ArticlePDF Available

Abstract and Figures

With the explosion of connected devices linked to one another, the amount of transmitted data grows day by day, posing new problems in terms of information security, such as unauthorized access to users’ credentials and sensitive information. Therefore, this study employed RSA and ElGamal cryptographic algorithms with the application of SHA-256 for digital signature formulation to enhance security and validate the sharing of sensitive information. Security is increasingly becoming a complex task to achieve. The goal of this study is to be able to authenticate shared data with the application of the SHA-256 function to the cryptographic algorithms. The methodology employed involved the use of C# programming language for the implementation of the RSA and ElGamal cryptographic algorithms using the SHA-256 hash function for digital signature. The experimental result shows that the RSA algorithm performs better than the ElGamal during the encryption and signature verification processes, while ElGamal performs better than RSA during the decryption and signature generation process.
Content may be subject to copyright.
Information2022,13,442.https://doi.org/10.3390/info13100442www.mdpi.com/journal/information
Article
SecureSensitiveDataSharingUsingRSAandElGamal
CryptographicAlgorithmswithHashFunctions
EmmanuelA.Adeniyi
1
,PeaceBusolaFalola
1,
MashaelS.Maashi
2
,MohammedAljebreen
3
andSalilBharany
4,
*
1
DepartmentofComputerSciences,PreciousCornerstoneUniversity,Ibadan200223,Nigeria
2
SoftwareEngineeringDepartment,CollegeofComputerandInformationSciences,KingSaudUniversity,
Riyadh11451,SaudiArabia
3
DepartmentofComputerScience,CommunityCollege,KingSaudUniversity,P.O.Box28095,
Riyadh11437,SaudiArabia
4
DepartmentofComputerEngineering&Technology,GuruNanakDevUniversity,Punjab143005,India
*Correspondence:salil.bharany@gmail.com
Abstract:Withtheexplosionofconnecteddeviceslinkedtooneanother,theamountoftransmitted
datagrowsdaybyday,posingnewproblemsintermsofinformationsecurity,suchasunauthorized
accesstousers’credentialsandsensitiveinformation.Therefore,thisstudyemployedRSAandEl
GamalcryptographicalgorithmswiththeapplicationofSHA256fordigitalsignatureformulation
toenhancesecurityandvalidatethesharingofsensitiveinformation.Securityisincreasinglybe
comingacomplextasktoachieve.Thegoalofthisstudyistobeabletoauthenticateshareddata
withtheapplicationoftheSHA256functiontothecryptographicalgorithms.Themethodology
employedinvolvedtheuseofC#programminglanguagefortheimplementationoftheRSAand
ElGamalcryptographicalgorithmsusingtheSHA256hashfunctionfordigitalsignature.Theex
perimentalresultshowsthattheRSAalgorithmperformsbetterthantheElGamalduringtheen
cryptionandsignatureverificationprocesses,whileElGamalperformsbetterthanRSAduringthe
decryptionandsignaturegenerationprocess.
Keywords:datasharing;cryptographicalgorithm;RSAandElGamal;communication;digital
signature
1.Introduction
Withtherapiddevelopmentofinformationdigitization,securityandprivacycon
cernsareamongthemostpressingproblemsconfrontingtheemergingsmartgrid[1].
Theseissuesinclude,amongmanyothers,alackofsharedauthenticationacrosscom
municatingparties,thepossibilityofmultiplecyberattacks,illegitimateaccesstoser
vices,andthedisclosureofcomputerandnetworkconfidentialinformationtotheinter
actingparty.Beforegrantinganyindividualaccesstoanetworkanditsassociatedser
vices,itisnecessarytovalidatetheindividual,whichmaybeacomputeroraperson,and
thenvalidatethepermissionandcontrolpoliciesbasedontheindividual’sidentification.
Adigitalsignaturevalidatestheuser’sidentity,whereasauthorizationvalidateswhether
thepersonhasthenecessaryauthoritytoaccessthesharedresource[2].
Encryptionisalwaysrequiredfordatatransmissionandcommunication[3].Infor
mationsecurityutilizingencryptionanddecryptioniscrucialsincedatatransmissionand
receptionaresusceptibletooutsideassault.Toincreasesecurity,dataaretransformed
intoacodedmessage(encryption)andthenrecoveredintodata(decryption)[4].Tooffer
securetransmissionofdataandinformation,severalcryptographicalgorithmshavebeen
proposed,whichcanbeclassifiedassymmetricandasymmetriccryptographictechniques
[5].Figure1displaystheprocesstheplaintextpassedthroughbeforeturningintocipher
textandthenbackintoplaintext.Theplaintextpassesthroughtheencryptionprocessto
Citation:Adeniyi,E.;Falola,P.B.;
Maashi,M.S.;Aljebreen,M.;
Bharany,S.SecureSensitiveData
SharingUsingRSAandElGamal
CryptographicAlgorithmswith
HashFunctions.Information2022,13,
442.https://doi.org/10.3390/
info13100442
AcademicEditor:MaanakGupta
Received:24July2022
Accepted:16September2022
Published:20September2022
Publisher’sNote:MDPIstaysneu
tralwithregardtojurisdictional
claimsinpublishedmapsandinstitu
tionalaffiliations.
Copyright:©2022bytheauthors.Li
censeeMDPI,Basel,Switzerland.
Thisarticleisanopenaccessarticle
distributedunderthetermsandcon
ditionsoftheCreativeCommonsAt
tribution(CCBY)license(https://cre
ativecommons.org/licenses/by/4.0/).
Information2022,13,4422of15
produceaciphertext,whiletheciphertextpassesthroughthedecryptionprocesstopro
ducetheplaintext.
Figure1.Abasicillustrationoftheencryptionanddecryptionprocess.
Adigitalsignatureisamessage’sauthenticityandlegalitygeneratedviaacrypto
graphicprocess(acontrasttoadigitalcertificate),device,orelectronicrecord[6].Adigital
signatureisadigitalequivalenttoasignedsignatureorengravedseal,butithasmuch
moreessentialprotection.Itismeanttoaddresstheissueofinterferenceandspoofingin
communicationsnetworks.Digitalsignaturescanprovideadditionalguaranteesabout
thesource,presence,andpositionofanelectronicdocument,activity,orcommunication,
aswellasacknowledgethesigner’spermission.Digitalsignaturesareasegmentofdigital
signaturetechnologiesthatsigndocumentsusingkeysandencryptionalgorithms[7].The
digitallysignedalgorithmschemeisoneofthemostwellknowndigitalsignaturesys
tems,e.g.,theRSAdigitalsigningscheme,theElGamaldigitalsigningscheme,andmany
othersbasedonpublickeycryptosystems.Thisstudy,therefore,aimsatimplementing
theRSAandElGamalcryptographicalgorithmsusingthehashfunctiontoensuredata
securitywithintegrity.Inaddition,thisstudyattemptstoestablishthedataintegrityof
RSAandElGamalcryptographicproceduresthatusethecreationandvalidationofsig
natures.Thisstudywillbebeneficialforcontrollingcryptographicoperationsusingthe
sender’sandreceiver’sprivateandpublickeys.
Thisstudyconsistsoffoursections.Wefirstdescribetheliteraturereviews.Thema
terialsandmethodsusedaredescribedinSection2.Sections3and4presenttheresults
anddiscussion.Section5concludesthestudy.
ReviewofLiterature
Zhangetal.[8]demonstratedanimprovedschemeusingamodernmainagreement
protocolovertheChangandChang[9]system,whichdoesnotuseaonewayhashing
algorithmorreplicationpadding.Digitalsignaturesystemsdependentonpublickey
cryptosystemsaresusceptibletoexistentialidentityfraudattacks,whichcanbeavoided
byusingaonewayhashfeature.Theauthorsofthispapersuggestafraudulentassault
onthedigitalsignaturesystemproposedbyChangandChangin2004.
