Journal of Cybersecurity and Information Management

Journal DOI

https://doi.org/10.54216/JCIM

Submit Your Paper

2690-6775ISSN (Online) 2769-7851ISSN (Print)

Volume 13 , Issue 1 , PP: 46-59, 2024 | Cite this article as | XML | Html | PDF | Full Length Article

Utilizing Asymmetric Cryptography and Advanced Hashing Algorithms for Securing Communication Channels in IoT Networks Against Cyber Espionage

Anil Audumbar Pise 1 * , Saurabh Singh 2 , Hemachandran K. 3 , Shraddhesh Gadilkar 4 , Zakka Benisemeni Esther 5 , Ganesh Shivaji Pise 6 , Jude Imuede 7

  • 1 University of the Witwatersrand Johannesburg, South Africa - (anil@siatik.com)
  • 2 Department of AI and Big data, Woosong University, Daejeon, South Korea - (singh.saurabh@wsu.ac.kr)
  • 3 School of Business, Woxsen University, Hyderabad, India - (hemachandran.k@woxsen.edu.in)
  • 4 Associate Engineer, TSYS Global Payments, Pune, India - (sgadilkar@tsys.com)
  • 5 Senior Lecturer, Federal Polytechnic Bauchi, Nigeria - (benizakka@fptb.edu.ng)
  • 6 Pune Institute of Computer Technology Pune, India - (gspise@pict.edu)
  • 7 University of Prince Edward Island, Canada - (jimuede@upei.ca)
  • Doi: https://doi.org/10.54216/JCIM.130105

    Received: May 11, 2023 Revised: August 15, 2023 Accepted: December 11, 2023
    Abstract

    This article describes a massive cryptographic scheme that can safeguard IoT communication paths. A combination of algorithms makes the technique operate. Communication security is handled differently by each algorithm. Elliptic Curve Cryptography (ECC), SHA-256 Secure Data Hashing, HMAC Message Authentication, and Merkle Tree Structures Decryption and Verification are used. Ablation is used to determine how each strategy increases security. The paper emphasizes that the algorithms function effectively together, demonstrating their importance for cyberdefense and surveillance. The recommended strategy is evaluated and found to operate better across key parameters.Top of Form

    Keywords :

    Algorithm, Authentication , Communication channels , Cryptographic methods , Cyber threats , Data integrity , ECC (Elliptic Curve Cryptography) , Encryption , HMAC (Hash-based Message Authentication Code) , IoT networks

    References

       [1]       B. Acko, H. Weber, D. Hutzschenreuter, and I. Smith, "Communication and validation of metrological smart data in IoT-networks," Advances in Production Engineering & Management, vol. 15, no. 1, pp. 107–117, 2020. [Online]. Available: Publisher Site | Google Scholar

    [2]       S. A. A. Abir, A. Anwar, J. Choi, and A. S. M. Kayes, "IoT-enabled smart energy grid: applications and challenges," IEEE Access, vol. 9, pp. 50961–50981, 2021. [Online]. Available: Publisher Site | Google Scholar

    [3]       F. Zantalis, G. Koulouras, S. Karabetsos, and D. Kandris, "A review of machine learning and IoT in smart transportation," Future Internet, vol. 11, no. 4, p. 94, 2019. [Online]. Available: Publisher Site | Google Scholar

    [4]       D. Pathak and R. Kashyap, "Neural correlate-based E-learning validation and classification using convolutional and Long Short-Term Memory networks," Traitement du Signal, vol. 40, no. 4, pp. 1457-1467, 2023. [Online]. Available: https://doi.org/10.18280/ts.400414

    [5]       R. Kashyap, "Stochastic Dilated Residual Ghost Model for Breast Cancer Detection," J Digit Imaging, vol. 36, pp. 562–573, 2023. [Online]. Available: https://doi.org/10.1007/s10278-022-00739-z

    [6]       D. Bavkar, R. Kashyap, and V. Khairnar, "Deep Hybrid Model with Trained Weights for Multimodal Sarcasm Detection," in Inventive Communication and Computational Technologies, G. Ranganathan, G. A. Papakostas, and Á. Rocha, Eds. Singapore: Springer, 2023, vol. 757, Lecture Notes in Networks and Systems. [Online]. Available: https://doi.org/10.1007/978-981-99-5166-6_13

    [7]       Z. Fatima, M. H. Tanveer, Z. S. Waseemullah et al., "Production plant and warehouse automation with IoT and industry 5.0," Applied Sciences, vol. 12, no. 4, p. 2053, 2022. [Online]. Available: Publisher Site | Google Scholar

    [8]       M. A. Almaiah, F. Hajjej, A. Ali, M. F. Pasha, and O. Almomani, "A novel hybrid trustworthy decentralized authentication and data preservation model for digital healthcare IoT based CPS," Sensors, vol. 22, no. 4, p. 1448, 2022. [Online]. Available: Publisher Site | Google Scholar

    [9]       R. S. Sinha, Y. Wei, and S. H. Hwang, "A survey on LPWA technology: LoRa and NB-IoT," Ict Express, vol. 3, no. 1, pp. 14–21, 2017. [Online]. Available: Publisher Site | Google Scholar

    [10]    N. M. Karie, N. M. Sahri, W. Yang, C. Valli, and V. R. Kebande, "A review of security standards and frameworks for IoT-based smart environments," IEEE Access, vol. 9, pp. 121975–121995, 2021. [Online]. Available: Publisher Site | Google Scholar

    [11]    J. G. Kotwal, R. Kashyap, and P. M. Shafi, "Artificial Driving based EfficientNet for Automatic Plant Leaf Disease Classification," Multimed Tools Appl, 2023. [Online]. Available: https://doi.org/10.1007/s11042-023-16882-w

    [12]    V. Roy et al., “Detection of sleep apnea through heart rate signal using Convolutional Neural Network,” International Journal of Pharmaceutical Research, vol. 12, no. 4, pp. 4829-4836, Oct-Dec 2020.

