Internet of things encryption technology combining elliptic curve cryptosystem, hash function, and RFID-based authentication

Abstract As an important means of connecting the physical world and the digital world, the reliability and security of the Internet of Things network are key issues. To raise the security of Internet of Things data, a research proposes an encryption technique that combines elliptic curve cryptosyste...

Full description

Saved in:
Bibliographic Details
Main Author: Bin Zheng
Format: Article
Language:English
Published: Springer 2025-04-01
Series:Discover Internet of Things
Subjects:
Online Access:https://doi.org/10.1007/s43926-025-00145-1
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1849709797758205952
author Bin Zheng
author_facet Bin Zheng
author_sort Bin Zheng
collection DOAJ
description Abstract As an important means of connecting the physical world and the digital world, the reliability and security of the Internet of Things network are key issues. To raise the security of Internet of Things data, a research proposes an encryption technique that combines elliptic curve cryptosystem and hash functions. In this process, the radio frequency identification system is used as the central element for data encryption, with the elliptic curve cryptosystem employed to secure the transmitted data. Non-adjacent scalar representations are used to reduce the expected running time of scalar multiplication, and a bidirectional authentication protocol for Internet of Things encryption is designed using Hash functions. The experimental results showed that in the communication overhead test, the research method had a communication overhead of 242 bits when the Hash function output length was 40 bits in server communication. When analyzing the success rate of intercepting abnormal data access behavior, the research method achieved a success rate of 99.1% when the host file size was 100 Kb. In the analysis of scalar multiplication operation time, the research method only took 18 ms when the output length of the Hash function reached 340bits in a local area network environment. This illustrates that the raised method has a good encryption effect on the Internet of Things and can effectively ensure the security of Internet of Things communication. The research is expected to provide certain technical support for the development of the Internet of Things.
format Article
id doaj-art-3b358630eeb142ba9d626c69711ae731
institution DOAJ
issn 2730-7239
language English
publishDate 2025-04-01
publisher Springer
record_format Article
series Discover Internet of Things
spelling doaj-art-3b358630eeb142ba9d626c69711ae7312025-08-20T03:15:09ZengSpringerDiscover Internet of Things2730-72392025-04-015111410.1007/s43926-025-00145-1Internet of things encryption technology combining elliptic curve cryptosystem, hash function, and RFID-based authenticationBin Zheng0Affiliated College, Beijing Open UniversityAbstract As an important means of connecting the physical world and the digital world, the reliability and security of the Internet of Things network are key issues. To raise the security of Internet of Things data, a research proposes an encryption technique that combines elliptic curve cryptosystem and hash functions. In this process, the radio frequency identification system is used as the central element for data encryption, with the elliptic curve cryptosystem employed to secure the transmitted data. Non-adjacent scalar representations are used to reduce the expected running time of scalar multiplication, and a bidirectional authentication protocol for Internet of Things encryption is designed using Hash functions. The experimental results showed that in the communication overhead test, the research method had a communication overhead of 242 bits when the Hash function output length was 40 bits in server communication. When analyzing the success rate of intercepting abnormal data access behavior, the research method achieved a success rate of 99.1% when the host file size was 100 Kb. In the analysis of scalar multiplication operation time, the research method only took 18 ms when the output length of the Hash function reached 340bits in a local area network environment. This illustrates that the raised method has a good encryption effect on the Internet of Things and can effectively ensure the security of Internet of Things communication. The research is expected to provide certain technical support for the development of the Internet of Things.https://doi.org/10.1007/s43926-025-00145-1Elliptic curve cryptosystemInternet of ThingsEncryptionHash functionRadio frequency identification
spellingShingle Bin Zheng
Internet of things encryption technology combining elliptic curve cryptosystem, hash function, and RFID-based authentication
Discover Internet of Things
Elliptic curve cryptosystem
Internet of Things
Encryption
Hash function
Radio frequency identification
title Internet of things encryption technology combining elliptic curve cryptosystem, hash function, and RFID-based authentication
title_full Internet of things encryption technology combining elliptic curve cryptosystem, hash function, and RFID-based authentication
title_fullStr Internet of things encryption technology combining elliptic curve cryptosystem, hash function, and RFID-based authentication
title_full_unstemmed Internet of things encryption technology combining elliptic curve cryptosystem, hash function, and RFID-based authentication
title_short Internet of things encryption technology combining elliptic curve cryptosystem, hash function, and RFID-based authentication
title_sort internet of things encryption technology combining elliptic curve cryptosystem hash function and rfid based authentication
topic Elliptic curve cryptosystem
Internet of Things
Encryption
Hash function
Radio frequency identification
url https://doi.org/10.1007/s43926-025-00145-1
work_keys_str_mv AT binzheng internetofthingsencryptiontechnologycombiningellipticcurvecryptosystemhashfunctionandrfidbasedauthentication