Reliable and Secure Data Transfer in IoT Networks using Knight-Tour and PHLSB Method

Authors

  • V. Anjana Devi Department of CSE, Rajalakshmi Institute of Technology, Kuthambakkam, Chennai, Tamil Nadu, India
  • I. Bhuvaneshwarri Department of Information Technology, Government College of Engineering, Erode, Tamil Nadu, India
  • C. Santhosh Kumar Department of Information Technology, Sona College of Technology, Salem, Tamil Nadu, India
  • V. Chandrasekar Department of CSE, Faculty of Engineering and Technology, Jain (Deemed-to-be) University, Bangalore, Karnataka, India
  • V. Kalaichelvi Department of Computer Science and Engineering, SRC, Sastra Deemed University, Kumbakonam, Tamil Nadu, India
  • E. Anitha Department of Artificial Intelligence and Data Science, Sri Eshwar College of Engineering, Coimbatore, Tamil Nadu, India
  • Jogendra Kumar Department of Computer Science and Engineering, G.B.Pant Institute of Engineering and Technology, Pauri Garhwal Uttarakhand, India

DOI:

https://doi.org/10.37934/araset.32.2.107118

Keywords:

Internet of Things (IoT), Steganography, Knight- Tour, Polynomial based Hash Least Significant Bit (PHLSB), human visual system (HVS)

Abstract

Data security has recently become the most pressing problem for corporate owners and even regular people due to the continual development in the speed of data transmission over the entire Internet, and stricter regulations have been made for data protection. Secure key management is now essential for securing information exchange due to the Internet of Things (IoT) and the rapidly advancing mobile device technologies. Smart home and healthcare IoT apps, for instance, offer automated services to users with little user involvement. Data transmission delays and intrusions can affect existing security solutions that use a single link. In this paper, we propose a novel distributed key management scheme for IoT ecosystem. The methods Knight-Tour and polynomial-based hash least significant bit (PHLSB) that take use of flaws in the human visual system (HVS) are combined to form a hybrid approach to image steganography in this research. The Knight's trip path is a chess board layout that follows the route of a horse without stopping at any of the nodes again. In order to create the scrambled image, this travel path pattern is employed to permute the original image's pixel positions. Prior to being masked behind a cover image, this technique makes sure the communication has been encrypted. A strong mathematical tool is a polynomial equation. The cover object's data was hidden using these equations as a secret key.  The suggested solution efficiently secures IoT devices by assigning the resource-intensive encryption processing to local organisations. As a result of the proposed framework's simulation findings, network lifetime PDR (Packet Drop Ratio) has improved, throughput has increased, energy consumption has decreased, and latency has decreased.

Downloads

Download data is not yet available.

Author Biographies

V. Anjana Devi, Department of CSE, Rajalakshmi Institute of Technology, Kuthambakkam, Chennai, Tamil Nadu, India

anjanadevi.aby06@gmail.com

I. Bhuvaneshwarri, Department of Information Technology, Government College of Engineering, Erode, Tamil Nadu, India

ibw@gcee.ac.in

C. Santhosh Kumar, Department of Information Technology, Sona College of Technology, Salem, Tamil Nadu, India

sanscsk@gmail.com

V. Chandrasekar, Department of CSE, Faculty of Engineering and Technology, Jain (Deemed-to-be) University, Bangalore, Karnataka, India

V. Kalaichelvi, Department of Computer Science and Engineering, SRC, Sastra Deemed University, Kumbakonam, Tamil Nadu, India

kalaichelvi2k@src.sastra.edu

E. Anitha, Department of Artificial Intelligence and Data Science, Sri Eshwar College of Engineering, Coimbatore, Tamil Nadu, India

anitha.e@sece.ac.in

Jogendra Kumar, Department of Computer Science and Engineering, G.B.Pant Institute of Engineering and Technology, Pauri Garhwal Uttarakhand, India

jogendra.1986@gmail.com

Published

2023-09-09

Issue

Section

Articles