    [13]    R. Kashyap, "Machine Learning, Data Mining for IoT-Based Systems," in Research Anthology on Machine Learning Techniques, Methods, and Applications, Information Resources Management Association, Ed. IGI Global, 2022, pp. 447-471. [Online]. Available: https://doi.org/10.4018/978-1-6684-6291-1.ch025

    [14]    J. Long and X. Su, "Anonymous chaotic-based identity authentication protocol in IoT," International Journal of Embedded Systems, vol. 14, no. 2, pp. 194–200, 2021. [Online]. Available: Publisher Site | Google Scholar

    [15]    Y. Zhou, T. Liu, F. Tang, and M. Tinashe, "An unlinkable authentication scheme for distributed IoT application," IEEE Access, vol. 7, pp. 14757–14766, 2019. [Online]. Available: Publisher Site | Google Scholar

    [16]    Y. Zhao, C. Lian, X. Zhang, X. Sha, G. Shi, and W. J. Li, "Wireless IoT motion-recognition rings and a paper keyboard," IEEE Access, vol. 7, pp. 44514–44524, 2019. [Online]. Available: Publisher Site | Google Scholar

    [17]    H. P. Sahu and R. Kashyap, "FINE_DENSEIGANET: Automatic medical image classification in chest CT scan using Hybrid Deep Learning Framework," International Journal of Image and Graphics [Preprint], 2023. [Online]. Available: https://doi.org/10.1142/s0219467825500044

    [18]    S. Stalin, V. Roy, P. K. Shukla, A. Zaguia, M. M. Khan, P. K. Shukla, A. Jain, "A Machine Learning-Based Big EEG Data Artifact Detection and Wavelet-Based Removal: An Empirical Approach," Mathematical Problems in Engineering, vol. 2021, Article ID 2942808, 11 pages, 2021. [Online]. Available: https://doi.org/10.1155/2021/2942808

    [19]    J. P. Howard and M. E. Vachino, "Blockchain compliance with federal cryptographic information-processing standards," IEEE Security & Privacy, vol. 18, no. 1, pp. 65–70, 2020. [Online]. Available: Publisher Site | Google Scholar

    [20]    W. Tushar, T. K. Saha, C. Yuen, D. Smith, and H. V. Poor, "Peer-to-peer trading in electricity networks: an overview," IEEE Transactions on Smart Grid, vol. 11, no. 4, pp. 3185–3200, 2020. [Online]. Available: Publisher Site | Google Scholar

    [21]     D. Minoli and B. Occhiogrosso, "Blockchain mechanisms for IoT security," Internet of Things, vol. 1-2, pp. 1–13, 2018. [Online]. Available: Publisher Site | Google Scholar

    Cite This Article As :
    Audumbar, Anil. , Singh, Saurabh. , K., Hemachandran. , Gadilkar, Shraddhesh. , Benisemeni, Zakka. , Shivaji, Ganesh. , Imuede, Jude. Utilizing Asymmetric Cryptography and Advanced Hashing Algorithms for Securing Communication Channels in IoT Networks Against Cyber Espionage. Journal of Cybersecurity and Information Management, vol. , no. , 2024, pp. 46-59. DOI: https://doi.org/10.54216/JCIM.130105
    Audumbar, A. Singh, S. K., H. Gadilkar, S. Benisemeni, Z. Shivaji, G. Imuede, J. (2024). Utilizing Asymmetric Cryptography and Advanced Hashing Algorithms for Securing Communication Channels in IoT Networks Against Cyber Espionage. Journal of Cybersecurity and Information Management, (), 46-59. DOI: https://doi.org/10.54216/JCIM.130105
    Audumbar, Anil. Singh, Saurabh. K., Hemachandran. Gadilkar, Shraddhesh. Benisemeni, Zakka. Shivaji, Ganesh. Imuede, Jude. Utilizing Asymmetric Cryptography and Advanced Hashing Algorithms for Securing Communication Channels in IoT Networks Against Cyber Espionage. Journal of Cybersecurity and Information Management , no. (2024): 46-59. DOI: https://doi.org/10.54216/JCIM.130105
    Audumbar, A. , Singh, S. , K., H. , Gadilkar, S. , Benisemeni, Z. , Shivaji, G. , Imuede, J. (2024) . Utilizing Asymmetric Cryptography and Advanced Hashing Algorithms for Securing Communication Channels in IoT Networks Against Cyber Espionage. Journal of Cybersecurity and Information Management , () , 46-59 . DOI: https://doi.org/10.54216/JCIM.130105
    Audumbar A. , Singh S. , K. H. , Gadilkar S. , Benisemeni Z. , Shivaji G. , Imuede J. [2024]. Utilizing Asymmetric Cryptography and Advanced Hashing Algorithms for Securing Communication Channels in IoT Networks Against Cyber Espionage. Journal of Cybersecurity and Information Management. (): 46-59. DOI: https://doi.org/10.54216/JCIM.130105
    Audumbar, A. Singh, S. K., H. Gadilkar, S. Benisemeni, Z. Shivaji, G. Imuede, J. "Utilizing Asymmetric Cryptography and Advanced Hashing Algorithms for Securing Communication Channels in IoT Networks Against Cyber Espionage," Journal of Cybersecurity and Information Management, vol. , no. , pp. 46-59, 2024. DOI: https://doi.org/10.54216/JCIM.130105