Abstract
The perceptual layer of the Internet of Things has some security threats, such as denial of service, botnet, and falsification attacks. The existing security schemes are the symmetric polynomial concept, privacy-preserving communication protocols for IoT applications, block chain-based secure IoT systems, and mutual authentication systems for wearable technology, which cannot be directly implemented on the perceptual layer of the IoT device. This study presents a binary field elliptic curve cryptographic (ECC) algorithm to secure the perceptual layer of IoT-enabled electronic payment devices. The procedure includes device registration, authentication for key agreement and unlocking, and the communication phase. Some parameters were used to lock the node, while identification tags were used to identify an authentic node. Nodes were generated using point addition and point doubling. The processing, storage capacity, and transaction speed were directly evaluated using contactless devices with the binary field ECC security protocol. The Jitter result reveals that the value did not deviate from normal for both devices. The results time also showed that it is computationally efficient to use ECC over the binary field for the security of the perceptual layer with a significant contribution using device identification tags and point multiplication to protect against falsification attacks, node locking to combat DDoS and key exchange with node unlocking for defense against botnet attacks.









Similar content being viewed by others
Data availability
All the datasets used were generated from the experiments and implementation of the security scheme using all the devices, as referred to in this work.
References
Aarika K, Bouhlal M, Abdelouahid RA, Elfilali S, Benlahmar E (2020) Perception layer security in the Internet of Things. Procedia Computer Science 175:591–596
Almusaylim ZA, Zaman N (2019) A review on smart home present state and challenges: linked to context-awareness internet of things (IoT). Wireless Netw 25(6):3193–3204
Kumar D, Grover HS (2019) A secure authentication protocol for wearable devices environment using ECC. J Inf Secur Appl 47:8–15
Kumar D, Jain S, Khan A, Pathak PS (2020) An improved lightweight anonymous user authenticated session key exchange scheme for Internet of Things. J Ambient Intell Human Comput 14(5):1–17
Ferrag MA, Maglaras LA, Janicke H, Jiang J, Shu L (2017) Authentication protocols for Internet of Things: a comprehensive survey. Secur Commun Netw 2017:1–41
Salim MM, Rathore S, Park JH (2019) Distributed denial of service attacks and its defenses in IOT: a survey. J Supercomput 76:5320–5363
Shouran Z, Ashari A, Priyambodo T (2019) Internet of things (IoT) of smart home: privacy and security. Int J Comput Appl 182(39):3–8
Lee JY, Lee J (2021) Current research trends in IoT security: a systematic mapping study. Mob Inf Syst 2021:1–25
Cao J, Yu P, Ma M, Gao W (2019) Fast authentication and data transfer scheme for massive NB-IoT devices in 3GPP 5G network. IEEE Internet Things J 6(2):1561–1575
Alaba FA, Othman M, Hashem IAT, Alotaibi F (2017) Internet of Things security: A survey. J Netw Comput Appl 88:10–28
Usman M, Ahmed I, Aslam MI, Khan S, Shah UA (2017) SIT: a lightweight encryption algorithm for secure internet of things. arXiv preprint arXiv:1704.08688
Lin J, Yu W, Zhang N, Yang X, Zhang H, Zhao W (2017) A survey on internet of things: architecture, enabling technologies, security and privacy, and applications. IEEE Internet Things J 4(5):1125–1142
Song T, Li R, Mei B, Yu J, Xing X, Cheng X (2017) A privacy preserving communication protocol for IoT applications in smart homes. IEEE Internet Things J 4(6):1844–1852
Yang A, Hancke GP (2017) RFID and contactless technology. In: Keith M, Konstantinos M (eds) Smart Cards, Tokens, Security and Applications. Springer, Cham, pp 351–385
Neerugatti V, Reddy M, RamaA (2019) Machine Learning Based Technique for Detection of Rank Attack in RPL based Internet of Things Networks. Machine Learning Based Technique for Detection of Rank Attack in RPL based Internet of Things Networks (July 10, 2019). International Journal of Innovative Technology and Exploring Engineering (IJITEE) ISSN, 2278–3075.
