Utilizing Asymmetric Cryptography and Advanced Hashing Algorithms for Securing Communication Channels in IoT Networks Against Cyber Espionage
Anil Audumbar Pise 1,*, Saurabh Singh 2, Hemachandran K. 3, Shraddhesh Gadilkar4, Zakka Benisemeni Esther5, Ganesh Shivaji Pise6, Jude Imuede7
1University of the Witwatersrand Johannesburg, South Africa
2Department of AI and Big data, Woosong University, Daejeon, South Korea
3School of Business, Woxsen University, Hyderabad, India
4Associate Engineer, TSYS Global Payments, Pune, India
5Senior Lecturer, Federal Polytechnic Bauchi, Nigeria
6 Pune Institute of Computer Technology Pune, India
7University of Prince Edward Island, Canada
Emails: anil@siatik.com; singh.saurabh@wsu.ac.kr; hemachandran.k@woxsen.edu.in; sgadilkar@tsys.com; benizakka@fptb.edu.ng; gspise@pict.edu; jimuede@upei.ca
Abstract
This article describes a massive cryptographic scheme that can safeguard IoT communication paths. A combination of algorithms makes the technique operate. Communication security is handled differently by each algorithm. Elliptic Curve Cryptography (ECC), SHA-256 Secure Data Hashing, HMAC Message Authentication, and Merkle Tree Structures Decryption and Verification are used. Ablation is used to determine how each strategy increases security. The paper emphasizes that the algorithms function effectively together, demonstrating their importance for cyberdefense and surveillance. The recommended strategy is evaluated and found to operate better across key parameters.
Keywords: Algorithm, Authentication; Communication channels; Cryptographic methods; Cyber threats; Data integrity; ECC (Elliptic Curve Cryptography); Encryption; HMAC (Hash-based Message Authentication Code); IoT networks.