SNDT WOMEN'S UNIVERSITY

BMK Knowledge Resource Centre

Vithaldas Vidyavihar, Juhu Tara Road,
Santacruz (West) Mumbai - 400049

Cryptography in IoT Using Elliptic Curve Cryptography with Adaptive Hunter-Prey Optimization (Record no. 132569)

MARC details
000 -LEADER
fixed length control field 01926nam a2200133 4500
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 250825b |||||||| |||| 00| 0 eng d
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name C.A. Yogaraja
245 ## - TITLE STATEMENT
Title Cryptography in IoT Using Elliptic Curve Cryptography with Adaptive Hunter-Prey Optimization
300 ## - PHYSICAL DESCRIPTION
Extent p1119-1133
520 ## - SUMMARY, ETC.
Summary, etc. biblio.abstract The Internet of Things (IoT) is utilized in different applications and the increasing connectivity of IoT devices raises significant concerns regarding data security and privacy. Security is a major aspect and a fundamental necessity in IoT design. The rise in cyberattacks necessitates the development of an effective strategic approach to safeguard IoT systems. Better data security in IoT has become a significant challenge and this issue can be addressed by evaluating proper encryption techniques while storing data in IoT environments. Cryptographic techniques should be lightweight, efficient, and versatile to the limited computational resources of IoT devices. This work proposes an approach called Elliptic Curve Cryptography (ECC) with the Adaptive Hunter Prey Optimization (AHPO) algorithm for providing data security in IoT. The encryption technique ECC provides a robust and lightweight encryption mechanism and the AHPO is employed for optimal key generation and management processes, enhancing both security and efficiency. Then, the encrypted data are hashed by the MD-5 algorithm. The suggested model addresses the need for reduced computational load and power consumption in IoT environments and maintaining a high level of security. Experimental outcomes demonstrate the efficacy of this approach in optimizing cryptographic operations, making it a feasible solution to secure IoT networks.
654 ## - SUBJECT ADDED ENTRY--FACETED TOPICAL TERMS
Subject <a href="Adaptive hunter-prey optimization">Adaptive hunter-prey optimization</a>
-- <a href="Data security">Data security</a>
-- <a href="Encryption">Encryption</a>
-- <a href="Internet of Things">Internet of Things</a>
-- <a href="Optimal key generation">Optimal key generation</a>
773 0# - HOST ITEM ENTRY
Host Biblionumber 80269
Host Itemnumber 113443
Place, publisher, and date of publication New Delhi IETE
Title IETE Journal of Research
International Standard Serial Number 0377-2063
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type Journal Article
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Location (home branch) Sublocation or collection (holding branch) Date acquired Koha issues (times borrowed) Piece designation (barcode) Koha date last seen Price effective from Koha item type
    Dewey Decimal Classification     SNDT Juhu SNDT Juhu 25/08/2025   JP865.3 25/08/2025 25/08/2025 Journal Article