Burr[10]studiedthepossibilitiesofcryptographichashfunctionsinhisarticle.He
emphasizedthatthecryptographytoolsincludetheSHA1andSHA2functions.Apart
fromDobbertin’sworkaftertheMD5nearbreakin1996,hashfunctionassessmentsaw
littledevelopmentuntilthemiddleof2004.Sincethen,someacademicshavefocusedon
almostalloftheoriginalhashfunctions,includingSHA1.Theseattacksshookcryptog
raphers’longtermfaithinalmostallhashfunctionsbecauseSHA2functionsare,even
untilnow,relatedtotheearlierbrokenfunctionsbuilt.Althoughcryptologistshavedis
coveredalotoverthepastfewyearsconcerninghashfunctionsandhowtoattackthem,
cryptanalystswidelyconcludedthatrealisticthreatstoSHA2hashfunctionsremainim
possibleinthenextdecades.
Acharyaetal.[11],intheirpaper,discussedandanalyzedsomewellknowncrypto
graphicalgorithmstoshowthefundamentalvariationsbetweencurrentdataencryption
methods.Despitethecomputationalphilosophybehindsuchanalgorithm,theeffective
techniquesarewellknownandwelldocumentedsincetheyhavebeenthoroughlyre
viewedandanalyzed.Theynotedthatthepowerofcryptographyisinthekeyselection;
longerkeysresistassaultmoreeasilythanshorterkeys.Nobodycanguaranteecomplete
defense.
Information2022,13,4423of15
SalehandMeinel’s[12]HPISecureisasuggestedHTTPclientthatisinchargeof
encryptingordecryptinginformation.Itmustbemountedontheclient’scomputer.Italso
transmitsHTTPrequest/responseitemsandencryptsdatabeforesendingittothenet
workordecryptstheinformationsentbackfromthenetwork.Theywereinfavorofusing
publickeyencryption.Besidesthat,tomakeitharderforunauthorizeduserstouseacol
lectionofsecretkeys,eachrecordcanbeencodedwithadifferentkey.Ontheotherhand,
theyrecommendusingacoordinatorforkeymanagement,whichmaybeathirdparty
cloudserviceoraUSBthatstoresthecredentialsandassociatedmaterial[13,14].Con
versely,oneofthedrawbacksofthisresearchisthattheclientmustinstalltheprogram
oneachcomputerwhereitwillbeused.Theyalsorestrictedinformationsharingandco
ordinationamonggroupsofindividuals.
Hwangetal.[15]suggestedacloudinfrastructurebusinessstrategybuiltontheprin
cipleofhavingtwoindependentserviceproviders,oneforcryptographyandanotherfor
processing.Thedatabasesystemretainsencodeduserinformationandkeyswhilethe
cryptographicservicemodelrequirescipheringactivitiesandthenerasestheinformation.
Thekeyideabehindtheirstrategyistodividetheprocedureamongmultipleservicepro
viderstoreducetheoperatingcostofrevealinguserinformation.Thereisnocertainty,
though,thatthecryptographicservicesystemfullyerasestheinformationanddoesnot
preserveoruseit.Moreover,Chandraetal.’s[16]Silverlineisatechniquethathasbeen
implementedtofacilitateimproveddataprotectioninthecloud.Unlikethepreceding
methods,theseauthorsconcentratedondataandcomputationintensivesoftware.Their
primaryaimwastoencryptasmuchusefulinformationaspossiblewithoutinterfering
withtheapplication’sfeatures.Asaresult,althoughthecloudprogramcannotcompute
anydataitcannotcontrolinplaintext,theyproposeddecodingonlytheinformationthat
isnotusedinthecomputation.
Haqueetal.’s[17]studyprovidedacomprehensiveperformanceanalysisinwhich
commonsymmetricalandasymmetricalkeyencryptionmethodswerecomparedto
choosetheonethatworkedbestforhandheldphonesandresourceconstrainedenviron
ments.Variousfactors,includingkeysize,datablocks,datatype,andCPUtime,were
usedtocomparetheAES,RC4,Blowfish,CAST,3DES,Twofish,DSA,andElGamalalgo
rithms.Theexperimentsshowtheutilityofseveralcryptographicalgorithmsforusein
practicalapplicationsinwhichquickexecutionandlittlememoryusageareessential.
Dijeshetal.[18]workedonanasymmetrickeyschemeforenhancingecommerce
protection.Thestudyexplainsasymmetricaltechniquestomakeuseofelectroniccom
mercepaymentsandothersupportivecryptographictechniquesthatarecrucialtothe
operationofelectronicbusiness.Thepaperalsooutlinesthemainsecurityissueswith
onlineshopping.Basedonsecurity,theRSAencryptionalgorithmandtheFernetcipher
encryptionalgorithmwereproposedasmultilayerencryptionalgorithms.Acomprehen
siveandintricatetechniqueforencryptionwasbuiltusingamultilayerencryption
method.Thestudyconcludedthattheproposedmultilayerencryptiondiscussedwasthe
mainmethodformakingonlinetransactionssecure.Amoreadvancedencryptiontech
niquecanquicklyandefficientlyreducefraudulentoperations.
HamzaandAlAlak[19]analyzedseveralasymmetrickeygeneratorsinwirelesssen
sornetworks.Althoughtheasymmetrickeyencryptionalgorithmprovidesahigherlevel
ofsecuritythansymmetrickeyencryption,itrequiresmoresensorsthansymmetrickey
encryption.Thetwelvealgorithmtrials’chainkeysweregeneratedusingtheKCMA
method(ECC,RSA,ElGamal).ThesechainswerethencombinedusingtheSHA2and
XORhashingalgorithms.Thediehardtestwasusedinallteststoassessthesecretkey’s
unpredictabilityanddemonstrateitsincreasedsecurity.WhencomparedtoXOR,SHA2
performedthebest.Table1givesasummaryofalltheliteraturereviewedwiththeresults
theyachieved.
Information2022,13,4424of15
Table1.Summaryofliterature.
S/NAuthorMethodsResultLimitations
1Zhangetal.[8]Digitalsignaturealgorithm
Theauthorsproposed
DSAtomitigatefraudu
lentassault.
Onlydigitalsignature
wasused.
2Burr[10]SHA1andSHA2
Thestudyconcludedthat
realisticthreatstoSHA2
hashfunctionsremain
impossibleinthenext
decades.
Thestudyonlyprotects
theintegrityofdatabut
doesnotproperlysecure
thedata.
3Acharyaetal.[11]Analyzedsomewellknowncryp
tographicalgorithms
Thestudynotedthatthe
powerofcryptographyis
inthekeyselection.
Thestudylacksaproper
waytoensurecomplete
datasecurity.
4SalehandMeinel
[12]
HPISecurewasusedtosecurethe
HTTPclient.
Thestudyrecommends
usingacoordinatorfor
keymanagement.
Thedrawbackofthisre
searchisthattheclient
mustinstalltheprogram
oneachcomputerwhere
itwillbeused.
5Haqueetal.[17]AES,RC4,Blowfish,CAST,3DES,
Twofish,DSA,andElGamal
Theeffectivenessofanal
gorithmdependsonexe
cutiontimeandlower
memoryusagerequire
ment.
Thestudyonlycompares
thecomputationaltimeof
theselectedalgorithms.
6Dijeshetal.[18]
Multilayerencryptionalgorithm
RSAandFernetcipherencryption
algorithms
Themethodusedtode
creasefraudulentactivi
tieseasilyandeffectively
overtheinternet.
Thestudyrecommendsa
moreefficientalgorithm
tosecureonlinetransac
tions.
7HamzaandAlAlak
[19]
KCMAforkeygeneration(ECC,
RSA,ElGamal)withSHA1and
SHA2
SHA2wasthebestas
comparedwithXOR.
Thestudyonlycompares
thekeygenerationofen
cryptionalgorithmswith
thehashingfunction.
Fromthesummaryofpiecesofliteratureshowingvariouslimitationsofthereviewed
work,itisexpedienttoprofferasolutionthatwillenhancethesecurityofdataaswellas
increasetheintegrityofthemessage.Therefore,thisstudyembracedtheuseofRSAand
ElGamalalgorithmswithSHA256toenhancetheintegrityofdata.
