Journal of Cybersecurity and Information Management
JCIM
2690-6775
2769-7851
10.54216/JCIM
https://www.americaspg.com/journals/show/2377
2019
2019
Utilizing Asymmetric Cryptography and Advanced Hashing Algorithms for Securing Communication Channels in IoT Networks Against Cyber Espionage
University of the Witwatersrand Johannesburg, South Africa
Anil
Anil
Department of AI and Big data, Woosong University, Daejeon, South Korea
Saurabh
..
School of Business, Woxsen University, Hyderabad, India
Hemachandran.
..
Associate Engineer, TSYS Global Payments, Pune, India
Shraddhesh
Gadilkar
Senior Lecturer, Federal Polytechnic Bauchi, Nigeria
Zakka Benisemeni
Esther
Pune Institute of Computer Technology Pune, India
Ganesh Shivaji
Pise
University of Prince Edward Island, Canada
Jude
Imuede
This article describes a massive cryptographic scheme that can safeguard IoT communication paths. A combination of algorithms makes the technique operate. Communication security is handled differently by each algorithm. Elliptic Curve Cryptography (ECC), SHA-256 Secure Data Hashing, HMAC Message Authentication, and Merkle Tree Structures Decryption and Verification are used. Ablation is used to determine how each strategy increases security. The paper emphasizes that the algorithms function effectively together, demonstrating their importance for cyberdefense and surveillance. The recommended strategy is evaluated and found to operate better across key parameters.Top of Form
2024
2024
46
59
10.54216/JCIM.130105
https://www.americaspg.com/articleinfo/2/show/2377