Utilizing Asymmetric Cryptography and Advanced Hashing Algorithms for Securing Communication Channels in IoT Networks Against Cyber Espionage


Anil Audumbar Pise 1,*, Saurabh Singh 2, Hemachandran K. 3, Shraddhesh Gadilkar4, Zakka Benisemeni  Esther5, Ganesh Shivaji Pise6, Jude Imuede7

1University of the Witwatersrand Johannesburg, South Africa

2Department of AI and Big data, Woosong University, Daejeon, South Korea

3School of Business, Woxsen University, Hyderabad, India

4Associate Engineer, TSYS Global Payments, Pune, India

5Senior Lecturer, Federal Polytechnic Bauchi, Nigeria

6 Pune Institute of Computer Technology Pune, India

7University of  Prince Edward Island, Canada

 

Emails: anil@siatik.com; singh.saurabh@wsu.ac.kr; hemachandran.k@woxsen.edu.in; sgadilkar@tsys.com; benizakka@fptb.edu.ng; gspise@pict.edu; jimuede@upei.ca

 


 


 


Abstract

 

This article describes a massive cryptographic scheme that can safeguard IoT communication paths. A combination of algorithms makes the technique operate. Communication security is handled differently by each algorithm. Elliptic Curve Cryptography (ECC), SHA-256 Secure Data Hashing, HMAC Message Authentication, and Merkle Tree Structures Decryption and Verification are used. Ablation is used to determine how each strategy increases security. The paper emphasizes that the algorithms function effectively together, demonstrating their importance for cyberdefense and surveillance. The recommended strategy is evaluated and found to operate better across key parameters.Top of Form

 

Keywords: Algorithm, Authentication; Communication channels; Cryptographic methods; Cyber threats; Data integrity; ECC (Elliptic Curve Cryptography); Encryption; HMAC (Hash-based Message Authentication Code); IoT networks.