Skip to main content

Advertisement

Log in

Securing the perceptual layer of E-payment-based internet of things devices using elliptic curve cryptography over binary field

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

The perceptual layer of the Internet of Things has some security threats, such as denial of service, botnet, and falsification attacks. The existing security schemes are the symmetric polynomial concept, privacy-preserving communication protocols for IoT applications, block chain-based secure IoT systems, and mutual authentication systems for wearable technology, which cannot be directly implemented on the perceptual layer of the IoT device. This study presents a binary field elliptic curve cryptographic (ECC) algorithm to secure the perceptual layer of IoT-enabled electronic payment devices. The procedure includes device registration, authentication for key agreement and unlocking, and the communication phase. Some parameters were used to lock the node, while identification tags were used to identify an authentic node. Nodes were generated using point addition and point doubling. The processing, storage capacity, and transaction speed were directly evaluated using contactless devices with the binary field ECC security protocol. The Jitter result reveals that the value did not deviate from normal for both devices. The results time also showed that it is computationally efficient to use ECC over the binary field for the security of the perceptual layer with a significant contribution using device identification tags and point multiplication to protect against falsification attacks, node locking to combat DDoS and key exchange with node unlocking for defense against botnet attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Algorithm 1
Algorithm 2
Algorithm 3
Algorithm 4
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

Data availability

All the datasets used were generated from the experiments and implementation of the security scheme using all the devices, as referred to in this work.

References

  1. Aarika K, Bouhlal M, Abdelouahid RA, Elfilali S, Benlahmar E (2020) Perception layer security in the Internet of Things. Procedia Computer Science 175:591–596

    Article  Google Scholar 

  2. Almusaylim ZA, Zaman N (2019) A review on smart home present state and challenges: linked to context-awareness internet of things (IoT). Wireless Netw 25(6):3193–3204

    Article  Google Scholar 

  3. Kumar D, Grover HS (2019) A secure authentication protocol for wearable devices environment using ECC. J Inf Secur Appl 47:8–15

    Google Scholar 

  4. Kumar D, Jain S, Khan A, Pathak PS (2020) An improved lightweight anonymous user authenticated session key exchange scheme for Internet of Things. J Ambient Intell Human Comput 14(5):1–17

    Google Scholar 

  5. Ferrag MA, Maglaras LA, Janicke H, Jiang J, Shu L (2017) Authentication protocols for Internet of Things: a comprehensive survey. Secur Commun Netw 2017:1–41

    Article  Google Scholar 

  6. Salim MM, Rathore S, Park JH (2019) Distributed denial of service attacks and its defenses in IOT: a survey. J Supercomput 76:5320–5363

    Article  Google Scholar 

  7. Shouran Z, Ashari A, Priyambodo T (2019) Internet of things (IoT) of smart home: privacy and security. Int J Comput Appl 182(39):3–8

    Google Scholar 

  8. Lee JY, Lee J (2021) Current research trends in IoT security: a systematic mapping study. Mob Inf Syst 2021:1–25

    Google Scholar 

  9. Cao J, Yu P, Ma M, Gao W (2019) Fast authentication and data transfer scheme for massive NB-IoT devices in 3GPP 5G network. IEEE Internet Things J 6(2):1561–1575

    Article  Google Scholar 

  10. Alaba FA, Othman M, Hashem IAT, Alotaibi F (2017) Internet of Things security: A survey. J Netw Comput Appl 88:10–28

    Article  Google Scholar 

  11. Usman M, Ahmed I, Aslam MI, Khan S, Shah UA (2017) SIT: a lightweight encryption algorithm for secure internet of things. arXiv preprint arXiv:1704.08688

  12. Lin J, Yu W, Zhang N, Yang X, Zhang H, Zhao W (2017) A survey on internet of things: architecture, enabling technologies, security and privacy, and applications. IEEE Internet Things J 4(5):1125–1142

    Article  Google Scholar 

  13. Song T, Li R, Mei B, Yu J, Xing X, Cheng X (2017) A privacy preserving communication protocol for IoT applications in smart homes. IEEE Internet Things J 4(6):1844–1852

    Article  Google Scholar 

  14. Yang A, Hancke GP (2017) RFID and contactless technology. In: Keith M, Konstantinos M (eds) Smart Cards, Tokens, Security and Applications. Springer, Cham, pp 351–385

    Chapter  Google Scholar 

  15. Neerugatti V, Reddy M, RamaA (2019) Machine Learning Based Technique for Detection of Rank Attack in RPL based Internet of Things Networks. Machine Learning Based Technique for Detection of Rank Attack in RPL based Internet of Things Networks (July 10, 2019). International Journal of Innovative Technology and Exploring Engineering (IJITEE) ISSN, 2278–3075.