2.MaterialsandMethods
Thisstudyusesasymmetriccryptography(theRSAandElGamal)andtheSHA256
hashfunctionforboththeencryptionandsharingofsensitiveinformationandusinga
digitallysignedsystem;securityfeaturesincludingmessageauthentication,datainteg
rity,nonrepudiation,andconfidentialityarealsoprovided.Foranyspecifiedciphertext
regardlessoflength,theSHA256hashtechniqueisemployedtoproduceafixed,singular
value(referredtoasamessagedigest).Itisthismessagedigestthatissubsequentlyen
crypted/signedtoproducethesignaturesforthemessage.Thesystemflowdiagramof
thesystemisdisplayedinFigure2,whichdisplaystheflowofinformationfromuserA
touserB.
Information2022,13,4425of15
Figure2.Systemflowdiagram.
Thesystemisdevelopedinsuchawaythattherecipientalsorecomputesthedigital
signaturetoensureitsintegrityafterthesenderproducesitusingSHA256.Theauthen
ticityofthecontentisdeterminedifthetwosignaturesfromtheoriginatorandtherecip
ientareequal;ifnot,thedatahavebeenchangedduringtransitortransmission.
2.1.TheRSAAlgorithm
TheRSA’sreliabilityisdependentonhowchallengingitistofactorhugeprimenum
bers.TheencryptionanddecryptionstagesoftheRSAalgorithminvolvemodularexpo
nentiation.
2.1.1.KeyGeneration
i. Randomlychoosetwohuge,uniqueprimespandq.
ii. Computethemodulusn,n=p*qandthephifunctionØ(n)=(p−1)*(q−1).
iii. Choosearandomintegere,suchthat0<e<Ø(n).
iv. Computed=eˉˡmodØ(n).
v. Theprivatekeyisgivenas(d,n)andthepublickeyas(e,n).
2.1.2.EncryptionandDecryption
GiventhemessagetobeMandthecipherC,
i. Encryptioniscarriedoutwiththeaidofthepublickey(e,n).
ii. C=Mᵉmodn.
iii. Thesecretkeyisusedfordecryption(d,n).
iv. M=Cmodn.
2.2.SigningandVerification
Thecommunicatormustcarryoutthefollowingtocreatethesignaturesfordocu
mentM:
i. Calculatethehashh=H(M)ofthemessageM.
ii. ThesignatureSisgivenasS=Hmodn.
Toverifythesignature,
i. CalculatethehashHofthemessageM.
ii. ComputeH’=Sᵉmodn.
iii. IfH==H’,thenthesignatureisvalid.
Anymodificationtothedocumentwouldprovideachangedhashcode,which
wouldnotcorrelatewiththesignature.
Information2022,13,4426of15
2.3.TheElGamalAlgorithm
Dr.TaherElgamaldevelopedtheElGamalalgorithm,whichisapublickeymethod
ofencryption.Itisbasedontheonewayfeature,whichensuresthatencryptionschemes
areperformedseparately[20–24].
2.3.1.KeyGeneration
i. Generatealargerandomprimenumber(p).
ii. Chooseageneratornumber(a).
iii. Chooseaninteger(x)lessthan(p2),asthesecretnumber.
iv. Compute(d),whered=axmodp.
v. Theprivatekeyisgivenas(x)andthepublickeyas(p,a,d).
2.3.2.EncryptionandDecryption
Representtheplaintextasanintegerm,where0<m<p1.
Encryptionisachievedusingthepublickey(p,a,d).
i. Chooseanintegerksuchthat1<k<p2.
ii. Computey,y=akmodp.
iii. Computez,z=(dk*m)modp.
iv. TheciphertextisgivenasC=(y,z).
Decryptionisachievedusingtheprivatekey(x).
i. ThereceiverobtainstheciphertextC=(y,z).
ii. Next,riscomputedasfollows:r=yp1xmodp.
Theplaintextisrecoveredasfollows:m=(r*z)modp.
2.3.3.SignatureGeneration
ThisisaccomplishedfirstbygeneratingthehashmofthemessageM,withthepri
vatekeygivenas(x).
Thesignershouldthenperformthefollowing:
i. ChoosearandomintegerKwith1≤K≤(p1)andgcd(K,p1)=1.
ii. Computethetemporarykey:h=akmodp.
iii. ComputeK1theinverseofKmod(p1).
iv. Computethevalues=K1(mxh)mod(p1).
v. Thesignatureis(h,s).
AnyotheruserwhoreceivesthemessageMandsignature(h,s)cancarryoutverifi
cationusingthepublickey(p,a,d)bycomputingthefollowing:
i. ThehashmforthemessageM;
ii. V1=ammodp;
iii. V2=dhhSmodp;
iv. ThesignatureisvalidifV1==V2.
2.4.TheSHA256HashFunction
SHA256(securehashalgorithm,FIPS1822)isacryptographichashfunctionthat
processesinputblocksof512bitswithadigestlengthof256bits.Itisakeylesshashfunc
tion.TheSHA256followsthesamemodelasSHA1andbeginsbydefiningseveralcon
stants[25–29].Severaloperatingsystemsfrequentlyusehashmethodstosecurepass
words.Figure3illustrateshowhashingassessesafile’sauthenticity.Figure4showsthe
hashingalgorithmsinvolvingroundsofthehashfunctionsuchasablockcipher[30–33].
Information2022,13,4427of15
Figure3.Abasicillustrationofthehashingprocess.
Figure4.Schematicillustrationofhashingalgorithms.
TheSHA256Algorithm
ThealgorithmfortheSHA256hashfunctionisgivenbelow:
1. Appendasinglebit,whosevalueissetto1,totheinputx.
2. Computethesmallestrsuchthat(b+r)mod512=448.Appendr1bits,whosevalues
aresetto0,totheresultofstep1.
3. Computethe64bitvaluebmod2^64andappendthisvaluetotheresultofstep2.
4. Thisyieldsastringoflengththatmustbeamultiple,m,of512bitsand,thus,maybe
representedas16*m32bitblocks.
3.Results
Theproposedsecuresensitivedatasharingsystempossessesthefollowingfeatures:
1. EncryptionoffilesusingRSAandElGamalalgorithms;
2. Signaturegenerationandverificationfortextfiles;
3. DecryptionofinformationusingtheRSAandElGamalalgorithms;
4. Generationofmessagedigestforinformation/data;
5. GUIinterfaceforeasyinteractionwiththesystem;
6. Autogenerationofprivateandpublickeysforencryption,signing,anddecryption;
7. Provisionofinterfacefortheselectionoffilesordocumentstobesignedorencrypted.
SeeFigure5.
Figure5.Applicationhomepage.
Information2022,13,4428of15
Figure5displaystheinterfacethatprovidestheuserwithvariousfunctionalitiesto
encryptandsign,decryptandverify,orgenerateorverifythesignatureofafileafter
generatingorloadingtheappropriatekeysneeded.SeeFigure6.
Figure6.Encryptionandsignaturegenerationtosecuresensitiveinformation.
InFigure6,theuserinputstheirtexttobeencryptedandthenclicksonthe‘Encrypt
andsign’buttontogeneratetheciphertextanddigitalsignatureforthattextinput.Fig
ure7;Figure8illustratethedecryptionandsignatureverificationofthefileencrypted
withtheinstanceofFigure7returningavalidsignature,whilethatofFigure8returnsa
messagedialogforaninvalidsignature,whichprovesthateitherthesignaturedoesnot
correspondtothatfileorthefilehasbeenalteredinsomeway[34,35].
Figure7.Decryptionandsignatureverificationreturningavalidsignature.
Information2022,13,4429of15
Figure8.Decryptionandsignatureverificationreturninganinvalidsignature.
3.1.ResultAnalysis
TheRSAandtheElGamalalgorithmsweretestedusing2048bitkeys.Thetimetaken
fortheencryption,decryption,signaturegeneration,andverificationmodulesisgivenin
milliseconds.
3.1.1.Encryption
VariousfilesofdifferentsizeswereencryptedusingRSAandElGamalcryptographic
algorithms.Theencryptiontimeofbothalgorithmswasobtainedandplacedinatabular
form.SeeTable2.
