Internet of things encryption technology combining elliptic curve cryptosystem, hash function, and RFID-based authentication

被引:0
作者
Bin Zheng [1 ]
机构
[1] Affiliated College, Beijing Open University, Beijing
来源
Discover Internet of Things | / 5卷 / 1期
关键词
Elliptic curve cryptosystem; Encryption; Hash function; Internet of Things; Radio frequency identification;
D O I
10.1007/s43926-025-00145-1
中图分类号
学科分类号
摘要
As an important means of connecting the physical world and the digital world, the reliability and security of the Internet of Things network are key issues. To raise the security of Internet of Things data, a research proposes an encryption technique that combines elliptic curve cryptosystem and hash functions. In this process, the radio frequency identification system is used as the central element for data encryption, with the elliptic curve cryptosystem employed to secure the transmitted data. Non-adjacent scalar representations are used to reduce the expected running time of scalar multiplication, and a bidirectional authentication protocol for Internet of Things encryption is designed using Hash functions. The experimental results showed that in the communication overhead test, the research method had a communication overhead of 242 bits when the Hash function output length was 40 bits in server communication. When analyzing the success rate of intercepting abnormal data access behavior, the research method achieved a success rate of 99.1% when the host file size was 100 Kb. In the analysis of scalar multiplication operation time, the research method only took 18 ms when the output length of the Hash function reached 340bits in a local area network environment. This illustrates that the raised method has a good encryption effect on the Internet of Things and can effectively ensure the security of Internet of Things communication. The research is expected to provide certain technical support for the development of the Internet of Things. © The Author(s) 2025.
引用
收藏
相关论文
共 21 条
  • [1] Gupta M., Singh V.P., Gupta K.K., Shukla P.K., An efficient image encryption technique based on two-level security for internet of things, Multimedia Tools Applicat, 82, 4, pp. 5091-5111, (2023)
  • [2] Pu L., Lin C., Chen B., He D., User-friendly public-key authenticated encryption with keyword search for industrial internet of things, IEEE Internet Things J, 10, 15, pp. 13544-13555, (2023)
  • [3] Hedayati R., Mostafavi S., A lightweight image encryption algorithm for secure communications in multimedia Internet of Things, Wireless Pers Commun, 123, 2, pp. 1121-1143, (2022)
  • [4] Feng J., Wang J., Zhu Y., Han K., A hybrid chaotic encryption ASIC with dynamic precision for internet of things, IEEE Int Things J, 11, 1, pp. 1148-1163, (2023)
  • [5] Liu C., Zhang Y., Xu J., Zhao J., Xiang S., Ensuring the security and performance of IoT communication by improving encryption and decryption with the lightweight cipher uBlock, IEEE Syst J, 16, 4, pp. 5489-5500, (2022)
  • [6] Zhu S., Xu X., Gao H., Xiao F., CMTSNN: A deep learning model for multiclassification of abnormal and encrypted traffic of Internet of Things, IEEE Int Things J, 10, 13, pp. 11773-11791, (2023)
  • [7] Khayyat M.M., Khayyat M.M., Abdel-Khalek S., Mansour R.F., Blockchain enabled optimal Hopfield Chaotic Neural network based secure encryption technique for industrial internet of things environment, Alex Eng J, 61, 12, pp. 11377-11389, (2022)
  • [8] Kalaiarasi M., Venkatasubramani V.R., Vinoth Thyagarajan V., Rajaram S., A parallel elliptic curve crypto-processor architecture with reduced clock cycle for FPGA platforms, J Supercomput, 78, 13, pp. 15567-15597, (2022)
  • [9] Bashir Z., Malik M.G.A., Hussain M., Iqbal N., Multiple RGB images encryption algorithm based on elliptic curve, improved Diffie Hellman protocol, Multimedia Tools Applicat, 81, 3, pp. 3867-3897, (2022)
  • [10] Ametepe A.F.X., Ahouandjinou A.S.R.M., Ezin E.C., Robust encryption method based on AES-CBC using elliptic curves Diffie-Hellman to secure data in wireless sensor networks, Wireless Netw, 28, 3, pp. 991-1001, (2022)