  16. Padmashree MG, Mallikarjun JP, Arunalatha JS, Venugopal KR (2021) MEKDA: multilevel ECC Based Key Distribution And Authentication In Internet of Things

  17. Sabrina F, Li N, Sohail S (2022) A blockchain based secure IoT System using device identity management. Sensors 22(19):7535

    Article  Google Scholar 

  18. Kapito B, Nyirenda M, Kim H (2021) Privacy-preserving machine authenticated key agreement for internet of things. Int J Comput Netw Commun 13(2):99–120

    Google Scholar 

  19. Mahmoud C, Aouag S (2019) Security for internet of things: A state of the art on existing protocols and open research issues. In: Proceedings of the 9th International Conference on Information Systems and Technologies (pp. 1–6)

  20. Amin R, Kumar N, Biswas GP, Iqbal R, Chang V (2018) A lightweight authentication protocol for IoT-enabled devices in distributed Cloud Computing environment. Futur Gener Comput Syst 78:1005–1019

    Article  Google Scholar 

  21. Challa S, Das AK, Gope P, Kumar N, Wu F, Vasilakos AV (2020) Design and Analysis of authenticated key agreement scheme in cloud-assisted cyber–physical systems. Futur Gener Comput Syst 108:1267–1286

    Article  Google Scholar 

  22. Li, W., Li, B., Zhao, Y., Wang, P., & Wei, F. (2018). Cryptanalysis and security enhancement of three authentication schemes in wireless sensor networks. Wireless Communications and Mobile Computing2018.

  23. Das AK, Wazid M, Kumar N, Khan MK, Choo KKR, Park Y (2017) Design of secure and lightweight authentication protocol for wearable devices environment. IEEE J Biomed Health Inform 22(4):1310–1322

    Article  Google Scholar 

  24. Kumari A, Kumar V, YahyaAbbasi M, Alam M (2018) The cryptanalysis of a secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers. In: 2018 International Conference on Advances in Computing, Communication Control and Networking (ICACCCN) (pp. 321–325). IEEE

  25. Lawal OM, Vincent OR, Agboola AAA, Folorunso O (2021) An improved hybrid scheme for e-payment security using elliptic curve cryptography. Int J Inf Technol 13(1):139–153

    Google Scholar 

  26. Chaudhary R, Jindal A, Aujla GS, Kumar N, Das AK, Saxena N (2018) Lscsh: Lattice-based secure cryptosystem for smart healthcare in smart cities environment. IEEE Commun Mag 56(4):24–32

    Article  Google Scholar 

  27. Ali I, Sabir S, Ullah Z (2019) Internet of things security, device authentication and access control: a review. arXiv preprint arXiv:1901.07309

  28. Bhushan B, Khamparia A, Sagayam KM, Sharma SK, Ahad MA, Debnath NC (2020) Blockchain for smart cities: A review of architectures, integration trends and future research directions. Sustain Cities Soc 61:102360

    Article  Google Scholar 

  29. Wu G (2021) Monitoring System of Key Technical Features of Male Tennis Players Based on Internet of Things Security Technology. Wireless Communications and Mobile Computing 2021

  30. Rekha S, Thirupathi L, Renikunta S, Gangula R (2021) Study of security issues and solutions in Internet of Things (IoT). Materials Today: Proceedings

  31. Vouzikas A, Gazis A (2021) On the robust multiple objective control with simultaneous pole placement in LMI regions. WSEAS Transactions on Systems 20:272–280

    Article  Google Scholar 

  32. Javed AR, Shahzad F, Ur Rehman S, Zikria YB, Razzak I, Jalil Z, Xu G (2022) Future smart cities requirements, emerging technologies, applications, challenges, and future aspects. Cities 129:103794

    Article  Google Scholar 

  33. Vincent OR, Lawal OM (2018) A key agreement authentication protocol using an improved parallel pollard rho for electronic payment system. J Supercomput 74:1973–1993

    Article  Google Scholar 

  34. Gu Z, Chen H, Xu P, Li Y, Vucetic B (2020) Physical layer authentication for non-coherent massive SIMO-enabled industrial IoT communications. IEEE Trans Inf Forensics Secur 15:3722–3733

    Article  Google Scholar 

  35. Padmashree MG, Arunalatha JS, Venugopal KR (2019) HPAKE: hybrid Precocious Authentication and Key Establishment in IoT. In: 2019 International Carnahan Conference on Security Technology (ICCST) (pp. 1–6). IEEE

  36. Dammak M, Senouci SM, Messous MA, Elhdhili MH, Gransart C (2020) Decentralized lightweight group key management for dynamic access control in IoT environments. IEEE Trans Netw Serv Manage 17(3):1742–1757

    Article  Google Scholar 

  37. Mansour A, Malik KM, Alkaff A, Kanaan H (2020) ALMS: Asymmetric lightweight centralized group key management protocol for VANETs. IEEE Trans Intell Transp Syst 22(3):1663–1678

    Article  Google Scholar 

  38. Qiu J, Fan K, Zhang K, Pan Q, Li H, Yang Y (2019) An efficient multi-message and multi-receiver signcryption scheme for heterogeneous smart mobile IoT. IEEE Access 7:180205–180217

