Internet of things encryption technology combining elliptic curve cryptosystem, hash function, and RFID-based authentication

Abstract As an important means of connecting the physical world and the digital world, the reliability and security of the Internet of Things network are key issues. To raise the security of Internet of Things data, a research proposes an encryption technique that combines elliptic curve cryptosyste...

Full description

Saved in:
Bibliographic Details
Main Author: Bin Zheng
Format: Article
Language:English
Published: Springer 2025-04-01
Series:Discover Internet of Things
Subjects:
Online Access:https://doi.org/10.1007/s43926-025-00145-1
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Abstract As an important means of connecting the physical world and the digital world, the reliability and security of the Internet of Things network are key issues. To raise the security of Internet of Things data, a research proposes an encryption technique that combines elliptic curve cryptosystem and hash functions. In this process, the radio frequency identification system is used as the central element for data encryption, with the elliptic curve cryptosystem employed to secure the transmitted data. Non-adjacent scalar representations are used to reduce the expected running time of scalar multiplication, and a bidirectional authentication protocol for Internet of Things encryption is designed using Hash functions. The experimental results showed that in the communication overhead test, the research method had a communication overhead of 242 bits when the Hash function output length was 40 bits in server communication. When analyzing the success rate of intercepting abnormal data access behavior, the research method achieved a success rate of 99.1% when the host file size was 100 Kb. In the analysis of scalar multiplication operation time, the research method only took 18 ms when the output length of the Hash function reached 340bits in a local area network environment. This illustrates that the raised method has a good encryption effect on the Internet of Things and can effectively ensure the security of Internet of Things communication. The research is expected to provide certain technical support for the development of the Internet of Things.
ISSN:2730-7239