SNDT WOMEN'S UNIVERSITY
BMK Knowledge Resource Centre
Vithaldas Vidyavihar, Juhu Tara Road,
Santacruz (West) Mumbai - 400049
| 000 -LEADER | |
|---|---|
| fixed length control field | 01926nam a2200133 4500 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
| fixed length control field | 250825b |||||||| |||| 00| 0 eng d |
| 100 ## - MAIN ENTRY--PERSONAL NAME | |
| Personal name | C.A. Yogaraja |
| 245 ## - TITLE STATEMENT | |
| Title | Cryptography in IoT Using Elliptic Curve Cryptography with Adaptive Hunter-Prey Optimization |
| 300 ## - PHYSICAL DESCRIPTION | |
| Extent | p1119-1133 |
| 520 ## - SUMMARY, ETC. | |
| Summary, etc. biblio.abstract | The Internet of Things (IoT) is utilized in different applications and the increasing connectivity of IoT devices raises significant concerns regarding data security and privacy. Security is a major aspect and a fundamental necessity in IoT design. The rise in cyberattacks necessitates the development of an effective strategic approach to safeguard IoT systems. Better data security in IoT has become a significant challenge and this issue can be addressed by evaluating proper encryption techniques while storing data in IoT environments. Cryptographic techniques should be lightweight, efficient, and versatile to the limited computational resources of IoT devices. This work proposes an approach called Elliptic Curve Cryptography (ECC) with the Adaptive Hunter Prey Optimization (AHPO) algorithm for providing data security in IoT. The encryption technique ECC provides a robust and lightweight encryption mechanism and the AHPO is employed for optimal key generation and management processes, enhancing both security and efficiency. Then, the encrypted data are hashed by the MD-5 algorithm. The suggested model addresses the need for reduced computational load and power consumption in IoT environments and maintaining a high level of security. Experimental outcomes demonstrate the efficacy of this approach in optimizing cryptographic operations, making it a feasible solution to secure IoT networks. |
| 654 ## - SUBJECT ADDED ENTRY--FACETED TOPICAL TERMS | |
| Subject | <a href="Adaptive hunter-prey optimization">Adaptive hunter-prey optimization</a> |
| -- | <a href="Data security">Data security</a> |
| -- | <a href="Encryption">Encryption</a> |
| -- | <a href="Internet of Things">Internet of Things</a> |
| -- | <a href="Optimal key generation">Optimal key generation</a> |
| 773 0# - HOST ITEM ENTRY | |
| Host Biblionumber | 80269 |
| Host Itemnumber | 113443 |
| Place, publisher, and date of publication | New Delhi IETE |
| Title | IETE Journal of Research |
| International Standard Serial Number | 0377-2063 |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
| Koha item type | Journal Article |
| Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Location (home branch) | Sublocation or collection (holding branch) | Date acquired | Koha issues (times borrowed) | Piece designation (barcode) | Koha date last seen | Price effective from | Koha item type |
|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Dewey Decimal Classification | SNDT Juhu | SNDT Juhu | 25/08/2025 | JP865.3 | 25/08/2025 | 25/08/2025 | Journal Article |