Table2.DataanalysisforencryptionprocessforRSAandElGamalalgorithms.
S/NFileSize(Kb)RSAElGamal
EncryptionTime(ms)EncryptionTime(ms)
110953520
2152564340
3203126689
4254767311
5304997834
6355618372
7406069161
850109413
,
215
9100213619,359
10200422944,689
Figure9displaystheencryptiontimeoftheRSAandElGamalprocess,anditsshows
thattheElGamalalgorithmconsumesmoretimeduringdecryptionforvariousfilesizes.
Information2022,13,44210of15
Figure9.GraphicalrepresentationofRSAandElGamalencryptiontime.
3.1.2.Decryption
ThesamefilesizesencryptedinTable2weredecrypted,andtheirvariousdecryption
timesduringthedecryptionprocesswereobtainedandplacedinatabularform.SeeTable
3.
Table3.DataanalysisforthedecryptionprocessforRSAandElGamalalgorithms.
Size(Kb)RSAElGamal
DecryptionTime(ms)DecryptionTime(ms)
1103428637
2155207975
32078091233
42598321807
53012,6922645
63516
,
3253293
74018,5933990
85023
,
9864525
910035,4796829
1020042
,
7089968
Figure10displaysthegraphicalanalysisoftheRSAandElGamaldecryptionprocess
fordifferentfilesizes,andtheanalysisshowsthattheElGamalalgorithmconsumeslesser
timeduringthedecryptionoffilesizescomparedtotheRSAalgorithm.
Information2022,13,44211of15
Figure10.GraphicalanalysisofRSAandElGamaldecryptiontime(ms)
3.1.3.SignatureGeneration
ThetimetakenforbothRSAandElGamaltogenerateasignaturewascapturedand
recorded.Moreover,thetimetakenforRSAandElGamalwithoutSHA256wasobtained
andrecordedinatabularform.SeeTable4.
Table4.DataanalysisofsignaturegenerationprocessforRSAandElGamalalgorithms.
FileSize(Kb)
RSASignature
Generation
RSAwithout
SHA256
ElGamalSigna
tureGeneration
ElGamalwith
outSHA256
TimeTaken(ms)TimeTaken
(ms)TimeTaken(ms)TimeTaken
(ms)
1104852223136381
2154693405139602
3204844448145823
42549356831381057
53046469441471346
63547380731341871
74048692991362018
85049310,6011462667
910049618
,
8861313243
1020048123,9811364036
Figure11displaysthegraphicalanalysisofthesignaturegeneration.Itshowsthat
ElGamaloutperformsRSAinsignaturegeneration.
Information2022,13,44212of15
Figure11.GraphicalanalysisofRSAandElGamalsignaturegenerationprocess(ms).
3.1.4.SignatureVerification
RSA’sandElGamal’stimetakenforthesignatureverificationprocesswasobtained
andrecorded.ThetimetakenforbothalgorithmswithoutSHA256wasobtainedaswell
inmillisecondsanddisplayedintabularform.SeeTable5.
Table5.DataanalysisforsignatureverificationprocessforRSAandElGamalalgorithms.
FileSize
(KB)
RSASignature
Verification
TimeTaken
(ms)
RSAwithout
SHA256(ms)
ElGamalSignature
Verification(ms)
ElGamalwith
outSHA256
(ms)
1101563177827
21515661891281
32012691891630
42514761942057
53015771652718
63515821673152
74019871883770
85015981904234
9100211031795141
10200251221996089
Figure12displaysthegraphicalanalysisofRSAandElGamalsignatureverification.
TheanalysisshowsthatRSAperformsbetterthanElGamalinthesignatureverification
process.
Information2022,13,44213of15
Figure12.GraphicalanalysisofthesignatureverificationprocessofRSAandElGamalalgorithms.
4.Discussion
ThisstudyexaminedtheRSAandElGamalcryptographicalgorithmstoimprovein
formationsecurity.TheapplicationoftheSHA256hashfunctiontothedigitalsignatures
oftheRSAandElGamalasymmetriccryptographicalgorithmswasimplemented.From
thevariousexperimentalresultsdisplayedintablesandfigures,itcanbeseenthatthe
RSAalgorithmperformsbetterthantheElGamalduringtheencryptionandsignature
verificationprocesses,whileElGamalperformsbetterthanRSAduringthedecryption
andsignaturegenerationprocess.Therefore,itcanbededucedthateachofthealgorithms
performsbetterthantheotherinsomeprocesses;however,thereisnoobvioussuperiority
ofonecryptosystemovertheotherinalltheprocessesofencryption,decryption,signa
turegeneration,andsignatureverification.
FindingsandComparisonwithExistingWork
Theuseofcryptographichashfunctionsindigitalsignaturegenerationprovidesa
mechanismsuchthattheintegritycheckfeatureofthehashvalueguaranteesapartyof
theintegrityandoriginalityofadocumentordata;thefindinginthisstudycorroborates
thatofHamzaandAlAlak[19].Signingthehashvalueofdatawiththeuseofhashfunc
tions,insteadofsigningthedatadirectlyprovidesamoreefficientschemeforadigital
signaturebecausethehashofthedataisarelativelysmallervaluecomparedtotheorigi
naldata,inaccordancewithBurr[10].ThisfindinginthisstudymatchesthatofHaqueet
al.’s[17]study.However,Haqueetal.’s[17]studywasoutperformedbyimplementing
SHA256toachievedataintegrity.
5.Conclusions
Theneedforinformationsecurityinthispresenttimehasbecomenonnegligiblein
oursocietyduetothedailyincreasingemergenceofcybercrimes,piracy,scam,andfraud
cases.Asithasbeennoticedthatsecurityandsafetyconcernsareamongthemostpressing
problemsconfrontingpotentialdistributeddata,thesendingandreceptionofdataare
consideredvulnerabletoexternalattacks.Therefore,dataprotectionthroughencryp
tion/decryptionisessential.Thisstudyexaminedtwoasymmetricalgorithms(RSAand
ElGamal)developedinimprovinginformationsecurityservices.Inaddition,theapplica
tionoftheSHA256hashfunctiontothedigitalsignaturesoftheRSAandElGamalcryp
tosystemswasimplementedtoestablishinformationintegrity.Thetechniqueensuresthe
protectionofthesecurityofusers’sensitivedataandatthesametimeprovidesuserswith
Information2022,13,44214of15
fullcontroloftheirdata.Variousbenefitsassociatedwiththisstudyandthecorrectness
oftheimplementedsystemsmakeitsuitableforanysecuresensitivedatasharingsystem.
Therefore,itisrecommendedthatfurtherimplementationsuchassecuresubmission,
storage,andextractionoperationsofthesensitivedatasharingsystemshouldbeimple
mentedforfullandmaximumprotectionofsensitivedata.
AuthorContributions:Conceptualization,E.A.A.,P.B.F.andS.B.;methodology,E.A.A.,P.B.F.and
S.B.;software,E.A.A.,P.B.F.andS.B.;validation,E.A.A.,P.B.F.andS.B.;formalanalysis,M.S.M.,
M.A.andS.B.;investigation,E.A.A.andP.B.F.;resources,M.S.M.,M.A.andS.B.,datacuration,S.B.;
writing—originaldraftpreparation,E.A.A.andS.B.;writing—reviewandediting,E.A.A.andS.B.;
visualization,E.A.A.andS.B.;supervision,M.S.M.,M.A.andS.B.;projectadministration,M.S.M.,
M.A.andS.B.Allauthorshavereadandagreedtothepublishedversionofthemanuscript.
Funding:ThisresearchwasfundedbytheResearchSupportingProject(numberRSP2022R459),
KingSaudUniversity,Riyadh,SaudiArabia.
InstitutionalReviewBoardStatement:Notapplicable.
InformedConsentStatement:Notapplicable.
DataAvailabilityStatement:Notapplicable.
Acknowledgments:ResearchSupportingProject(numberRSP2022R459),KingSaudUniversity,Ri
yadh,SaudiArabia.
