Integration of Moth-Flame Optimization with Lattice-Based Cryptography for Post-Quantum IoT Data Protection

Authors

  • Ranjan Kumar Gupta, Ranu Pandey

Keywords:

AES, Internet of Things, Lattice-Based Cryptography, Moth-Flame Optimization

Abstract

The rapid proliferation of Internet of Things (IoT) ecosystems has resulted in unprecedented volumes of sensitive information being transmitted across interconnected devices and cloud platforms, raising significant concerns regarding data protection and confidentiality. Conventional cryptographic frameworks are increasingly vulnerable to emerging threats, particularly with advancements in quantum computing capabilities. This research introduces a novel encryption methodology that synergistically combines Moth-Flame Optimization (MFO) with Lattice-Based Cryptography (LBC). LBC offers robust post-quantum security as an alternative to traditional cryptographic approaches, while MFO enhances the key generation process through sophisticated optimization techniques. This dual-layer framework strengthens cryptographic key generation while ensuring comprehensive security for IoT data transmissions to cloud infrastructure. The integrated MFO-LBC approach delivers a secure, scalable, and computationally efficient solution that addresses limitations inherent in conventional encryption schemes, providing resilience against both classical and quantum-based attacks.

Downloads

Download data is not yet available.

References

R. Chaudhary, G. S. Aujla, N. Kumar, and S. Zeadally, "Lattice-based public key cryptosystem for internet of things environment: Challenges and solutions," IEEE Internet of Things Journal, vol. 6, no. 3, pp. 4897-4910, 2019..

Mirjalili, S., 2015. Moth-flame optimization algorithm: A novel nature-inspired heuristic paradigm. Knowledge-based systems, 89, pp.228-249.

Al-Juboori, S.A.M., Hazzaa, F., Jabbar, Z.S., Salih, S. and Gheni, H.M., 2023. Man-in-the-middle and denial of service attacks detection using machine learning algorithms. Bulletin of Electrical Engineering and Informatics, 12(1), pp.418-426.

Mousavi, S.K., Ghaffari, A., Besharat, S. and Afshari, H., 2021. Security of internet of things based on cryptographic algorithms: a survey. Wireless Networks, 27(2), pp.1515-1555.

Ajala, O.A., Arinze, C.A., Ofodile, O.C., Okoye, C.C. and Daraojimba, A.I., 2024. Exploring and reviewing the potential of quantum computing in enhancing cybersecurity encryption methods. Magna Scientia Advanced Research and Reviews, 10(01), pp.321-329.

Sabani, M.E., Savvas, I.K., Poulakis, D., Garani, G. and Makris, G.C., 2023. Evaluation and comparison of lattice-based cryptosystems for a secure quantum computing era. Electronics, 12(12), p.2643.

Nisha, F., Lenin, J., Saravanan, S.K., Rohit, V.R., Selvam, P.D. and Rajmohan, M., 2024, February. Lattice-based cryptography and NTRU: Quantum-resistant encryption algorithms. In 2024 International Conference on Emerging Systems and Intelligent Computing (ESIC) (pp. 509-514). IEEE.

Sabani, M.E., Savvas, I.K. and Garani, G., 2024. Learning with errors: a lattice-based keystone of post-quantum cryptography. Signals, 5(2), pp.216-243.

Seyhan, K., Nguyen, T.N., Akleylek, S. and Cengiz, K., 2022. Lattice-based cryptosystems for the security of resource-constrained IoT devices in post-quantum world: a survey. Cluster Computing, 25(3), pp.1729-1748.

Marcolla, C., Sucasas, V., Manzano, M., Bassoli, R., Fitzek, F.H. and Aaraj, N., 2022. Survey on fully homomorphic encryption, theory, and applications. Proceedings of the IEEE, 110(10), pp.1572-1609.

Singamaneni, K.K. and Muhammad, G., 2024. A novel integrated quantum-resistant cryptography for secure scientific data exchange in ad hoc networks. Ad Hoc Networks, 164, p.103607.

Shah, P., Prajapati, P. and Patel, D., 2024, December. Lattice-Based Post Quantum Cryptography Using Variations of Learning with Error (LWE). In International Conference on Soft Computing and its Engineering Applications (pp. 58-72). Cham: Springer Nature Switzerland.

Ortiz, J.N., de Araujo, R.R., Aranha, D.F., Costa, S.I. and Dahab, R., 2021. The ring-lwe problem in lattice-based cryptography: The case of twisted embeddings. Entropy, 23(9), p.1108.

Tekin, N., Acar, A., Aris, A., Uluagac, A.S. and Gungor, V.C., 2023. Energy consumption of on-device machine learning models for IoT intrusion detection. Internet of Things, 21, p.100670.

Shen, X., Liu, Y. and Zhang, Z., 2022. Performance-enhanced federated learning with differential privacy for internet of things. IEEE Internet of Things Journal, 9(23), pp.24079-24094.

Downloads

Published

10.08.2024

How to Cite

Ranjan Kumar Gupta. (2024). Integration of Moth-Flame Optimization with Lattice-Based Cryptography for Post-Quantum IoT Data Protection. International Journal of Intelligent Systems and Applications in Engineering, 12(22s), 2444 –. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/8134

Issue

Section

Research Article