Professional Documents
Culture Documents
DOI: 10.1049/cmu2.12119
1
School of Computing, SASTRA Deemed Abstract
University, Thanjavur, Tamil Nadu, India
Internet of things (IoTs) enabled cyber-physical systems is a system that provides commu-
2
Department of Computer Science and nication between physical devices and cyber environment. They run independently with-
Engineering, Velagapudi Ramakrishna Siddhartha
Engineering College, Vijayawada, Andhra Pradesh,
out any user interaction. Because the IoT devices are vulnerable to a variety of attacks,
India security is a noteworthy factor in the development process during communication. To
improve secure communication with minimum time consumption, a novel technique called
Correspondence jackknife regressive Schmidt Samoa cryptography-based deep artificial structure learning
Rizwan Patan, Department of Computer Science and
(JRSSC-DASL) is introduced. Initially, the data is monitored by IoT devices and is collected
Engineering, Velagapudi Ramakrishna Siddhartha
Engineering College, Vijayawada, Andhra Pradesh, from the dataset. The proposed deep artificial structure learning technique trains the gath-
India. ered data with multiple layers. Then, the collected data is analysed in the first hidden layer
Email: prizwan5@gmail.com,
with the help of the jackknife regression function by learning the feature and it classifies the
rizwan@vrsiddhartha.ac.in
data with higher accuracy. The classified data is sent to the next hidden layer where encryp-
tion is performed using Schmidt Samoa (SS) encryption algorithm. Then, the encrypted
data is sent to the cloud server where the decryption is performed using the SS decryption
algorithm. The cloud server obtains the original data and it is stored in their database for
further processing. This process enhances the security of data communication and achieves
high data confidentiality with less processing time. Experimental estimation is performed
on the factors such as classification accuracy, confidentiality rate, processing time and mem-
ory usage to the number of data sensed from IoT device. Conferred results reveal that the
proposed JRSSC-DASL technique has high confidentiality rate and minimum processing
time as well as memory usage when compared to state-of-the-art methods.
This is an open access article under the terms of the Creative Commons Attribution License, which permits use, distribution and reproduction in any medium, provided the original work is
properly cited.
© 2021 The Authors. IET Communications published by John Wiley & Sons Ltd on behalf of The Institution of Engineering and Technology
considered. A dew computing architecture in CPS was intro- son with other state-of-the-art methods. Finally, the conclusion
duced in [5] for transferring the information using independent is presented in Section 5.
devices and smart systems.
A privacy-preserving data integrity verification method was
presented in [6] with streaming of data for health-CPS. The 2 LITERATURE SURVEY
designed model used the encryption, but it failed to pro-
vide more security. A machine learning quorum decider was A behaviour rule specification-based misbehaviour identifica-
developed in [7] for large-scale IoT employments to perform tion method was introduced in [11] for IoT-enabled CPS to
anomaly detection with the learned features. The method failed detect the misbehaving device. The design rule-based detection
to improve the performance accuracy of anomaly detection. method failed to minimise memory and computation overhead.
A secure password-based authentication method was In [12], multi-layered architecture was introduced to the preci-
designed in [8] for communicating data with higher security. sion agriculture area for solving security and privacy issues in
The deigned method has less computation time but the data this dynamic cyber-physical environment.
confidentiality rate was not improved. An IoT-enabled adap- In [13], several research works were presented to analyse and
tive context-aware and the playful CPS was developed in [9] classify the security of cyber-physical systems against cyber-
to improve users’ experience for flexibly controllable remote attacks. The designed work analyses the performance of con-
applications. A software-defined CPS was introduced in [10] to fidentiality and integrity, but estimation of time was not solved.
improve the scalable and flexible way of cyber security and to The various cyber-physical threat was analysed in [14] with the
enhance the quality of service. application of smart home. But the cryptographic technique was
The major contributions of the proposed jackknife regres- not employed to improve the security of the system.
sive Schmidt Samoa cryptography-based deep artificial struc- A generic tamper-resistant commitment method was
ture learning (JRSSC-DASL) technique are summarized as designed in [15] for securing resource-efficient mobile health-
follows: care systems and to provide security through attribute-based
encryption scheme. But the performance of data confidentiality
∙ A novel JRSSC-DASL technique is introduced to perform of the mobile healthcare system was not improved.
secure communication in IoT-enabled CPS with various pro- A multi-layered diagrammatic illustration of CPSs was
cesses, namely data analysis, classification and encryption described in [16] for collective safety and security risk analy-
with multiple layers. sis with the help of IoT devices. A novel Sybil attack detection
∙ Jackknife regression (JR) function is employed in JRSSC- method was developed in [17] to improve the security and pri-
DASL technique to learn the features and classify the data vacy of communication. However, the designed method failed
before data transmission. The regression function accurately to apply a digital signature-based cryptographic scheme to accu-
analyses the feature and improves classification accuracy. rately detect the Sybil attack in CPS.
