm to secure resource-constrained devices. Int J Adv Comput Sci Appl 9(11)

  16. Shahzadi R, Anwar SM, Qamar F, Ali M, Rodrigues JJ (2019) Chaos based enhanced rc5 algorithm for security and integrity of clinical images in remote health monitoring. IEEE Access 7:52858–52870

    Article  Google Scholar 

  17. Elhabob R, Zhao Y, Eltayieb N, Abdelgader AM, Xiong H (2019) Identity-based encryption with authorized equivalence test for cloud-assisted iot. Clust Comput pp 1–17

  18. Elhoseny M, Ramírez-González G, Abu-Elnasr OM, Shawkat SA, Arunkumar N, Farouk A (2018) Secure medical data transmission model for iot-based healthcare systems. IEEE Access 6:20596–20608

    Article  Google Scholar 

  19. Ge C, Yin C, Liu Z, Fang L, Zhu J, Ling H (2020) A privacy preserve big data analysis system for wearable wireless sensor network. Comput Secur p 101887

  20. Makhdoom I, Zhou I, Abolhasan M, Lipman J, Ni W (2020) Privysharing: A blockchain-based framework for privacy-preserving and secure data sharing in smart cities. Comput Secur 88:101653

  21. Song T, Li R, Mei B, Yu J, Xing X, Cheng X (2017) A privacy preserving communication protocol for iot applications in smart homes. IEEE Internet Things J 4(6):1844–1852

    Article  Google Scholar 

  22. Jabeen T, Ashraf H, Khatoon A, Band SS, Mosavi A (2020) A lightweight genetic based algorithm for data security in wireless body area networks. IEEE Access 8:183460–183469

    Article  Google Scholar 

  23. Nesa N, Ghosh T, Banerjee I (2019) Design of a chaos-based encryption scheme for sensor data using a novel logarithmic chaotic map. Journal of Information Security and Applications 47:320–328

    Article  Google Scholar 

  24. Sharafi M, Fotouhi-Ghazvini F, Shirali M, Ghassemian M (2019) A low power cryptography solution based on chaos theory in wireless sensor nodes. IEEE Access 7:8737–8753

    Article  Google Scholar 

  25. Yi L, Tong X, Wang Z, Zhang M, Zhu H, Liu J (2019) A novel block encryption algorithm based on chaotic s-box for wireless sensor network. IEEE Access 7:53079–53090

    Article  Google Scholar 

  26. Hellaoui H, Koudil M, Bouabdallah A (2017) Energy-efficient mechanisms in security of the internet of things: A survey. Comput Netw 127:173–189

    Article  Google Scholar 

  27. Aljawarneh S, Yassein MB et al (2017) A resource-efficient encryption algorithm for multimedia big data. Multimed Tools Appl 76(21):22703–22724

    Article  Google Scholar 

  28. Sivanandam S, Deepa S (2008) Genetic algorithms. In: Introduction to genetic algorithms, Springer, pp 15–37

  29. Zirem A, Senouci MR (2018) Efficient lightweight chaotic secure communication system for wsns and iot. In: 2018 International Conference on Smart Communications in Network Technologies (SaCoNeT), IEEE, pp 43–48

  30. Krawczyk H, Bellare M, Canetti R (1997) Hmac: Keyed-hashing for message authentication

  31. Heinzelman WB, Chandrakasan AP, Balakrishnan H (2002) An application-specific protocol architecture for wireless microsensor networks. IEEE Trans Wireless Commun 1(4):660–670

    Article  Google Scholar 

  32. Dolev D, Yao A (1983) On the security of public key protocols. IEEE Trans Inf Theory 29(2):198–208

    Article  MathSciNet  MATH  Google Scholar 

  33. Harbi Y, Aliouat Z, Refoufi A, Harous S, Bentaleb A (2019c) Enhanced authentication and key management scheme for securing data transmission in the internet of things. Ad Hoc Networks 94:101948

  34. Li S, Chen G, Mou X (2005) On the dynamical degradation of digital piecewise linear chaotic maps. Int J Bifurcation Chaos 15(10):3119–3151

    Article  MathSciNet  MATH  Google Scholar 

  35. Shannon CE (1949) Communication theory of secrecy systems. Bell Syst Tech J 28(4):656–715

    Article  MathSciNet  MATH  Google Scholar 

  36. Avispa automated validation of internet security protocols and applications. http://www.avispa-project.org, Accessed Dec 2020

  37. Armando A, Basin D, Boichut Y, Chevalier Y, Compagna L, Cuéllar J, Drielsma PH, Héam PC, Kouchnarenko O, Mantovani J et al (2005) The avispa tool for the automated validation of internet security protocols and applications. In: International conference on computer aided verification, Springer, pp 281–285

  38. Viganò L (2006) Automated security protocol analysis with the avispa tool. Electron Notes Theor Comput Sci 155:61–86

    Article  Google Scholar 

  39. Network simulator-3. http://www.nsnam.org, Accessed Dec 2020

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Saad Harous.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest that could influence the work reported in this paper.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Harbi, Y., Refoufi, A., Aliouat, Z. et al. Improved bio-inspired security scheme for privacy-preserving in the internet of things. Peer-to-Peer Netw. Appl. 15, 2488–2502 (2022). https://doi.org/10.1007/s12083-022-01372-x

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-022-01372-x

Keywords

Navigation