IJWMT Vol. 15, No. 3, 8 Jun. 2025
Cover page and Table of Contents: PDF (size: 792KB)
PDF (792KB), PP.66-77
Views: 0 Downloads: 0
Encoding, Decoding, Internet, Cryptography, Plant
Internet of Things (IoT) is the current trends in tracking the variation of process variables in plant operations. The security threats and security issues continues to rise due to the wide usage of internet. The hybrid cryptography is proposed that involves symmetric AES, asymmetric RSA and hash functions all together enhance the security. The key length of this proposed symmetric AES encryption is 128-bit, RSA public key encryption is 1024-bit and 128-bit message digest is generated from the hash algorithm. It offers low latency in executing the proposed encoding and decoding algorithm. It is developed and verified in real-time environment using embedded system with internet of things. It assures data security and allows only authorized parties to monitor the plant parameters through the wireless networks. It preserves the intruders from gathering and modifying the sensitive plant information. It is suitable for protecting the plant parameters over the wide range of industrial applications.
J. S. Prasath, "Implementation of Internet of Things Based Data Security Using Hybrid Cryptography", International Journal of Wireless and Microwave Technologies(IJWMT), Vol.15, No.3, pp. 66-77, 2025. DOI:10.5815/ijwmt.2025.03.05
[1]Fatima Alwahedi, Alyazia Aldhaheri, Mohamed Amine Ferrag, Ammar Battah, Norbert Tihanyi, “Machine learning techniques for IoT security: Current research and future vision with generative AI and large language models,” Internet of Things and Cyber-Physical Systems, Vol. 4, pp. 167-185, 2024
[2]Shamshair Ali, Rubina Ghazal, Nauman Qadeer, Oumaima Saidani, Fatimah Alhayan, Anum Masood, Rabia Saleem, Muhammad Attique Khan, Deepak Gupta, “A novel approach of botnet detection using hybrid deep learning for enhancing security in IoT networks,” Alexandria Engineering Journal, Vol. 103, pp. 88-97, 2024.
[3]Danish Javeed, Muhammad Shahid Saeed, Ijaz Ahmad, Muhammad Adil, Prabhat Kumar, A.K.M. Najmul Islam, “Quantum-empowered federated learning and 6G wireless networks for IoT security: Concept, challenges and future directions,” Future Generation Computer Systems, Vol. 160, pp. 577-597, 2024.
[4]Vinay Gugueoth, Sunitha Safavat, Sachin Shetty, “Security of Internet of Things (IoT) using federated learning and deep learning Recent advancements, issues and prospects,” ICT Express, Vol. 9, No. 5, pp. 941-960, 2023.
[5]J.S.Prasath, U. Ramachandraiah, S. Prabhuraj, G.Muthukumaran, “Internet of Things based Hybrid Cryptography for Process Data Security,” Journal of Mathematical and Computational Science, Vol. 10, no.6, pp. 2208-2232, 2020.
[6]J.S.Prasath, U.Ramachandraiah, G.Muthukumaran, “Modified Hardware Security Algorithms for Process Industries using Internet of Things,” Journal of Applied Security Research, pp. 1-14, 2020.
[7]J.S.Prasath, U.Ramachandraiah, “Modified Asymmetric and Hash Algorithms for Internet Enabled Industrial Automation,” Test Engineering and Management Journal, Vol. 83, pp. 7431-7444, 2020.
[8]J.S. Prasath, S. Jayakumar, K. Karthikeyan, “Real-Time Implementation for Secure monitoring of Waste-Water Treatment Plants using Internet of Things,” International Journal of Innovative Technology and Exploring Engineering., Vol. 9, no. 1, pp. 2997-3002, 2019.
[9]Aniruddha Bhattacharjya, Xiaofeng Zhong, Jing Wang, “An End-to-End User Two-way Authenticated Double Encrypted Messaging Scheme based on Hybrid RSA for the future Internet architectures,” International Journal of Information and Computer Security, Vol. 10, No. 1, pp. 63-79, 2018.
[10]Mauro Conti, Ali Dehghantanha, Katrin Franke, Steve Watson, “Internet of Things security and forensics: Challenges and opportunities,” Future Generation Computer Systems, Vol. 78, pp. 544-546, 2018.
[11]Mahmoud Ammar, Giovanni Russello, BrunoCrispo, “Internet of Things: A survey on the security of IoT frameworks,” Journal of Information Security and Applications, Vol. 38, pp. 8-27, 2018.
[12]Arbia Riahisfar, Enrico Natalizio, Yacine Challa, Zied Chtourou, “A roadmap for security challenges in the Internet of Things,” Digital Communications and Networks, Vol. 4, pp. 118-137, 2018.
[13]Minhaj Ahmad Khan, Khaled Salah, “IoT security: Review, block chain solutions, and open challenges,” Future Generation Computer Systems, Vol. 82, pp. 395-411, 2018.