Padmashree MG, Mallikarjun JP, Arunalatha JS, Venugopal KR (2021) MEKDA: multilevel ECC Based Key Distribution And Authentication In Internet of Things
Sabrina F, Li N, Sohail S (2022) A blockchain based secure IoT System using device identity management. Sensors 22(19):7535
Kapito B, Nyirenda M, Kim H (2021) Privacy-preserving machine authenticated key agreement for internet of things. Int J Comput Netw Commun 13(2):99–120
Mahmoud C, Aouag S (2019) Security for internet of things: A state of the art on existing protocols and open research issues. In: Proceedings of the 9th International Conference on Information Systems and Technologies (pp. 1–6)
Amin R, Kumar N, Biswas GP, Iqbal R, Chang V (2018) A lightweight authentication protocol for IoT-enabled devices in distributed Cloud Computing environment. Futur Gener Comput Syst 78:1005–1019
Challa S, Das AK, Gope P, Kumar N, Wu F, Vasilakos AV (2020) Design and Analysis of authenticated key agreement scheme in cloud-assisted cyber–physical systems. Futur Gener Comput Syst 108:1267–1286
Li, W., Li, B., Zhao, Y., Wang, P., & Wei, F. (2018). Cryptanalysis and security enhancement of three authentication schemes in wireless sensor networks. Wireless Communications and Mobile Computing, 2018.
Das AK, Wazid M, Kumar N, Khan MK, Choo KKR, Park Y (2017) Design of secure and lightweight authentication protocol for wearable devices environment. IEEE J Biomed Health Inform 22(4):1310–1322
Kumari A, Kumar V, YahyaAbbasi M, Alam M (2018) The cryptanalysis of a secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers. In: 2018 International Conference on Advances in Computing, Communication Control and Networking (ICACCCN) (pp. 321–325). IEEE
Lawal OM, Vincent OR, Agboola AAA, Folorunso O (2021) An improved hybrid scheme for e-payment security using elliptic curve cryptography. Int J Inf Technol 13(1):139–153
Chaudhary R, Jindal A, Aujla GS, Kumar N, Das AK, Saxena N (2018) Lscsh: Lattice-based secure cryptosystem for smart healthcare in smart cities environment. IEEE Commun Mag 56(4):24–32
Ali I, Sabir S, Ullah Z (2019) Internet of things security, device authentication and access control: a review. arXiv preprint arXiv:1901.07309
Bhushan B, Khamparia A, Sagayam KM, Sharma SK, Ahad MA, Debnath NC (2020) Blockchain for smart cities: A review of architectures, integration trends and future research directions. Sustain Cities Soc 61:102360
Wu G (2021) Monitoring System of Key Technical Features of Male Tennis Players Based on Internet of Things Security Technology. Wireless Communications and Mobile Computing 2021
Rekha S, Thirupathi L, Renikunta S, Gangula R (2021) Study of security issues and solutions in Internet of Things (IoT). Materials Today: Proceedings
Vouzikas A, Gazis A (2021) On the robust multiple objective control with simultaneous pole placement in LMI regions. WSEAS Transactions on Systems 20:272–280
Javed AR, Shahzad F, Ur Rehman S, Zikria YB, Razzak I, Jalil Z, Xu G (2022) Future smart cities requirements, emerging technologies, applications, challenges, and future aspects. Cities 129:103794
Vincent OR, Lawal OM (2018) A key agreement authentication protocol using an improved parallel pollard rho for electronic payment system. J Supercomput 74:1973–1993
Gu Z, Chen H, Xu P, Li Y, Vucetic B (2020) Physical layer authentication for non-coherent massive SIMO-enabled industrial IoT communications. IEEE Trans Inf Forensics Secur 15:3722–3733
Padmashree MG, Arunalatha JS, Venugopal KR (2019) HPAKE: hybrid Precocious Authentication and Key Establishment in IoT. In: 2019 International Carnahan Conference on Security Technology (ICCST) (pp. 1–6). IEEE
Dammak M, Senouci SM, Messous MA, Elhdhili MH, Gransart C (2020) Decentralized lightweight group key management for dynamic access control in IoT environments. IEEE Trans Netw Serv Manage 17(3):1742–1757
Mansour A, Malik KM, Alkaff A, Kanaan H (2020) ALMS: Asymmetric lightweight centralized group key management protocol for VANETs. IEEE Trans Intell Transp Syst 22(3):1663–1678
Qiu J, Fan K, Zhang K, Pan Q, Li H, Yang Y (2019) An efficient multi-message and multi-receiver signcryption scheme for heterogeneous smart mobile IoT. IEEE Access 7:180205–180217