ConflictsofInterest:Theauthorsdeclarenoconflictofinterest.
References
1. Gunduz,M.Z.;Das,R.Cybersecurityonsmartgrid:Threatsandpotentialsolutions.Comput.Netw.2020,169,107094.
https://doi.org/10.1016/j.comnet.2019.107094.
2. Saxena,N.;Choi,B.J.;Lu,R.AuthenticationandAuthorizationSchemeforVariousUserRolesandDevicesinSmartGrid.
IEEETrans.Inf.ForensicsSecur.2015,11,907–921.https://doi.org/10.1109/tifs.2015.2512525.
3. Misbha,A.;Baswal,K.;Simha,M.N.;Abujam,R.;C.M.,S.GUPTDOCANENTERPRISEPORTALFORCRYPTINGWITH
AES.Int.Res.J.Eng.Technol.2017,4,1309–1311.
4. Emmanuel,A.A.;Okeyinka,A.E.;Adebiyi,M.O.;Asani,E.O.ANoteonTimeandSpaceComplexityofRSAandElGamal
CryptographicAlgorithms.Int.J.Adv.Comput.Sci.Appl.2021,12,143–147.
5. Chandra,S.;Paira,S.;Alam,S.S.;Sanyal,G.AcomparativesurveyofSymmetricandAsymmetricKeyCryptography.In
Proceedingsofthe2014InternationalConferenceonElectronics,CommunicationandComputationalEngineering
(ICECCE),Hosur,India,17–18November2014;pp.83–93.https://doi.org/10.1109/icecce.2014.7086640.
6. SejfuliRamadani,N.TheRoleandtheImpactofDigitalCertificateandDigitalSignatureinImprovingSecurityDuring
DataTransmission.Eur.J.Sustain.Dev.Res.2017,2,116–120.
7. Winter,C.;Berchtold,W.;Hollenbeck,J.N.Securingphysicaldocumentswithdigitalsignatures.InProceedingsofthe2019
IEEE21stInternationalWorkshoponMultimediaSignalProcessing(MMSP),KualaLumpur,Malaysia,18November2019;
pp.1–6.
8. Zhang,H.;Yuan,Z.;Wen,Q.Y.ADigitalSignatureSchemesWithoutUsingOnewayHashandMessageRedundancyand
ItsApplicationonKeyAgreement.InProceedingsofthe2007IFIPInternationalConferenceonNetworkandParallelCom
putingWorkshops(NPC2007),Dalian,China,18–21September2007;pp.873–878.https://doi.org/10.1109/ic
npcw.2007.4351597.
9. Chang,C.C.;Chang,Y.F.Anovelthreepartyencryptedkeyexchangeprotocol.Comput.Stand.Interfaces2004,26,471–476.
https://doi.org/10.1016/j.csi.2003.12.001.
10. Burr,W.Cryptographichashstandards:Wheredowegofromhere?.IEEESecur.Priv.2006,4,88–91.
https://doi.org/10.1109/msp.2006.37.
11. Acharya,K.;Sajwan,M.;Bhargava,S.AnalysisofCryptographicAlgorithmsforNetworkSecurity.Int.J.Comput.Appl.
Technol.Res.2014,3,130–135.
12. Saleh,E.;Meinel,C.HPISecure:TowardsDataConfidentialityinCloudApplications.InProceedingsofthe201313th
IEEE/ACMInternationalSymposiumonCluster,Cloud,andGridComputing,Delft,Netherlands,13–16May2013;pp.605–
609.https://doi.org/10.1109/ccgrid.2013.109.
13. Mell,P.;Grance,T.TheNISTdefinitionofcloudcomputing.NISTSpec.Publ.2011,800,145.
14. Abiodun,M.K.;Awotunde,J.B.;Ogundokun,R.O.;Misra,S.;Adeniyi,E.A.;Arowolo,M.O.;Jaglan,V.CloudandBigData:
AMutualBenefitforOrganizationDevelopment.J.Physics:Conf.Ser.2021,1767,012020.https://doi.org/10.1088/1742
6596/1767/1/012020.
Information2022,13,44215of15
15. Hwang,J.J.;Chuang,H.K.;Hsu,Y.C.;Wu,C.H.ABusinessModelforCloudComputingBasedonaSeparateEncryption
andDecryptionService.InProceedingsofthe2011InternationalConferenceonInformationScienceandApplications,Jeju,
Korea,26–29April2011;pp.1–7.https://doi.org/10.1109/icisa.2011.5772349.
16. Chandra,D.G.;Prakash,R.;Lamdharia,S.AStudyonCloudDatabase.InProceedingsofthe2012FourthInternational
ConferenceonComputationalIntelligenceandCommunicationNetworks,Mathura,India,3–5November2012;pp.513–
519.
17. Haque,E.;Zobaed,S.;Islam,M.U.;Areef,F.M.PerformanceAnalysisofCryptographicAlgorithmsforSelectingBetter
UtilizationonResourceConstraintDevices.InProceedingsofthe201821stInternationalConferenceofComputerandIn
formationTechnology(ICCIT),Dhaka,Bangladesh,21–23December2018;pp.1–6.https://doi.org/10.1109/ic
citechn.2018.8631957.
18. Dijesh,P.;Babu,S.;Vijayalakshmi,Y.Enhancementofecommercesecuritythroughasymmetrickeyalgorithm.Comput.
Commun.2020,153,125–134.https://doi.org/10.1016/j.comcom.2020.01.033.
19. Hamza,A.H.;AlAlak,S.M.K.Evaluationkeygeneratorofmultipleasymmetricmethodsinwirelesssensornetworks
(WSNs).J.Phys.Conf.Ser.2021,1804,012096.
20. Bharany,S.;Sharma,S.;Badotra,S.;Khalaf,O.I.;Alotaibi,Y.;Alghamdi,S.;Alassery,F.EnergyEfficientClusteringScheme
forFlyingAdHocNetworksUsinganOptimizedLEACHProtocol.Energies2021,14,6016.
https://doi.org/10.3390/en14196016.
21. Kaur,K.;Bharany,S.;Badotra,S.;Aggarwal,K.;Nayyar,A.;Sharma,S.Energyefficientpolyglotpersistencedatabaselive
migrationamongheterogeneousclouds.J.Supercomput.2022,1–30.https://doi.org/10.1007/s11227022046626.
22. Bharany,S.;Sharma,S.;Bhatia,S.;Rahmani,M.K.I.;Shuaib,M.;Lashari,S.A.EnergyEfficientClusteringProtocolfor
FANETSUsingMothFlameOptimization.Sustainability2022,14,6159.https://doi.org/10.3390/su14106159.
23. Steichen,M.;FizPontiveros,B.;Norvill,R.;Shbair,W.BlockchainBased,DecentralizedAccessControlforIPFS.InProceed
ingsofthe2018IEEEInternationalConferenceonBlockchain(Blockchain2018),Halifax,NS,Canada,30July–3August
2018;pp.1499–1506.
24. Gaby,G.;Chandra,L.;Enderson,T.TowardsSecureInteroperabilitybetweenHeterogeneousBlockchainsusingSmartCon
tracts.InProceedingsoftheFutureTechnologiesConference(FTC),Vancouver,BC,Canada,15–16November2017;pp.73–
81.
25. Bharany,S.;Sharma,S.;Khalaf,O.I.;Abdulsahib,G.M.;AlHumaimeedy,A.S.;Aldhyani,T.H.H.;Maashi,M.;Alkahtani,H.
ASystematicSurveyonEnergyEfficientTechniquesinSustainableCloudComputing.Sustainability2022,14,6256.
https://doi.org/10.3390/su14106256.
26. Nizamuddin,N.;Salah,K.;Azad,M.A.;Arshad,J.;Rehman,M.Decentralizeddocumentversioncontrolusingethereum
blockchainandIPFS.Comput.Electr.Eng.2019,76,183–197.https://doi.org/10.1016/j.compeleceng.2019.03.014.