    Article  Google Scholar 

  39. Hameedi SS, Bayat O (2022) Improving IoT data security and integrity using lightweight blockchain dynamic table. Appl Sci 12(18):9377

    Article  Google Scholar 

  40. Bremler-Barr A, Levy H, Yakhini Z (2020) IoT or not: Identifying IoT devices in a short time scale. In NOMS 2020–2020 IEEE/IFIP Network Operations and Management Symposium (pp. 1–9). IEEE

  41. Devi Kala Rathinam D, Sherin J, Santhiya Grace A (2018) Internet of Things (IoT) based smart environment and its applications. Int J Trend Sci Res Dev (IJTSRD) 2(4):2705–2713

    Google Scholar 

  42. Garg R, Garg H (2021) Internet of Things-Enabled Smart Entry System for Telecom Sites. In: Integration and Implementation of the Internet of Things through Cloud Computing (pp. 155–177). IGI Global

  43. Gaurav A, Gupta BB, Panigrahi PK (2022) A comprehensive survey on machine learning approaches for malware detection in IoT-based enterprise information system. Enterprise Information Systems 17(3):1–25

    Google Scholar 

  44. Vincent OR, Okediran TM, Abayomi-Alli AA, Adeniran OJ (2020) An Identity-Based Elliptic Curve Cryptography for Mobile Payment Security. SN Comput Sci 1:1–12

    Article  Google Scholar 

  45. Gyamfi E, Ansere JA, Xu L (2019) ECC based lightweight cybersecurity solution for IoT networks utilising multi-access mobile edge computing. In: 2019 Fourth International Conference on Fog and Mobile Edge Computing (FMEC) (pp. 149–154). IEEE

  46. Hussain F, Hussain R, Hassan SA, Hossain E (2020) Machine learning in IoT security: current solutions and future challenges. IEEE Commun Surv Tutor 22(3):1686–1721

    Article  Google Scholar 

  47. Jović M, Tijan E, Aksentijević S, Čišić D (2019) An Overview of Security Challenges of Seaport IoT Systems. In: 2019 42nd International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO) (pp. 1349–1354). IEEE

  48. Lee Y, Rathore S, Park JH, Park JH (2020) A blockchain-based smart home gateway architecture for preventing data forgery. HCIS 10(1):1–14

    Google Scholar 

  49. Mabodi K, Yusefi M, Zandiyan S, Irankhah L, Fotohi R (2020) Multilevel trust-based intelligence schema for securing of internet of things (IoT) against security threats using cryptographic authentication. J Supercomput 76(9):7081–7106

    Article  Google Scholar 

  50. Razzaq MA, Qureshi MA, Gill SH, Ullah S (2017) Security issues in the Internet of Things (IoT): a comprehensive study. Int J Adv Comput Sci Appl 8(6):383

    Google Scholar 

  51. Singh A, Satapathy SC, Roy A, Gutub A (2022) AI-based mobile edge computing for IoT: applications, challenges, and future scope. Arab J Sci Eng 47(8):1–31

    Article  Google Scholar 

  52. Sudha MN, Rajendiran M, Specht M, Reddy KS, Sugumaran S (2022) A low-area design of two-factor authentication using DIES and SBI for IoT security. J Supercomput 78(3):4503–4525

    Article  Google Scholar 

  53. Tripathi KN, Yadav AM, Sharma SC (2022) TREE: trust-based authenticated and secure dissemination of emergency event information for the network of connected vehicles. Arab J Sci Eng 47(8):10689–10717

    Article  Google Scholar 

  54. Verri Lucca A, Mariano Sborz GA, Leithardt VRQ, Beko M, Albenes Zeferino C, Parreira WD (2021) A review of techniques for implementing elliptic curve point multiplication on hardware. J Sens Actuator Netw 10(1):3

    Article  Google Scholar 

Download references

Funding

Not applicable.

Author information

Authors and Affiliations

Authors

Contributions

Timothy Okediran wrote the content of this research and experimentation and carried out the implementation of the work. Olufunke Vincent provided the literature review, reading, editing, and grammar check. Adebayo Abayomi-Alli contributed to the methodology and presentation of the results. Olusola Adeniran provided the mathematical application for the solution of elliptic curve equations. All the authors contributed to reviewing this research work and provided academic criticism to make it a standard work for publication.

Corresponding author

Correspondence to T. M. Okediran.

Ethics declarations

Conflict of interest

The authors declare no competing interests.

Ethical approval

This declaration does not apply to this work.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Okediran, T.M., Vincent, O.R., Abayomi-Alli, A.A. et al. Securing the perceptual layer of E-payment-based internet of things devices using elliptic curve cryptography over binary field. J Supercomput 80, 21592–21614 (2024). https://doi.org/10.1007/s11227-024-06270-y

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-024-06270-y

Keywords