Integration of Moth-Flame Optimization with Lattice-Based Cryptography for Post-Quantum IoT Data Protection
Keywords:
AES, Internet of Things, Lattice-Based Cryptography, Moth-Flame OptimizationAbstract
The rapid proliferation of Internet of Things (IoT) ecosystems has resulted in unprecedented volumes of sensitive information being transmitted across interconnected devices and cloud platforms, raising significant concerns regarding data protection and confidentiality. Conventional cryptographic frameworks are increasingly vulnerable to emerging threats, particularly with advancements in quantum computing capabilities. This research introduces a novel encryption methodology that synergistically combines Moth-Flame Optimization (MFO) with Lattice-Based Cryptography (LBC). LBC offers robust post-quantum security as an alternative to traditional cryptographic approaches, while MFO enhances the key generation process through sophisticated optimization techniques. This dual-layer framework strengthens cryptographic key generation while ensuring comprehensive security for IoT data transmissions to cloud infrastructure. The integrated MFO-LBC approach delivers a secure, scalable, and computationally efficient solution that addresses limitations inherent in conventional encryption schemes, providing resilience against both classical and quantum-based attacks.
Downloads
References
R. Chaudhary, G. S. Aujla, N. Kumar, and S. Zeadally, "Lattice-based public key cryptosystem for internet of things environment: Challenges and solutions," IEEE Internet of Things Journal, vol. 6, no. 3, pp. 4897-4910, 2019..
Mirjalili, S., 2015. Moth-flame optimization algorithm: A novel nature-inspired heuristic paradigm. Knowledge-based systems, 89, pp.228-249.
Al-Juboori, S.A.M., Hazzaa, F., Jabbar, Z.S., Salih, S. and Gheni, H.M., 2023. Man-in-the-middle and denial of service attacks detection using machine learning algorithms. Bulletin of Electrical Engineering and Informatics, 12(1), pp.418-426.
Mousavi, S.K., Ghaffari, A., Besharat, S. and Afshari, H., 2021. Security of internet of things based on cryptographic algorithms: a survey. Wireless Networks, 27(2), pp.1515-1555.
Ajala, O.A., Arinze, C.A., Ofodile, O.C., Okoye, C.C. and Daraojimba, A.I., 2024. Exploring and reviewing the potential of quantum computing in enhancing cybersecurity encryption methods. Magna Scientia Advanced Research and Reviews, 10(01), pp.321-329.
Sabani, M.E., Savvas, I.K., Poulakis, D., Garani, G. and Makris, G.C., 2023. Evaluation and comparison of lattice-based cryptosystems for a secure quantum computing era. Electronics, 12(12), p.2643.
Nisha, F., Lenin, J., Saravanan, S.K., Rohit, V.R., Selvam, P.D. and Rajmohan, M., 2024, February. Lattice-based cryptography and NTRU: Quantum-resistant encryption algorithms. In 2024 International Conference on Emerging Systems and Intelligent Computing (ESIC) (pp. 509-514). IEEE.
Sabani, M.E., Savvas, I.K. and Garani, G., 2024. Learning with errors: a lattice-based keystone of post-quantum cryptography. Signals, 5(2), pp.216-243.
Seyhan, K., Nguyen, T.N., Akleylek, S. and Cengiz, K., 2022. Lattice-based cryptosystems for the security of resource-constrained IoT devices in post-quantum world: a survey. Cluster Computing, 25(3), pp.1729-1748.
Marcolla, C., Sucasas, V., Manzano, M., Bassoli, R., Fitzek, F.H. and Aaraj, N., 2022. Survey on fully homomorphic encryption, theory, and applications. Proceedings of the IEEE, 110(10), pp.1572-1609.
Singamaneni, K.K. and Muhammad, G., 2024. A novel integrated quantum-resistant cryptography for secure scientific data exchange in ad hoc networks. Ad Hoc Networks, 164, p.103607.
Shah, P., Prajapati, P. and Patel, D., 2024, December. Lattice-Based Post Quantum Cryptography Using Variations of Learning with Error (LWE). In International Conference on Soft Computing and its Engineering Applications (pp. 58-72). Cham: Springer Nature Switzerland.
Ortiz, J.N., de Araujo, R.R., Aranha, D.F., Costa, S.I. and Dahab, R., 2021. The ring-lwe problem in lattice-based cryptography: The case of twisted embeddings. Entropy, 23(9), p.1108.
Tekin, N., Acar, A., Aris, A., Uluagac, A.S. and Gungor, V.C., 2023. Energy consumption of on-device machine learning models for IoT intrusion detection. Internet of Things, 21, p.100670.
Shen, X., Liu, Y. and Zhang, Z., 2022. Performance-enhanced federated learning with differential privacy for internet of things. IEEE Internet of Things Journal, 9(23), pp.24079-24094.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.


