Improved Hyper Elliptical Curve Cryptography using Butterfly Optimization Algorithm for Secured Authentication and Encryption for IoT Healthcare Applications

  • Ms.Hemalatha.K, Dr.P.Vijayakumar
Keywords: Wireless Body Area Networks, Internet-of-Things,Elliptical Curve Cryptography, Improved Hyper Elliptical Curve Cryptography, Butterfly Optimization Algorithm.

Abstract

Protection of patient's clinical data in remote e-health applications is highly challenging since the current significant authentication schemes face high complexities in terms of computation and communication costs. Elliptical Curve Cryptography (ECC) and its variants tried to reduce these costs but adversely reduced the processing speed and increased the storage costs leading to security threatsfrom various adversaries. Therefore, this paper aims at developing an efficient authentication and encryption methodology to overcome the high computation, communication and storage costs as well as the slow processing issues. This paper proposes Improved Hyper Elliptical Curve Cryptography (IHECC) in which introduces an auxiliary input key for encryption, selected optimally by Butterfly Optimization Algorithm (BOA). This proposed IHECC authentication and encryption utilizes the genus-3 hyper elliptic curves to improve the throughput and security while also reducing the complexity and storage costs through smaller encryption messages. The selection of additional auxiliary input key by the BOA improves the security limitations faced in ECC and its variants. The simulations are done using MATLAB and the experiments are conducted to evaluate the performance of the proposed model by comparing it with the existing Rivest Shamir Adleman (RSA), ECC and IECC schemes. The results showed that the proposed IHECC scheme outperforms existing schemes with reduced computation, communication and storage costs while also decreasing the encryption/decryption time and improving throughput.

Published
2021-10-14
How to Cite
Dr.P.Vijayakumar, M. (2021). Improved Hyper Elliptical Curve Cryptography using Butterfly Optimization Algorithm for Secured Authentication and Encryption for IoT Healthcare Applications. Design Engineering, 4008-4025. Retrieved from http://thedesignengineering.com/index.php/DE/article/view/5348
Section
Articles