27. Bharany,S.;Kaur,K.;Badotra,S.;Rani,S.;Kavita;Wozniak,M.;Shafi,J.;Ijaz,M.F.EfficientMiddlewareforthePortability
ofPaaSServicesConsumingApplicationsamongHeterogeneousClouds.Sensors2022,22,5013.
https://doi.org/10.3390/s22135013.
28. Guo,R.;Shi,H.;Zhao,Q.;Zheng,D.SecureAttributeBasedSignatureSchemeWithMultipleAuthoritiesforBlockchainin
ElectronicHealthRecordsSystems.IEEEAccess2018,6,11676–11686.https://doi.org/10.1109/access.2018.2801266.
29. Bharany,S.;Badotra,S.;Sharma,S.;Rani,S.;Alazab,M.;Jhaveri,R.H.;Gadekallu,T.R.Energyefficientfaulttolerancetech
niquesingreencloudcomputing:Asystematicsurveyandtaxonomy.Sustain.EnergyTechnol.Assess.2022,53,102613.
https://doi.org/10.1016/j.seta.2022.102613.
30. Dias,J.P.;Reis,L.;Ferreira,H.S.;Martins,Â.Blockchainforaccesscontrolinehealthscenarios.arXiv2018,arXiv:1805.12267.
31. Bharany,S.;Sharma,S.;Frnda,J.;Shuaib,M.;Khalid,M.I.;Hussain,S.;Iqbal,J.;Ullah,S.S.WildfireMonitoringBasedon
EnergyEfficientClusteringApproachforFANETS.Drones2022,6,193.https://doi.org/10.3390/drones6080193.
32. Fukumitsu,M.;Hasegawa,S.;Iwazaki,J.;Sakai,M.;Takahashi,D.AproposalofasecureP2Ptypestorageschemebyusing
thesecretsharingandtheblockchain.InProceedingsofthe2017IEEE31stInternationalConferenceonAdvancedInfor
mationNetworkingandApplications(AINA),Taipei,Taiwan,27–29March2017;pp.803–810.
33. Pãnescu,A.T.;Manta,V.SmartContractsforResearchDataRightsManagementovertheEthereumBlockchainNetwork.
Sci.Technol.Libr.2018,37,235–245.https://doi.org/10.1080/0194262x.2018.1474838.
34. Dai,M.;Zhang,S.;Wang,H.;Jin,S.ALowStorageRoomRequirementFrameworkforDistributedLedgerinBlockchain.
IEEEAccess2018,6,22970–22975.https://doi.org/10.1109/access.2018.2814624.
35. Nizamuddin,N.;Hasan,H.;Salah,K.;Iqbal,R.BlockchainBasedFrameworkforProtectingAuthorRoyaltyofDigitalAs
sets.Arab.J.Sci.Eng.2019,44,3849–3866.https://doi.org/10.1007/s13369018037154.
... Comparing DL + CCE with other classifiers developed in comparable and contemporary works is provided as well (see Table 7) [59][60][61][62]. The confusion matrix serves as the primary source of most of the data mining parameters. ...
... Other chronic conditions, such as cancer, will be tested utilizing the context-aware framework that has been presented. According to [52][53][54][55][56][57], the suggested framework will be evaluated on a variety of quality of service (QoS), energy use [58][59][60][61], and social network service (SNS) in the cloud (Cloud) criteria. ...
Article
Full-text available
The escalating global prevalence of chronic and lifestyle-related illnesses presents substantial societal and economic challenges. This work delves into an extensive review of healthcare monitoring systems tailored for chronic and lifestyle disorders. Subsequently, we propose a pioneering Smart Patient Monitoring and Recommendation (SPMR) framework, leveraging Deep Learning (DL) and cloud-based analytics. SPMR ensures continuous monitoring and predictive insights into a patient’s authentic health status using data from vital signs and contextual activities collected via Ambient Assisted Living devices. Within the predictive DL component of the LIP module, we employ Categorical Cross Entropy (CCE) Optimization to forecast real-world health conditions using unbalanced datasets derived from Chronic Blood Pressure Disorder case studies. Significantly, SPMR’s capability to deliver real-time preventive measures and treatments persists even without Internet or cloud connectivity. This circumvents the need to replicate Machine Learning (ML) models and associated procedures in local setups, thus streamlining operations. Comparative analysis against analogous models showcases the considerable effectiveness of our proposed model, notably enhancing accuracy by up to 8 to 18 percent. Moreover, both the overall F-score and the emergency class F-score exhibit marked improvements of 17% and 36%, respectively. These outcomes underscore SPMR’s pivotal role, especially during crises, emphasizing its significance in healthcare monitoring systems.
... Heightened awareness and proactive measures are essential in mitigating the risks of data breaches and theft(E. A. Adeniyi, Falola, Maashi, Aljebreen, & Bharany, 2022) (Boobalan, Gunasekar, Thirumoorthy, & Senthil, 2023). Cryptography emerges as a powerful solution for data security, employing mathematical techniques to encrypt data, rendering it accessible to only those with the correct decryption key(E. ...
... Cryptography emerges as a powerful solution for data security, employing mathematical techniques to encrypt data, rendering it accessible to only those with the correct decryption key(E. A. Adeniyi et al., 2022). This ensures that the sensitive information remains impervious to interception and unauthorized access, bolstering data privacy and overall security. ...
Article
Full-text available
In the evolving landscape of digital technology, the imperative for robust data security mechanisms has escalated, given the increasing sophistication of cyber threats. This abstract delineates a study focused on enhancing cryptographic defenses through the innovation of a Substitution box (S-Box), which is pivotal in the architecture of modern encryption algorithms. The proposed S-Box, deriving its foundation from chaotic maps integrated with trigonometric-multiplicative functions, represents a novel approach in cryptographic design, utilizing square root arguments to instigate dynamic characteristics. The evaluation of the proposed S-Box was methodically conducted using a comprehensive set of cryptographic benchmarks including Nonlinearity (NL), Strict Avalanche Criterion (SAC), Bit Independence Criterion (BIC), Linear Approximation Probability (LP), and Differential Approximation Probability (DP), to ascertain its defensive robustness against cryptanalytic attacks. The comparative analysis delineated in this study reveals that the cryptographic strength of the proposed S-Box transcends that of other contemporaneously designed S-Boxes thereby underscoring its potential applicability in real-world security scenarios. The findings of this research not only contribute to the theoretical underpinnings of cryptographic security but also have practical implications in the development of more secure digital environments fortifying data against unauthorized access and ensuring the integrity of confidential information in digital communications.
... Decryption, on the other hand, requires knowledge of the private key to recover the original message from the ciphertext [9]. Emmanuel A. Adeniyi et al. [7] used RSA and ElGamal cryptographic methods, as well as SHA-256, to create digital signatures that improved security and validated the exchange of sensitive information. The study sought to authenticate shared data using SHA-256 and cryptographic techniques. ...
Preprint
Full-text available
In an era of growing cyber dangers, strong encryption solutions are required to maintain data confidentiality, integrity, and authenticity. After doing a thorough examination of sixteen different cryptographic algorithms and assessing parameters such as encryption/decryption timeframes and key generation efficiency. Through rigorous comparison, this paper hopes to identify the best method for improving network security in VIT Lab and similar contexts, ultimately contributing to stronger digital defence measures. This research investigates the critical role of cryptographic algorithms in improving network security in laboratory settings at Vellore Institute of Technology, Chennai.
... With the help of its fully convolutional generator, the framework effectively manipulates input printed style pictures and latent style vectors to produce a variety of handwritten text images while maintaining spatial consistency [29,30]. This feature enables the production of graphics with various shaped text, modified letter spacing, and variable sentence lengths. ...
