Journal of Cybersecurity and Information Management JCIM 2690-6775 2769-7851 10.54216/JCIM https://www.americaspg.com/journals/show/2377 2019 2019 Utilizing Asymmetric Cryptography and Advanced Hashing Algorithms for Securing Communication Channels in IoT Networks Against Cyber Espionage University of the Witwatersrand Johannesburg, South Africa Anil Anil Department of AI and Big data, Woosong University, Daejeon, South Korea Saurabh .. School of Business, Woxsen University, Hyderabad, India Hemachandran. .. Associate Engineer, TSYS Global Payments, Pune, India Shraddhesh Gadilkar Senior Lecturer, Federal Polytechnic Bauchi, Nigeria Zakka Benisemeni Esther Pune Institute of Computer Technology Pune, India Ganesh Shivaji Pise University of Prince Edward Island, Canada Jude Imuede This article describes a massive cryptographic scheme that can safeguard IoT communication paths. A combination of algorithms makes the technique operate. Communication security is handled differently by each algorithm. Elliptic Curve Cryptography (ECC), SHA-256 Secure Data Hashing, HMAC Message Authentication, and Merkle Tree Structures Decryption and Verification are used. Ablation is used to determine how each strategy increases security. The paper emphasizes that the algorithms function effectively together, demonstrating their importance for cyberdefense and surveillance. The recommended strategy is evaluated and found to operate better across key parameters.Top of Form 2024 2024 46 59 10.54216/JCIM.130105 https://www.americaspg.com/articleinfo/2/show/2377