Skip to main content
Log in

An efficient data transmission approach using IAES-BE

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

Digital communication developed into an imperative element of infrastructure now-a-days. Many applications that operate infrastructure systems are internet-centered. Because of the nontrivial risks of information/data leakage, communication in the systems ought to be secured. Many techniques like cryptography are being employed on a large scale to furtively transmit information. But in the data transmission procedure, attaining the high data security along with high system efficiency is a difficult task. To trounce these difficulties, an efficient data transmission scheme utilizing improved advanced encryption standard with Butterfly Effect (IAES-BE) is proposed. The IAES-BE does the encryption procedure to thwart the data as of the attackers. The adaptive flower pollination algorithm (A-FPA) is employed for the key generation that augments the key’s complexity. After that, the generated key is implemented to the IAES-BE for encrypting the input plain-text as ciphertext. Next, the ciphertext is decrypted through revising the IAES-BE. Thereby, the original data will be attained and safely transmitted to the receiver. Centered on the investigational outcomes, the proposed work offered superior performance to the remaining data transmission methods.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  1. Rajanbabu, D.T., and Raj, C.: Implementing a reliable cryptography based security tool for communication networks. In: 2014 International Conference on Science Engineering and Management Research (ICSEMR), pp. 1–4. IEEE (2014)

  2. Li, F., Zheng, Z., Jin, C.: Secure and efficient data transmission in the internet of things. Telecommun. Syst. 62(1), 111–122 (2016)

    Article  Google Scholar 

  3. Selva Mary, G. and Manoj Kumar, S.: Secure grayscale image communication using significant visual cryptography scheme in real time applications. In: Multimedia Tools and Applications, pp. 1–20 (2019)

  4. Alif Siddiqua Begum, A., Nirmala, S.: Secure visual cryptography for medical image using modified cuckoo search. Multimed. Tools Appl. 77(20), 27041–27060 (2018)

    Article  Google Scholar 

  5. Vegh, L., and Miclea, L.: Secure and efficient communication in cyber-physical systems through cryptography and complex event processing. In: 2016 International Conference on Communications (COMM), pp. 273–276. IEEE (2016)

  6. SrideviSathya Priya, S., Kirti Gaurav Das, N., SivaMangai, M. and Karthigai Kumar, P.: Multiplexer based high throughput S-box for AES application. In: 2015 2nd International Conference on Electronics and Communication Systems (ICECS), pp. 242–247. IEEE (2015)

  7. Thangamani, N., Murugappan, M.: A lightweight cryptography technique with random pattern generation. Wirel. Pers. Commun. 104(4), 1409–1432 (2019)

    Article  Google Scholar 

  8. Avudaiappan, T., Balasubramanian, R., Sundara Pandiyan, S., Saravanan, M., Lakshmanaprabu, S.K., Shankar, K.: Medical image security using dual encryption with oppositional based optimization algorithm. J. Med. Syst. 42(11), 208 (2018)

    Article  Google Scholar 

  9. Qasaimeh, M., Al-Qassas, R.S., Tedmori, S.: Software randomness analysis and evaluation of lightweight ciphers: the prospective for IoT security. Multimed. Tools Appl. 77(14), 18415–18449 (2018)

    Article  Google Scholar 

  10. Mathivanan, P., Balaji Ganesh, A.: QR code based color image cryptography for the secured transmission of ECG signal. Multimed. Tools Appl. 78, 1–24 (2018)

    Google Scholar 

  11. Talirongan, H., Sison, A.M., and Medina, R.P.: Modified advanced encryption standard using butterfly effect. In: 2018 IEEE 10th International Conference on Humanoid, Nanotechnology, Information Technology, Communication and Control, Environment and Management (HNICEM), pp. 1–6. IEEE (2018)

  12. Mahendra, L.I.B., Santoso, Y.K., and Shidik, G.F.: Enhanced AES using MAC address for cloud services. In: 2017 International Seminar on Application for Technology of Information and Communication (iSemantic), pp. 66–71. IEEE (2017)

  13. Papadopoulos, N.A., Psannis, K.E.: Sequential multiple LSB methods and real-time data hiding: variations for visual cryptography ciphers. J. Real-Time Image Proc. 14(1), 75–86 (2018)

    Article  Google Scholar 

  14. BalaAnand, M., Karthikeyan, N., Karthik, S.: Designing a framework for communal software based on the assessment using relation modelling. J. Parall. Progr Int. (2018). https://doi.org/10.1007/s10766-018-0598-2

    Article  Google Scholar 

  15. Priya Sethuraman, P., Tamizharasan, S., Arputharaj, K.: Fuzzy genetic elliptic curve diffie hellman algorithm for secured communication in networks. Wirel. Pers. Commun. 105, 1–15 (2019)

    Article  Google Scholar 

  16. Manojkumar, T., Karthigaikumar, P., Ramachandran, V.: An optimized s-box circuit for high speed AES design with enhanced PPRM architecture to secure mammographic images. J. Med. Syst. 43(2), 31 (2019)

    Article  Google Scholar 

  17. Elhoseny, M., Shankar, K., Lakshmanaprabu, S.K., Maseleno, A., Arunkumar, N.: Hybrid optimization with cryptography encryption for medical image security in internet of things. Neural Comput. Appl. (2018). https://doi.org/10.1007/s00521-018-3801-x

    Article  Google Scholar 

  18. Zhang, Y., Liu, X., Ma, Y., Cheng, L.-C.: An optimized DNA based encryption scheme with enforced secure key distribution. Clust. Comput. 20(4), 3119–3130 (2017)

    Article  Google Scholar 

  19. Kumari, S., Karuppiah, M., Das, A.K., Li, X., Wu, F., Gupta, V.: Design of a secure anonymity-preserving authentication scheme for session initiation protocol using elliptic curve cryptography. J. Ambient Intell. Hum. Comput. 9(3), 643–653 (2018)

    Article  Google Scholar 

  20. Jayaraman, S., Bhagavathiperumal, R., Mohanakrishnan, U.: A three layered peer-to-peer energy efficient protocol for reliable and secure data transmission in EAACK MANETs. Wirel. Pers. Commun. 102(1), 201–227 (2018)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to M. Indrasena Reddy.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Reddy, M.I., Kumar, A.P.S. An efficient data transmission approach using IAES-BE. Cluster Comput 23, 1633–1645 (2020). https://doi.org/10.1007/s10586-020-03098-y

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10586-020-03098-y

Keywords

Navigation