Skip to main content

Advertisement

Log in

Security-Based Hook Curve Master Node Key Authentication (HC-MNKA) Using Shuffle Standard Padding Encryption Crypto Policy (S2PES)

  • Original Research
  • Published:
SN Computer Science Aims and scope Submit manuscript

Abstract

Nowadays, IoT is growing rapidly and is a security concern as there are multiple security policy violations. Furthermore, blockchain development has grown rapidly since Bitcoin first became popular. IoT security issues can be solved by Blockchain. One way to achieve this is through the use of secure communication between IoT devices. Blockchain has emerged as one of the promising and most abundant technologies for security of cloud infrastructure. Blockchain is designed to store, read, and validate transactions within a distributed database system. Security and confidentiality can be enhanced with a distributed ledger that is shared across cloud nodes. In particular, it provides security through effective caching, encryption, and peer-aware sharing of generated hash values. Cloud computing is a centralized service in the financial sector that protects sensitive information and provides better security to protect personal data. Due to the lack of verified services and unauthorized access, compromised keys can damage important information. In this paper, we introduces the Hook Curve Master Node Key Authentication (HC-MNKA) to improve the security based on Shuffle Standard Padding Encryption Crypto Policy (S2PES) to solve the above issues. The proposed Pre-Ack decentralized chain link (P2PACD) algorithm is used to create new node transactions in the network. Furthermore, the Mutual Trust Node Behavioral Rate (MTNBR) algorithm is used to find network trust rates based on successive weight. Based on the trust rate, the hash index is created depending on the user policy to form a blockchain link. The Hook curve Master node Key authentication is applied to verify the transaction node to check if it’s a valid transaction node in the Network of Things. Security analysis shows that a decentralized blockchain network authenticates validation results, increasing transparency and security.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

Data availability

The data consideration is based on user communication and data processing in block blockchain. “Any text content file taken to process the proposed system”.

References

  1. Da Silva Rodrigues CK, Rocha V. Towards Blockchain for suitable efficiency and data integrity of IoT ecosystem transactions. IEEE Latin Am Trans. 2021;19(7):1199–206. https://doi.org/10.1109/TLA.2021.9461849.

    Article  Google Scholar 

  2. Zhou J, Feng G, Wang Y. Optimal deployment mechanism of blockchain in resource-constrained IoT systems. IEEE Internet Things J. 2022;9(11):8168–77. https://doi.org/10.1109/JIOT.2021.3106355.

    Article  Google Scholar 

  3. Sadawi A, Hassan MS, Ndiaye M. A survey on the integration of blockchain with IoT to enhance performance and eliminate challenges. IEEE Access. 2021;9:54478–97. https://doi.org/10.1109/ACCESS.2021.3070555.

    Article  Google Scholar 

  4. Sadawi A, Hassan MS, Ndiaye M. On the integration of blockchain with IoT and the role of oracle in the combined system: the full picture. IEEE Access. 2022;10:92532–58. https://doi.org/10.1109/ACCESS.2022.3199007.

    Article  Google Scholar 

  5. Sun S, Du R, Chen S, Li W. Blockchain-based IoT access control system: towards security, lightweight, and cross-domain. IEEE Access. 2021;9:36868–78. https://doi.org/10.1109/ACCESS.2021.3059863.

    Article  Google Scholar 

  6. Yuan, et al. Secure data transportation with software-defined networking and k-n secret sharing for high-confidence IoT services. IEEE Internet Things J. 2020;7(9):7967–81. https://doi.org/10.1109/JIOT.2020.2993587.

    Article  Google Scholar 

  7. Wu W, Peng H, Tong F, Li L. Novel secure data transmission methods for IoT based on STP-CS with multilevel critical information concealment function. IEEE Internet Things J. 2023;10(5):4557–78. https://doi.org/10.1109/JIOT.2022.3218681.

    Article  Google Scholar 

  8. Jia M, Yin Z, Li D, Guo Q, Gu X. Toward improved offloading efficiency of data transmission in the IoT-Cloud by Leveraging Secure Truncating OFDM. IEEE Internet Things J. 2019;6(3):4252–61. https://doi.org/10.1109/JIOT.2018.2875743.