Article
Full-text available
The challenging task of handwriting style synthesis requires capturing the individuality and diversity of human handwriting. The majority of currently available methods use either a generative adversarial network (GAN) or a recurrent neural network (RNN) to generate new handwriting styles. This is why these techniques frequently fall short of producing diverse and realistic text pictures, particularly for terms that are not commonly used. To resolve that, this research proposes a novel deep learning model that consists of a style encoder and a text generator to synthesize different handwriting styles. This network excels in generating conditional text by extracting style vectors from a series of style images. The model performs admirably on a range of handwriting synthesis tasks, including the production of text that is out-of-vocabulary. It works more effectively than previous approaches by displaying lower values on key Generative Adversarial Network evaluation metrics, such Geometric Score (GS) (3.21 × 10) and Fréchet Inception Distance (FID) (8.75), as well as text recognition metrics, like Character Error Rate (CER) and Word Error Rate (WER). A thorough component analysis revealed the steady improvement in image production quality, highlighting the importance of specific handwriting styles. Applicable fields include digital forensics, creative writing, and document security.
... A public key encryption (PKE) scheme consists of three algorithms (KGen, Enc, Dec) [28,29]. ...
Article
Full-text available
In recent years, there has been significant growth in location-based services (LBSs) and applications. These services empower users to transmit their location data to location service providers, thereby facilitating the provisioning of pertinent resources and services. However, in order to prevent malicious users from sending fake location data, users must attest to their location for service providers, namely, through a proof of location (PoL). Such a proof should additionally prevent attackers from being able to obtain users’ identity and location information through it. In this paper, we propose an efficient privacy-preserving proof of location (PPPoL) scheme. The scheme is based on the standard cryptographic primitives, including Group Time-based One-Time Password (GTOTP) and public key encryption, which achieves entity privacy, location privacy, and traceability. Unlike the previous GTOTP-based PPPoL scheme, our scheme enables instant location verification with additional hash operations. To encourage the active participation of witnesses in location proofs, we propose an incentive mechanism based on smart contracts. Additionally, we implement a proof of concept of our PPPoL scheme on an Android device. Our experimental results show that proof generation and verification time are on the order of milliseconds. Meanwhile, the total overhead for the incentive mechanism amounts to 0.0011 ETH. This result is practical for mobile device-based LBSs.
... Compared to classical networks, resource-constrained IoT networks pose an additional challenge, as they require a balance between robust protection and resource efficiency through lightweight security solutions. Recent works in this area include [41], which focuses on the problem of IoT network security in the space of healthcare, and [42], which focuses on the performance comparison of two cryptographic functions, thus highlighting the importance of resource efficiency. A question that arises from the present work is whether using adaptive spatial techniques increases security through energy efficiency and network reliability, or introduces security vulnerabilities, in which case they would need to be addressed. ...
Article
Full-text available
Low-Power Wide-Area Networks constitute a leading, emerging Internet-of-Things technology, with important applications in environmental and industrial monitoring and disaster prevention and management. In such sensor networks, external detectable events can trigger synchronized alarm report transmissions. In LoRaWANs, and more generally in networks with a random access-based medium access algorithm, this can lead to a cascade of frame collisions, temporarily resulting in degraded performance and diminished system operational capacity, despite LoRaWANs’ physical layer interference and collision reduction techniques. In this paper, a novel scheduling algorithm is proposed that can increase system reliability in the case of such events. The new adaptive spatial scheduling algorithm is based on learning automata, as well as previous developments in scheduling over LoRaWANs, and it leverages network feedback information and traffic spatial correlation to increase network performance while maintaining high reliability. The proposed algorithm is investigated via an extensive simulation under a variety of network conditions and compared with a previously proposed scheduler for event-triggered traffic. The results show a decrease of up to 30% in average frame delay compared to the previous approach and an order of magnitude lower delay compared to the baseline algorithm. These findings highlight the importance of using spatial information in adaptive schemes for improving network performance, especially in location-sensitive applications.
Article
Full-text available
Bluetooth technology facilitates data exchange accross diverse applications, spanning audio streaming and IoT devices. Its versatility enhances user convenience and productivity, enabling efficient communication and connectivity in various contexts, thereby fostering innovation and enhancing technological integration in daily life. Bluetooth's security vulnerabilities stem from encryption flaws, leaving devices susceptible to unauthorized access and data interception. Eavesdropping and device spoofing represent significant concerns, highlighting the urgency for enhanced security measures. Strengthening encryption protocols and implementing proactive security strategies are imperative to mitigate risks and protect sensitive data exchanged over Bluetooth connections. These efforts are crucial for maintaining the integrity and confidentiality of communication channels, ensuring user privacy and system reliability in diverse applications. The hybrid encryption technique suggested in this paper is a tribute to unprecedented innovation in Bluetooth security. It pioneers a multi-layered approach to data protection by seamlessly integrating AES, Blowfish, RSA, and SHA-256. This algorithm not only answers current security concerns, but it also teaches how to use cryptographic approaches strategically. Furthermore, its prudent use of RSA, which minimizes computing overhead, demonstrates a forward-thinking approach to combining security and efficiency. The algorithm's astounding great accuracy after multiple tests demonstrates its practical practicality, confirming its potential to transform Bluetooth security procedures. This effort establishes a new cryptographic standard, altering the landscape of wireless communication security. Syed Atir Raza is currently affiliated
Article
Full-text available
Forest fires are a significant threat to the ecological system’s stability. Several attempts have been made to detect forest fires using a variety of approaches, including optical fire sensors, and satellite-based technologies, all of which have been unsuccessful. In today’s world, research on flying ad-hoc networks (FANETs) is a thriving field and can be used successfully. This paper describes a unique clustering approach that identifies the presence of a fire zone in a forest and transfers all sensed data to a base station as soon as feasible via wireless communication. The fire department takes the required steps to prevent the spread of the fire. It is proposed in this study that an efficient clustering approach be used to deal with routing and energy challenges to extend the lifetime of a UAV in case of forest fires. Due to the restricted energy and high mobility, this directly impacts the flying duration and routing of FANET nodes. As a result, it is vital to enhance the lifetime of WSNs to maintain high system availability. Our proposed algorithm EE-SS regulates the energy usage of nodes while taking into account the features of a disaster region and other factors. For firefighting, sensor nodes are placed throughout the forest zone to collect essential data points for identifying forest fires and dividing them into distinct clusters. All of the sensor nodes in the cluster communicate their packets to the base station continually through the cluster head. When FANET nodes communicate with one another, their transmission range is constantly adjusted to meet their operating requirements. This paper examines the existing clustering techniques for forest fire detection approaches restricted to wireless sensor networks and their limitations. Our newly designed algorithm chooses the most optimum cluster heads (CHs) based on their fitness, reducing the routing overhead and increasing the system’s efficiency. Our proposed method results from simulations are compared with the existing approaches such as LEACH, LEACH-C, PSO-HAS, and SEED. The evaluation is carried out concerning overall energy usage, residual energy, the count of live nodes, the network lifetime, and the time it takes to build a cluster compared to other approaches. As a result, our proposed EE-SS algorithm outperforms all the considered state-of-art algorithms.
Article
Full-text available
Cloud computing is seen as a more promising technology than any other traditional information technology computing paradigm in today’s world. It essentially functions as an on-demand resource provisioning platform that requires no active user participation. The resource provisioning strategies necessitate proper load distribution management across the cloud network, without which the cloud would experience biased workload performance. Today virtualization is the cornerstone of cloud computing, allowing data dissemination and administration via deploying virtual machines. Modern applications contain data that need to be stored into a scheme called polyglot persistence (combining SQL and NoSQL data-stores). However, these services are tailored to specific storage requirements, necessitating aggregating them from several heterogeneous clouds or migrating data from one cloud to another. Data migration can be done offline where the database is independent of the application, or otherwise, the application has to be down for the migration period. This paper developed a middleware in .NET Core facilitating the live migration of persistent polyglot data in heterogeneous clouds. This paper presents the proof of concept for live migration of the database layer of an application hosted on any supported clouds to any implemented cloud’s data-store. Our suggested technique performs better in migration time, energy usage, and throughput aspects as compared with the offline migration scenario. In our experimentation, we found that while migrating data in offline mode from SQL to mongo and vice versa there is a marginal increase of 29% and 11%, respectively, in latency time. This increase is acceptable and tolerable while considering the live data migration scenario.
