Hybrid Cryptographic End-to-End Encryption Method for Protecting IoT Devices Against MitM Attacks

End-to-End Encryption (E2EE) plays an essential role in safeguarding user privacy and protecting sensitive data across various communication platforms, including messaging applications, email services, and Internet of Things (IoT) devices. This paper presents a Hybrid Cryptography-Based E2EE method...

Full description

Saved in:
Bibliographic Details
Main Authors: N. Karmous, M. Hizem, Y. Ben Dhiab, M. Ould-Elhassen Aoueileyine, R. Bouallegue, N. Youssef
Format: Article
Language:English
Published: Spolecnost pro radioelektronicke inzenyrstvi 2024-12-01
Series:Radioengineering
Subjects:
Online Access:https://www.radioeng.cz/fulltexts/2024/24_04_0583_0592.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1849762292414021632
author N. Karmous
M. Hizem
Y. Ben Dhiab
M. Ould-Elhassen Aoueileyine
R. Bouallegue
N. Youssef
author_facet N. Karmous
M. Hizem
Y. Ben Dhiab
M. Ould-Elhassen Aoueileyine
R. Bouallegue
N. Youssef
author_sort N. Karmous
collection DOAJ
description End-to-End Encryption (E2EE) plays an essential role in safeguarding user privacy and protecting sensitive data across various communication platforms, including messaging applications, email services, and Internet of Things (IoT) devices. This paper presents a Hybrid Cryptography-Based E2EE method implemented on a Software Defined Networking (SDN) infrastructure, to strengthen bidirectional data security between hosts and IoT devices via the non-secure Message Queuing Telemetry Transport (MQTT) port. By addressing the threat of Man-in-the-Middle (MitM) attacks, the proposed system ensures that only authorized users can decrypt transmitted messages. This paper thoroughly analyzes the implementation and advantages of our Hybrid Cryptography-Based E2EE method by comparing RSA and ECC encryption techniques. ECC-256 is favored for key generation, owing to its high efficiency and speed, measured at 0.4009 ms. Additionally, through a comparison of RSA, AES, and ChaCha20 algorithms, AES-256 emerges as the optimal encryption choice, demonstrating the fastest encryption and decryption times for publishing 0.2758 ms and 0.1781 ms, respectively and for subscribing, with encryption at 0.2542 ms and decryption at 0.1577 ms. Along with its minimal packet size and low resource consumption, our proposed Hybrid Cryptography-Based E2EE method, implemented on SDN infrastructure, validate it's effectiveness in securing digital communications within SDN environments compared to existing solutions.
format Article
id doaj-art-f6bfd2b6ba104baf913fc2426e549ab8
institution DOAJ
issn 1210-2512
language English
publishDate 2024-12-01
publisher Spolecnost pro radioelektronicke inzenyrstvi
record_format Article
series Radioengineering
spelling doaj-art-f6bfd2b6ba104baf913fc2426e549ab82025-08-20T03:05:46ZengSpolecnost pro radioelektronicke inzenyrstviRadioengineering1210-25122024-12-01334583592Hybrid Cryptographic End-to-End Encryption Method for Protecting IoT Devices Against MitM AttacksN. KarmousM. HizemY. Ben DhiabM. Ould-Elhassen AoueileyineR. BouallegueN. YoussefEnd-to-End Encryption (E2EE) plays an essential role in safeguarding user privacy and protecting sensitive data across various communication platforms, including messaging applications, email services, and Internet of Things (IoT) devices. This paper presents a Hybrid Cryptography-Based E2EE method implemented on a Software Defined Networking (SDN) infrastructure, to strengthen bidirectional data security between hosts and IoT devices via the non-secure Message Queuing Telemetry Transport (MQTT) port. By addressing the threat of Man-in-the-Middle (MitM) attacks, the proposed system ensures that only authorized users can decrypt transmitted messages. This paper thoroughly analyzes the implementation and advantages of our Hybrid Cryptography-Based E2EE method by comparing RSA and ECC encryption techniques. ECC-256 is favored for key generation, owing to its high efficiency and speed, measured at 0.4009 ms. Additionally, through a comparison of RSA, AES, and ChaCha20 algorithms, AES-256 emerges as the optimal encryption choice, demonstrating the fastest encryption and decryption times for publishing 0.2758 ms and 0.1781 ms, respectively and for subscribing, with encryption at 0.2542 ms and decryption at 0.1577 ms. Along with its minimal packet size and low resource consumption, our proposed Hybrid Cryptography-Based E2EE method, implemented on SDN infrastructure, validate it's effectiveness in securing digital communications within SDN environments compared to existing solutions.https://www.radioeng.cz/fulltexts/2024/24_04_0583_0592.pdfsoftware-defined networking (sdn)cyber securityman-in-the-middle (mitm)end-to-end encryptioninternet of things (iot)
spellingShingle N. Karmous
M. Hizem
Y. Ben Dhiab
M. Ould-Elhassen Aoueileyine
R. Bouallegue
N. Youssef
Hybrid Cryptographic End-to-End Encryption Method for Protecting IoT Devices Against MitM Attacks
Radioengineering
software-defined networking (sdn)
cyber security
man-in-the-middle (mitm)
end-to-end encryption
internet of things (iot)
title Hybrid Cryptographic End-to-End Encryption Method for Protecting IoT Devices Against MitM Attacks
title_full Hybrid Cryptographic End-to-End Encryption Method for Protecting IoT Devices Against MitM Attacks
title_fullStr Hybrid Cryptographic End-to-End Encryption Method for Protecting IoT Devices Against MitM Attacks
title_full_unstemmed Hybrid Cryptographic End-to-End Encryption Method for Protecting IoT Devices Against MitM Attacks
title_short Hybrid Cryptographic End-to-End Encryption Method for Protecting IoT Devices Against MitM Attacks
title_sort hybrid cryptographic end to end encryption method for protecting iot devices against mitm attacks
topic software-defined networking (sdn)
cyber security
man-in-the-middle (mitm)
end-to-end encryption
internet of things (iot)
url https://www.radioeng.cz/fulltexts/2024/24_04_0583_0592.pdf
work_keys_str_mv AT nkarmous hybridcryptographicendtoendencryptionmethodforprotectingiotdevicesagainstmitmattacks
AT mhizem hybridcryptographicendtoendencryptionmethodforprotectingiotdevicesagainstmitmattacks
AT ybendhiab hybridcryptographicendtoendencryptionmethodforprotectingiotdevicesagainstmitmattacks
AT mouldelhassenaoueileyine hybridcryptographicendtoendencryptionmethodforprotectingiotdevicesagainstmitmattacks
AT rbouallegue hybridcryptographicendtoendencryptionmethodforprotectingiotdevicesagainstmitmattacks
AT nyoussef hybridcryptographicendtoendencryptionmethodforprotectingiotdevicesagainstmitmattacks