Secure IoT framework for authentication and confidentiality using hybrid cryptographic schemes

Secure IoT framework for authentication and confidentiality using hybrid cryptographic schemes

29 February 2024 | Salman Ali, Faisal Anwer
The paper presents a secure IoT framework for authentication and data confidentiality using hybrid cryptographic schemes. The model begins by authenticating users and IoT devices, followed by encrypting data using Elliptic Curve Cryptography (ECC) and the Advanced Encryption Standard (AES). The ECC and Genetic Algorithm (GA) are combined to generate keys, enhancing security and reducing computational overhead. The proposed model is compared with state-of-the-art cryptographic algorithms like Data Encryption Standard (DES) and Rivest–Shamir–Adleman (RSA) based on key size, execution time, throughput, and avalanche effect. Experimental results show that the proposed model ensures robust authentication and confidentiality, outperforming other methods in terms of security and efficiency. The paper also discusses the importance of security in IoT systems, addressing challenges such as data modification, privacy breaches, and unauthorized access. The framework includes authentication, authorization, non-repudiation, integrity, and confidentiality as key security principles. The paper is organized into sections covering related work, background, hybrid design, implementation results, security analysis, and conclusions.The paper presents a secure IoT framework for authentication and data confidentiality using hybrid cryptographic schemes. The model begins by authenticating users and IoT devices, followed by encrypting data using Elliptic Curve Cryptography (ECC) and the Advanced Encryption Standard (AES). The ECC and Genetic Algorithm (GA) are combined to generate keys, enhancing security and reducing computational overhead. The proposed model is compared with state-of-the-art cryptographic algorithms like Data Encryption Standard (DES) and Rivest–Shamir–Adleman (RSA) based on key size, execution time, throughput, and avalanche effect. Experimental results show that the proposed model ensures robust authentication and confidentiality, outperforming other methods in terms of security and efficiency. The paper also discusses the importance of security in IoT systems, addressing challenges such as data modification, privacy breaches, and unauthorized access. The framework includes authentication, authorization, non-repudiation, integrity, and confidentiality as key security principles. The paper is organized into sections covering related work, background, hybrid design, implementation results, security analysis, and conclusions.
Reach us at info@study.space