[14]Kewei Sha, WeiWei, T.AndrewYang, Zhiwei Wang, Weisong Shi, “On Security Challenges and open issues in Internet of Things,” Future Generation Computer Systems, Vol. 83, 326-337, 2018.
[15]Chunyong Yin, Jinwen, Xi, Ruxia, Sun, Jin, Wang, “Location Privacy Protection based on Differential Privacy Strategy for Big Data in Industrial Internet of Things,” IEEE Transactions on Industrial Informatics, Vol. 14, No. 8, 3628-3636, 2018.
[16]Fadele Ayotunde Alaba, Ibrahim Abaker Targio Hashem, “Internet of Things security: A Survey,” Journal of Network and Computer Applications, Vol. 88, pp. 10-28, 2017.
[17]Sikhar Patranabis, Abhishek Chakraborty, Debdeep Mukhopadhyay, Partha Pratim Chakrabarti, “Fault Space Transformation: A Generic Approach to Counter Differential Fault Analysis and Differential Fault Intensity Analysis on AES-Like Block Ciphers,” IEEE Transactions on Information Forensics and Security, Vol. 12, Issue 5, pp. 1092-1102, 2017.
[18]Aafaf Ouaddah, HajarMousannif, AnasAbou Elkalama, Abdellah Ait Ouahman, “Access control in the Internet of Things: Big challenges and new opportunities,” Computer Networks, vol. 112, 237-262, 2017.
[19]Hamed Hellaoui, Mouloud Koudil, Abdelmadjid Bouabdallah, “Energy-Efficient mechanisms in Security of the Internet of things: A Survey” Computer Networks, Vol. 127, 173-189, 2017.
[20]Sandeep K. Sood, “Advanced dynamic Identity-based Authentication Protocol using Smart Card,” International Journal of Information and Computer Security, Vol. 8, No. 1, pp. 11-33, 2016.
[21]Lukas Malina, Jan Hajny, Radek Fujdiak, Jiri Hosek, “On perspective of Security and Privacy-preserving solutions in the Internet of Things,” Computer Networks, Vol. 102, 83-95, 2016.
[22]Puneet Kumar, Shashi B. Rana, “Development of modified AES algorithm for Data Security,” Journal of Optik, Vol. 127, Issue 4, 2341-2345, 2016.
[23]Mohamed Elhoseny, Hamdy Elminir, Alaa Riad, Xiaohui Yuan, “A secure data routing scheme for WSN using Elliptic Curve Cryptography and homomorphic encryption,” Journal of King Saud University - Computer and Information Sciences, Vol. 28, Issue 3, pp. 262-275, 2016.
[24]Rakesh Kumar, Geetu Mahajan, “A novel framework for secure file transmission using modified AES and MD5 algorithms,” International Journal of Information and Computer Security, Vol. 7, No. 2, pp. 91-112, 2015.
[25]Jorge Granjal, Edmundo Monteiro, and Jorge Sa Silva, “Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues,” IEEE Communication Surveys and Tutorials, Vol. 17, No. 3, pp. 1294-1312, 2015.
[26]Wei Jiang, Yue Ma, Nan Sang, Ziguo Zhong, “Dynamic Security management for real-time embedded applications in Industrial Networks”, Computers and Electrical Engineering, Vol. 41, pp. 86-101, 2015.
[27]RawyaRizk, YasminAlkady, “Two-phase hybrid cryptography algorithm for Wireless Sensor Networks,” Journal of Electrical Systems and Information Technology, Vol. 2, Issue 3, pp. 296-313, 2015.
[28]Prakash Kuppuswamy, Saeed Q.Y. Al-Khalidi, “Hybrid Encryption/Decryption technique using new Public Key and Symmetric Key algorithm,” International Journal of Information and Computer Security, Vol. 6, No. 4, pp. 372-382, 2014.
[29]Rodrigo Roman, Jianying Zhou, Javier Lopez, “On the features and challenges of Security and Privacy in distributed Internet of Things,” Computer Networks, Vol. 57, 226-2279, 2013.
[30]Wei Jiang, ZhenlinGuo, Yue Ma, Nan Sang, “Measurement-based research on Cryptographic Algorithms for Embedded real-time systems,” Journal of Systems Architecture, Vol. 59, 1394-1404, 2013.
[31]ChalapathiRao, Santhi Rani, Lavanya, “Monitoring and Protection of Oil and Gas Condition in Industrial Using Wireless Sensor Networks,” International Journal of Electronics Communication and Computer Technology, Vol. 2, No. 5, 213-218, 2012.
[32]Hai Lin, YunsiFei, Xuan Guan, Zhijie Jerry Shi, “Architectural Enhancement and System Software Support for Program Code Integrity Monitoring in Application-Specific Instruction-Set Processors”, IEEE Transactions on Very Large Scale Integration Systems, Vol. 18, pp. 1519-1532, 2010.