Hameedi SS, Bayat O (2022) Improving IoT data security and integrity using lightweight blockchain dynamic table. Appl Sci 12(18):9377
Bremler-Barr A, Levy H, Yakhini Z (2020) IoT or not: Identifying IoT devices in a short time scale. In NOMS 2020–2020 IEEE/IFIP Network Operations and Management Symposium (pp. 1–9). IEEE
Devi Kala Rathinam D, Sherin J, Santhiya Grace A (2018) Internet of Things (IoT) based smart environment and its applications. Int J Trend Sci Res Dev (IJTSRD) 2(4):2705–2713
Garg R, Garg H (2021) Internet of Things-Enabled Smart Entry System for Telecom Sites. In: Integration and Implementation of the Internet of Things through Cloud Computing (pp. 155–177). IGI Global
Gaurav A, Gupta BB, Panigrahi PK (2022) A comprehensive survey on machine learning approaches for malware detection in IoT-based enterprise information system. Enterprise Information Systems 17(3):1–25
Vincent OR, Okediran TM, Abayomi-Alli AA, Adeniran OJ (2020) An Identity-Based Elliptic Curve Cryptography for Mobile Payment Security. SN Comput Sci 1:1–12
Gyamfi E, Ansere JA, Xu L (2019) ECC based lightweight cybersecurity solution for IoT networks utilising multi-access mobile edge computing. In: 2019 Fourth International Conference on Fog and Mobile Edge Computing (FMEC) (pp. 149–154). IEEE
Hussain F, Hussain R, Hassan SA, Hossain E (2020) Machine learning in IoT security: current solutions and future challenges. IEEE Commun Surv Tutor 22(3):1686–1721
Jović M, Tijan E, Aksentijević S, Čišić D (2019) An Overview of Security Challenges of Seaport IoT Systems. In: 2019 42nd International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO) (pp. 1349–1354). IEEE
Lee Y, Rathore S, Park JH, Park JH (2020) A blockchain-based smart home gateway architecture for preventing data forgery. HCIS 10(1):1–14
Mabodi K, Yusefi M, Zandiyan S, Irankhah L, Fotohi R (2020) Multilevel trust-based intelligence schema for securing of internet of things (IoT) against security threats using cryptographic authentication. J Supercomput 76(9):7081–7106
Razzaq MA, Qureshi MA, Gill SH, Ullah S (2017) Security issues in the Internet of Things (IoT): a comprehensive study. Int J Adv Comput Sci Appl 8(6):383
Singh A, Satapathy SC, Roy A, Gutub A (2022) AI-based mobile edge computing for IoT: applications, challenges, and future scope. Arab J Sci Eng 47(8):1–31
Sudha MN, Rajendiran M, Specht M, Reddy KS, Sugumaran S (2022) A low-area design of two-factor authentication using DIES and SBI for IoT security. J Supercomput 78(3):4503–4525
Tripathi KN, Yadav AM, Sharma SC (2022) TREE: trust-based authenticated and secure dissemination of emergency event information for the network of connected vehicles. Arab J Sci Eng 47(8):10689–10717
Verri Lucca A, Mariano Sborz GA, Leithardt VRQ, Beko M, Albenes Zeferino C, Parreira WD (2021) A review of techniques for implementing elliptic curve point multiplication on hardware. J Sens Actuator Netw 10(1):3
Funding
Not applicable.
Author information
Authors and Affiliations
Contributions
Timothy Okediran wrote the content of this research and experimentation and carried out the implementation of the work. Olufunke Vincent provided the literature review, reading, editing, and grammar check. Adebayo Abayomi-Alli contributed to the methodology and presentation of the results. Olusola Adeniran provided the mathematical application for the solution of elliptic curve equations. All the authors contributed to reviewing this research work and provided academic criticism to make it a standard work for publication.
Corresponding author
Ethics declarations
Conflict of interest
The authors declare no competing interests.
Ethical approval
This declaration does not apply to this work.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Okediran, T.M., Vincent, O.R., Abayomi-Alli, A.A. et al. Securing the perceptual layer of E-payment-based internet of things devices using elliptic curve cryptography over binary field. J Supercomput 80, 21592–21614 (2024). https://doi.org/10.1007/s11227-024-06270-y
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11227-024-06270-y