    Article  Google Scholar 

  9. Ullah A, Azeem M, Ashraf H, Alaboudi AA, Humayun M, Jhanjhi N. Secure Healthcare Data Aggregation and Transmission in IoT—a survey. IEEE Access. 2021;9:16849–65. https://doi.org/10.1109/ACCESS.2021.3052850.

    Article  Google Scholar 

  10. Xu G. IoT-assisted ECG monitoring framework with secure data transmission for health care applications. IEEE Access. 2020;8:74586–94. https://doi.org/10.1109/ACCESS.2020.2988059.

    Article  Google Scholar 

  11. Tao H, Bhuiyan MZA, Abdalla AN, Hassan MM, Zain JM, Hayajneh T. Secured data collection with hardware-based Ciphers for IoT-Based Healthcare. IEEE Internet Things J. 2019;6(1):410–20. https://doi.org/10.1109/JIOT.2018.2854714.

    Article  Google Scholar 

  12. Mei Q, Yang M, Chen J, Wang L, Xiong H. Expressive data sharing and self-controlled fine-grained data deletion in Cloud-Assisted IoT. IEEE Trans Dependable Secure Comput. 2023;20(3):2625–40. https://doi.org/10.1109/TDSC.2022.3188740.

    Article  Google Scholar 

  13. Chen S, Zhu X, Zhang H, Zhao C, Yang G, Wang K. Efficient privacy preserving data collection and computation offloading for fog-assisted IoT. IEEE Trans Sustain Comput. 2020;5(4):526–40. https://doi.org/10.1109/TSUSC.2020.2968589.

    Article  Google Scholar 

  14. Hu C, Pu Y, Yang F, Zhao R, Alrawais A, Xiang T. Secure and Efficient Data Collection and Storage of IoT in Smart Ocean. IEEE Internet Things J. 2020;7(10):9980–94. https://doi.org/10.1109/JIOT.2020.2988733.

    Article  Google Scholar 

  15. Zhang B. Comments on “provably secure generalized signcryption scheme with public verifiability for secure data transmission between resource-constrained IoT devices.” IEEE Internet Things J. 2020;7(5):4666–70. https://doi.org/10.1109/JIOT.2020.2974817.

    Article  Google Scholar 

  16. Said G, Ghani A, Ullah A, Azeem M, Bilal M, Kwak KS. Light-Weight Secure Aggregated Data Sharing in IoT-Enabled Wireless Sensor Networks. IEEE Access. 2022;10:33571–85. https://doi.org/10.1109/ACCESS.2022.3160231.

    Article  Google Scholar 

  17. Yan X, He X, Yu J, Tang Y. White-Box Traceable Ciphertext-Policy Attribute-Based Encryption in Multi-Domain Environment. IEEE Access. 2019;7:128298–312. https://doi.org/10.1109/ACCESS.2019.2939413.

    Article  Google Scholar 

  18. Zhang L, Cui Y, Mu Y. Improving Security and Privacy Attribute Based Data Sharing in Cloud Computing. IEEE Syst J. 2020;14(1):387–97. https://doi.org/10.1109/JSYST.2019.2911391.

    Article  Google Scholar 

  19. Rezaeibagha F, Mu Y, Huang K, Chen L, Zhang L. Toward secure data computation and outsource for multi-user Cloud-based IoT. IEEE Trans Cloud Comput. 2023;11(1):217–28. https://doi.org/10.1109/TCC.2021.3087614.

    Article  Google Scholar 

  20. Aazam M, Islam SU, Lone ST, Abbas A. Cloud of Things (CoT): Cloud-Fog-IoT Task Offloading for Sustainable Internet of Things. IEEE Trans Sustain Comput. 2022;7(1):87–98. https://doi.org/10.1109/TSUSC.2020.3028615.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to V. Vijayalakshmi.

Ethics declarations

conflict of interest

The authors declare that they have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This article is part of the topical collection “Advances in Computational Approaches for Image Processing, Wireless Networks, Cloud Applications and Network Security” guest edited by P. Raviraj, Maode Ma and Roopashree H R.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Vijayalakshmi, V., Sharmila, K. Security-Based Hook Curve Master Node Key Authentication (HC-MNKA) Using Shuffle Standard Padding Encryption Crypto Policy (S2PES). SN COMPUT. SCI. 5, 26 (2024). https://doi.org/10.1007/s42979-023-02305-y

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s42979-023-02305-y

Keywords

Navigation