Article
Full-text available
Cloud providers create a vendor-locked-in environment by offering proprietary and non-standard APIs, resulting in a lack of interoperability and portability among clouds. To overcome this deterrent, solutions must be developed to exploit multiple clouds efficaciously. This paper proposes a middleware platform to mitigate the application portability issue among clouds. A literature review is also conducted to analyze the solutions for application portability. The middleware allows an application to be ported on various platform-as-a-service (PaaS) clouds and supports deploying different services of an application on disparate clouds. The efficiency of the abstraction layer is validated by experimentation on an application that uses the message queue, Binary Large Objects (BLOB), email, and short message service (SMS) services of various clouds via the proposed middleware against the same application using these services via their native code. The experimental results show that adding this middleware mildly affects the latency, but it dramatically reduces the developer’s overhead of implementing each service for different clouds to make it portable.
Article
Full-text available
Global warming is one of the most compelling environmental threats today, as the rise in energy consumption and CO2 emission caused a dreadful impact on our environment. The data centers, computing devices, network equipment, etc., consume vast amounts of energy that the thermal power plants mainly generate. Primarily fossil fuels like coal and oils are used for energy generation in these power plants that induce various environmental problems such as global warming ozone layer depletion, which can even become the cause of premature deaths of living beings. The recent research trend has shifted towards optimizing energy consumption and green fields since the world recognized the importance of these concepts. This paper aims to conduct a complete systematic mapping analysis on the impact of high energy consumption in cloud data centers and its effect on the environment. To answer the research questions identified in this paper, one hundred nineteen primary studies published until February 2022 were considered and further categorized. Some new developments in green cloud computing and the taxonomy of various energy efficiency techniques used in data centers have also been discussed. It includes techniques like VM Virtualization and Consolidation, Power-aware, Bio-inspired methods, Thermal-management techniques, and an effort to evaluate the cloud data center’s role in reducing energy consumption and CO2 footprints. Most of the researchers proposed software level techniques as with these techniques, massive infrastructures are not required as compared with hardware techniques, and it is less prone to failure and faults. Also, we disclose some dominant problems and provide suggestions for future enhancements in green computing.
Article
Full-text available
FANET (flying ad-hoc networks) is currently a trending research topic. Unmanned aerial vehicles (UAVs) have two significant challenges: short flight times and inefficient routing due to low battery power and high mobility. Due to these topological restrictions, FANETS routing is considered more complicated than MANETs or VANETs. Clustering approaches based on artificial intelligence (AI) approaches can be used to solve complex routing issues when static and dynamic routings fail. Evolutionary algorithm-based clustering techniques, such as moth flame optimization, and ant colony optimization, can be used to solve these kinds of problems with routes. Moth flame optimization gives excellent coverage while consuming little energy and requiring a minimum number of cluster heads (CHs) for routing. This paper employs a moth flame optimization algorithm for network building and node deployment. Then, we employ a variation of the K-Means Density clustering approach to choosing the cluster head. Choosing the right cluster heads increases the cluster’s lifespan and reduces routing traffic. Moreover, it lowers the number of routing overheads. This step is followed by MRCQ image-based compression techniques to reduce the amount of data that must be transmitted. Finally, the reference point group mobility model is used to send data by the most optimal path. Particle swarm optimization (PSO), ant colony optimization (ACO), and grey wolf optimization (GWO) were put to the test against our proposed EECP-MFO. Several metrics are used to gauge the efficiency of our proposed method, including the number of clusters, cluster construction time, cluster lifespan, consistency of cluster heads, and energy consumption. This paper demonstrates that our proposed algorithm performance is superior to the current state-of-the-art approaches using experimental results.
Article
Full-text available
A Flying Ad-hoc network constitutes many sensor nodes with limited processing speed and storage capacity as they institute a minor battery-driven device with a limited quantity of energy. One of the primary roles of the sensor node is to store and transmit the collected information to the base station (BS). Thus, the life span of the network is the main criterion for the efficient design of the FANETS Network, as sensor nodes always have limited resources. In this paper, we present a methodology of an energy-efficient clustering algorithm for collecting and transmitting data based on the Optimized Low-Energy Adaptive Clustering Hierarchy (LEACH) protocol. The selection of CH is grounded on the new optimized threshold function. In contrast, LEACH is a hierarchical routing protocol that randomly selects cluster head nodes in a loop and results in an increased cluster headcount, but also causes more rapid power consumption. Thus, we have to circumvent these limitations by improving the LEACH Protocol. Our proposed algorithm diminishes the energy usage for data transmission in the routing protocol, and the network’s lifetime is enhanced as it also maximizes the residual energy of nodes. The experimental results performed on MATLAB yield better performance than the existing LEACH and Centralized Low-Energy Adaptive Clustering Hierarchy Protocol in terms of energy efficiency per unit node and the packet delivery ratio with less energy utilization. In addition, the First Node Death (FND) is also meliorated when compared to the LEACH and LEACH-C protocols.
Article
Full-text available
Abstract The wireless sensor network (WSNs) is constructed with a combination of the sensor nodes and the sink nodes. WSNs applied in many applications. The Security in WSNs is necessary because of limitations of storage, computing capacity, power use. Encryption is one of the most important tools utilized to supply the security services for WSNs. Asymmetric and symmetric encryption algorithm can be utilized in the WSNs structure to supply the security. The asymmetric key encryption algorithm gives a higher level of the security, but compared to symmetric key encryption, that causes extra sensor overhead. In this research KCMA method used to generate chains key of twelve experiments of the algorithms (ECC, RSA, ELGamal). These chains merged with hash function SHA2 and XOR. Diehard test was utilized in all experiments to evaluate the randomness of the secret key generated, and show it's more security system. SHA2 was the best as compared with XOR. Also, the work evaluated the performance (time) for the system and throughput network.
Article
Full-text available
The emergence of big data as a novel model gives unparalleled composition and value for an organization. The growth of big data is posing challenges in areas such as processing, analytics, sharing, and visualization. Interestingly, the cloud computing technology also emanated to specify important required infrastructure to tackle these disputes. Cloud computing is an effective interface that’s used to manipulate enormous-scale and complicated calculations. It eliminated the requirement to sustain lavish computing hardware, dedicated infrastructure, and software. Big data and cloud computing (BDCC) are considered to become the source of productivity that drives today's electronic business transformations. Nonetheless, the ratio of the companies that adopt and use BDCC isn't significant. There are also obstacles to facilitating BDCC's market proliferation. Hence, this paper aims to recognize and emphasize the factors that affect the adoption and use of BDCC in technology-organization-environment (TOE) viewpoints in enterprises. Data were obtained from a sample of 100 companies to scientifically check our system. The understanding of BDCC's potential advantages and technical capabilities are defined as the BDCC's important elements. Consistency with current infrastructure, data reliability and functionality, and protection and privacy are highly rated within the sense of technologies. Managerial expertise and financial expenditure capacity for the application and use of BDCC and governmental assistance and regulation are defined as organizational and environmental considerations for acceptance and use, simultaneously.
Article
Cloud computing has brought the accessibility of several software platforms under a single roof. It has transformed resources into scalable services on demand and provides the only solution to the high resource requirements. All cloud service providers usually offer all types of services in the cloud computing environment, even though they also handle security-related challenges like reliability, availability, and throughput. One of the most decisive challenges in the cloud is handling faults. High fault tolerance in the cloud is a must to attain high performance, and the defects must be investigated and examined for future guidance. The principal target of this paper is to gain insight into the fault tolerance techniques that are available to us and the challenges that are required to be overcome. We concluded that there is always a relation between faults and energy consumption during our survey. If there is a high potential to tolerate a fault, there will be a need for more infrastructure and devices to fix those faults, which further leads to more power consumption. In this paper, 129 Research papers published through February 2022 were considered and further classified. This paper critically reviews techniques to tolerate faults in cloud computing systems and discusses the taxonomy of errors, faults, and failures. Furthermore, this paper aims to investigate several critical research topics and advanced techniques, such as artificial intelligence, deep learning, the Internet of Things, and machine learning, that may be employed as an intelligent fault tolerance strategy in the cloud environment.