Abstract
Digital communication developed into an imperative element of infrastructure now-a-days. Many applications that operate infrastructure systems are internet-centered. Because of the nontrivial risks of information/data leakage, communication in the systems ought to be secured. Many techniques like cryptography are being employed on a large scale to furtively transmit information. But in the data transmission procedure, attaining the high data security along with high system efficiency is a difficult task. To trounce these difficulties, an efficient data transmission scheme utilizing improved advanced encryption standard with Butterfly Effect (IAES-BE) is proposed. The IAES-BE does the encryption procedure to thwart the data as of the attackers. The adaptive flower pollination algorithm (A-FPA) is employed for the key generation that augments the key’s complexity. After that, the generated key is implemented to the IAES-BE for encrypting the input plain-text as ciphertext. Next, the ciphertext is decrypted through revising the IAES-BE. Thereby, the original data will be attained and safely transmitted to the receiver. Centered on the investigational outcomes, the proposed work offered superior performance to the remaining data transmission methods.
Similar content being viewed by others
References
Rajanbabu, D.T., and Raj, C.: Implementing a reliable cryptography based security tool for communication networks. In: 2014 International Conference on Science Engineering and Management Research (ICSEMR), pp. 1–4. IEEE (2014)
Li, F., Zheng, Z., Jin, C.: Secure and efficient data transmission in the internet of things. Telecommun. Syst. 62(1), 111–122 (2016)
Selva Mary, G. and Manoj Kumar, S.: Secure grayscale image communication using significant visual cryptography scheme in real time applications. In: Multimedia Tools and Applications, pp. 1–20 (2019)
Alif Siddiqua Begum, A., Nirmala, S.: Secure visual cryptography for medical image using modified cuckoo search. Multimed. Tools Appl. 77(20), 27041–27060 (2018)
Vegh, L., and Miclea, L.: Secure and efficient communication in cyber-physical systems through cryptography and complex event processing. In: 2016 International Conference on Communications (COMM), pp. 273–276. IEEE (2016)
SrideviSathya Priya, S., Kirti Gaurav Das, N., SivaMangai, M. and Karthigai Kumar, P.: Multiplexer based high throughput S-box for AES application. In: 2015 2nd International Conference on Electronics and Communication Systems (ICECS), pp. 242–247. IEEE (2015)
Thangamani, N., Murugappan, M.: A lightweight cryptography technique with random pattern generation. Wirel. Pers. Commun. 104(4), 1409–1432 (2019)
Avudaiappan, T., Balasubramanian, R., Sundara Pandiyan, S., Saravanan, M., Lakshmanaprabu, S.K., Shankar, K.: Medical image security using dual encryption with oppositional based optimization algorithm. J. Med. Syst. 42(11), 208 (2018)
Qasaimeh, M., Al-Qassas, R.S., Tedmori, S.: Software randomness analysis and evaluation of lightweight ciphers: the prospective for IoT security. Multimed. Tools Appl. 77(14), 18415–18449 (2018)
Mathivanan, P., Balaji Ganesh, A.: QR code based color image cryptography for the secured transmission of ECG signal. Multimed. Tools Appl. 78, 1–24 (2018)
Talirongan, H., Sison, A.M., and Medina, R.P.: Modified advanced encryption standard using butterfly effect. In: 2018 IEEE 10th International Conference on Humanoid, Nanotechnology, Information Technology, Communication and Control, Environment and Management (HNICEM), pp. 1–6. IEEE (2018)
Mahendra, L.I.B., Santoso, Y.K., and Shidik, G.F.: Enhanced AES using MAC address for cloud services. In: 2017 International Seminar on Application for Technology of Information and Communication (iSemantic), pp. 66–71. IEEE (2017)
Papadopoulos, N.A., Psannis, K.E.: Sequential multiple LSB methods and real-time data hiding: variations for visual cryptography ciphers. J. Real-Time Image Proc. 14(1), 75–86 (2018)
BalaAnand, M., Karthikeyan, N., Karthik, S.: Designing a framework for communal software based on the assessment using relation modelling. J. Parall. Progr Int. (2018). https://doi.org/10.1007/s10766-018-0598-2
Priya Sethuraman, P., Tamizharasan, S., Arputharaj, K.: Fuzzy genetic elliptic curve diffie hellman algorithm for secured communication in networks. Wirel. Pers. Commun. 105, 1–15 (2019)
Manojkumar, T., Karthigaikumar, P., Ramachandran, V.: An optimized s-box circuit for high speed AES design with enhanced PPRM architecture to secure mammographic images. J. Med. Syst. 43(2), 31 (2019)
Elhoseny, M., Shankar, K., Lakshmanaprabu, S.K., Maseleno, A., Arunkumar, N.: Hybrid optimization with cryptography encryption for medical image security in internet of things. Neural Comput. Appl. (2018). https://doi.org/10.1007/s00521-018-3801-x
Zhang, Y., Liu, X., Ma, Y., Cheng, L.-C.: An optimized DNA based encryption scheme with enforced secure key distribution. Clust. Comput. 20(4), 3119–3130 (2017)
Kumari, S., Karuppiah, M., Das, A.K., Li, X., Wu, F., Gupta, V.: Design of a secure anonymity-preserving authentication scheme for session initiation protocol using elliptic curve cryptography. J. Ambient Intell. Hum. Comput. 9(3), 643–653 (2018)
Jayaraman, S., Bhagavathiperumal, R., Mohanakrishnan, U.: A three layered peer-to-peer energy efficient protocol for reliable and secure data transmission in EAACK MANETs. Wirel. Pers. Commun. 102(1), 201–227 (2018)
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Reddy, M.I., Kumar, A.P.S. An efficient data transmission approach using IAES-BE. Cluster Comput 23, 1633–1645 (2020). https://doi.org/10.1007/s10586-020-03098-y
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10586-020-03098-y