Therefore, the classification process of JRSSC-DASL tech- Computation techniques and advanced algorithms were
nique minimises the time taken to perform secure communi- developed in [18] for processing heterogeneous data and
cation. managing the IoT with cyber-enabled applications. But the
∙ To improve the data confidentiality by applying Schmidt– quantitative analysis of various performance metrics remains
Samoa cryptosystem which employs temporary keys (pub- unaddressed. A distributed method based on the IoT model
lic and private keys). These keys allow the communication was introduced in [19] for monitoring human activities. The
session only once. Therefore, JRSSC-DASL technique avoids designed model failed to apply classifier for processing the
illegal accessing of data from unauthorised users. information gathered from the IoT device. In [20], a battery-
∙ To improve the data confidentiality rate, JRSSC-DASL tech- free wireless sensor was deployed in CPS for health moni-
nique uses the Schmidt–Samoa cryptography technique. Dur- toring applications and was sent to the communicating node.
ing data transmission, the classified sensed data are converted But the secure communication of healthcare data remains
into cipher text by applying Schmidt–Samoa encryption pro- unaddressed.
cess. The cipher text is transmitted to the cloud server over
the wireless network to avoid illegal data access. Then, the
authorised cloud server performs decryption and receives the 3 JACKKNIFE REGRESSIVE
original data. SCHMIDT–SAMOA
∙ Finally, experimental analyses are carried out with various CRYPTOGRAPHY-BASED DEEP
methods to find that the JRSSC-DASL technique outper- ARTIFICIAL STRUCTURE LEARNING
forms the standard and other related approaches. TECHNIQUE
The rest of the article is organised into different sections. Sec- CPSs are consciously structured physical systems for the ability
tion 2 provides a literature survey. Section 3 details the descrip- to capture a variety of information and interact with the phys-
tion of JRSSC-DASL technique and system frameworks. Section ical world in a fully automatic manner. Deployment of IoT is
4 explains the experimental setup, result analysis and compari- responsible for the emerging CPS to monitor the information
17518636, 2021, 6, Downloaded from https://ietresearch.onlinelibrary.wiley.com/doi/10.1049/cmu2.12119, Wiley Online Library on [24/04/2024]. See the Terms and Conditions (https://onlinelibrary.wiley.com/terms-and-conditions) on Wiley Online Library for rules of use; OA articles are governed by the applicable Creative Commons License
KANNAN ET AL. 773
1000 83 78 91
2000 84 80 92
3000 87 82 93
4000 85 80 91
5000 88 82 94
6000 87 83 93
7000 86 80 92
8000 85 81 90
9000 87 83 92
10,000 85 82 91 FIGURE 6 Graphical illustration of classification accuracy
1000 81 77 90 1000 32 35 28
2000 82 78 91 2000 34 36 30
3000 84 81 92 3000 37 39 33
4000 82 79 90 4000 40 44 36
5000 85 81 92 5000 45 48 40
6000 84 82 90 6000 47 49 42
7000 85 79 91 7000 49 51 46
8000 83 80 89 8000 53 56 50
9000 85 82 91 9000 57 59 54
10,000 84 81 90 10,000 60 62 56
1000 21 24 17
2000 26 30 22
3000 30 33 24
4000 34 36 28
5000 36 40 32
6000 39 42 36
7000 42 44 39
8000 46 48 42
9000 49 50 45
FIGURE 8 Graphical representation of processing time
10,000 52 55 47
processing time increased for all the three methods due to the
large amount of data generated by the sensor device. Among the
three methods, the processing time is found to be minimal by
applying the JRSSC-DASL technique compared to the existing
methods. The appropriate reason is that the classification-based
encryption technique is applied. Before data transmission, the
incoming sensed data is analysed and classified.
These processes minimise the secure data transmission from
sender to receiver. Instead of sending the whole data to the
server, the incoming data is analysed and partitioned into the
number of classes. Then, the classified data is applied for
encryption. Besides, the proposed SS cryptographic technique
effectively executes the data encryption with lesser time con-
sumption. This is proved by statistical evaluation by consider-
ing 1000 data to compute processing time. The amount of time
taken by applying the JRSSC-DASL technique for secure com-
munication is 28 ms and the processing time of the other two FIGURE 9 Graphical illustration of memory usage
methods [1,2] are 32 and 35 ms, respectively. Likewise, the nine
runs are performed with various counts of sensed data. The
overall results of the proposed technique are evaluated with the
results of existing methods. The comparison results prove that Table 4 describes the experimental results of memory usage
the processing time of the JRSSC-DASL technique is consider- versus a number of data using three methods. In order to cal-
ably reduced by 9% compared to ref. [1] and 15% compared to culate the memory consumption to perform the secure data
ref. [2]. transmission, the number of data is taken in the range of 1000
to 10,000. The plots with various results are illustrated in Fig-
ure 9. The performance results of the memory consumption
4.1.4 Memory usage of three different methods are illustrated in Figure 9. The
chart proves that the proposed JRSSC-DASL technique con-
The final performance metric is memory usage which is defined sumes less amount of memory space for processing the secure
as an amount of memory consumed by the algorithm for per- data communication. The reason for less memory consump-
forming secure communication. The overall memory usage is tion is the proposed JRSSC-DASL technique that performs the
calculated as given below: encryption process before the data transmission. Due to data
encryption, the size of the input data is reduced and hence the
MU = N ∗Mem [d ] (13) memory consumption also minimised. The performance of the
proposed JRSSC-DASL technique is compared to the existing
From Equation (13), MU specifies the memory usage, ‘N ’ results. The overall comparison results prove that the memory
specifies the number of data (d ) and Mem specifies memory con- consumption of the proposed JRSSC-DASL technique is said to
sumption for processing the data. The memory usage is mea- be minimised by 12% compared to ref. [1] and 19% compared
sured in terms of megabytes (MB). to ref. [2].
17518636, 2021, 6, Downloaded from https://ietresearch.onlinelibrary.wiley.com/doi/10.1049/cmu2.12119, Wiley Online Library on [24/04/2024]. See the Terms and Conditions (https://onlinelibrary.wiley.com/terms-and-conditions) on Wiley Online Library for rules of use; OA articles are governed by the applicable Creative Commons License
KANNAN ET AL. 779