Back to Search Start Over

Fuzzy logic and CPSO-optimized key management for secure communication in decentralized IoT networks: A lightweight solution.

Authors :
Vellingiri, J.
Vedhavathy, T.R.
Senthil Pandi, S.
Bala Subramanian, C.
Source :
Peer-to-Peer Networking & Applications; Sep2024, Vol. 17 Issue 5, p2979-2997, 19p
Publication Year :
2024

Abstract

The act of implementing specific measures to ensure the security of cryptographic keys within an organization is referred to as key management. Securing communication in a decentralized IoT network presents many challenges due to the abundance of devices and the dynamic nature of the network. For this purpose, A Decentralized lightweight group key management (DLGKM) system is proposed in this paper, that leverages fuzzy logic and Crossover boosted Particle Swarm Optimization (CPSO) named FLCPSO-KM to enhance decisions and settle disputes in IoT environments. DLGKM system uses fuzzy logic and CPSO in decision-making and dispute resolution, this allows for qualitative and quantitative optimization, leading to reliable outcomes. The system provides a lightweight and effective solution for secure communication in a decentralized IoT network. It employs a Crossover-boosted particle swarm optimization (PSO) algorithm for secure key revocation from unauthorized devices, ensuring the security of the network and resources. Overall, the proposed DLGKM system provides an effective and efficient solution for secure communication in a decentralized IoT network. The advantages of utilizing fuzzy logic and CPSO in the system include enhanced decision-making and the ability to solve key revocation issues, thus minimizing communication and computational overheads. The proposed approach was compared to existing approaches such as Blockchain-Based Distributed Key Management Architecture (BDKMA), Cognitive Key Management Technique (CKMT), Healthcare Key Management Approach (HCKM), and Hash-Based Key Management Mechanism (AHKM) based on metrics such as security, encryption and decryption time, computational time, throughput, and fitness value. The proposed approach achieved greater efficiency with 98.7% security, encryption, and decryption time of 0.2 s and 0.3 s, throughput of 250 bits per second, and fitness values ranging from 0 to 1 respectively. [ABSTRACT FROM AUTHOR]

Details

Language :
English
ISSN :
19366442
Volume :
17
Issue :
5
Database :
Complementary Index
Journal :
Peer-to-Peer Networking & Applications
Publication Type :
Academic Journal
Accession number :
180104855
Full Text :
https://doi.org/10.1007/s12083-024-01733-8