A Provable Secure Cybersecurity Mechanism Based on Combination of Lightweight Cryptography and Authentication for Internet of Things

Internet of Things devices, platform programs, and network applications are all vulnerable to cyberattacks (digital attacks), which can be prevented at different levels by using cybersecurity protocol. In the Internet of Things (IoT), cyberattacks are specifically intended to retrieve or change/dest...

Full description

Bibliographic Details
Published in:Mathematics
Main Authors: Adel A. Ahmed, Sharaf J. Malebary, Waleed Ali, Ahmed A. Alzahrani
Format: Article
Language:English
Published: MDPI AG 2023-01-01
Subjects:
Online Access:https://www.mdpi.com/2227-7390/11/1/220
_version_ 1850376261447188480
author Adel A. Ahmed
Sharaf J. Malebary
Waleed Ali
Ahmed A. Alzahrani
author_facet Adel A. Ahmed
Sharaf J. Malebary
Waleed Ali
Ahmed A. Alzahrani
author_sort Adel A. Ahmed
collection DOAJ
container_title Mathematics
description Internet of Things devices, platform programs, and network applications are all vulnerable to cyberattacks (digital attacks), which can be prevented at different levels by using cybersecurity protocol. In the Internet of Things (IoT), cyberattacks are specifically intended to retrieve or change/destroy sensitive information that may exceed the IoT’s advantages. Furthermore, the design of a lightweight cybersecurity mechanism experiences a critical challenge that would perfectly fit resource-constrained IoT devices. For instance, identifying the compromised devices and the users’ data and services protection are the general challenges of cybersecurity on an IoT system that should be considered. This paper proposes a secure cybersecurity system based on the integration of cryptography with authentication (ELCA) that utilizes elliptic curve Diffie–Hellman (ECDH) to undertake key distribution while the weak bits problem in the shared secret key is resolved. In this paper, three systems of integration are investigated, while ELCA proposes secure integration between authentication and encryption to facilitate confidentiality and authenticity transfer messages between IoT devices over an insecure communication channel. Furthermore, the security of ELCA is proven mathematically using the random oracle model and IoT adversary model. The findings of the emulation results show the effectiveness of ELCA performance in terms of a reduced CPU execution time by 50%, reduced storage cost by 32–19.6%, and reduced energy consumption by 41% compared to the baseline cryptographic algorithms.
format Article
id doaj-art-c347f4dfee264db4b8f4d00a73abac9a
institution Directory of Open Access Journals
issn 2227-7390
language English
publishDate 2023-01-01
publisher MDPI AG
record_format Article
spelling doaj-art-c347f4dfee264db4b8f4d00a73abac9a2025-08-19T22:59:16ZengMDPI AGMathematics2227-73902023-01-0111122010.3390/math11010220A Provable Secure Cybersecurity Mechanism Based on Combination of Lightweight Cryptography and Authentication for Internet of ThingsAdel A. Ahmed0Sharaf J. Malebary1Waleed Ali2Ahmed A. Alzahrani3Information Technology Department, Faculty of Computing and Information Technology-Rabigh, King Abdulaziz University, Jeddah 25729, Saudi ArabiaInformation Technology Department, Faculty of Computing and Information Technology-Rabigh, King Abdulaziz University, Jeddah 25729, Saudi ArabiaInformation Technology Department, Faculty of Computing and Information Technology-Rabigh, King Abdulaziz University, Jeddah 25729, Saudi ArabiaInformation Technology Department, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah 21589, Saudi ArabiaInternet of Things devices, platform programs, and network applications are all vulnerable to cyberattacks (digital attacks), which can be prevented at different levels by using cybersecurity protocol. In the Internet of Things (IoT), cyberattacks are specifically intended to retrieve or change/destroy sensitive information that may exceed the IoT’s advantages. Furthermore, the design of a lightweight cybersecurity mechanism experiences a critical challenge that would perfectly fit resource-constrained IoT devices. For instance, identifying the compromised devices and the users’ data and services protection are the general challenges of cybersecurity on an IoT system that should be considered. This paper proposes a secure cybersecurity system based on the integration of cryptography with authentication (ELCA) that utilizes elliptic curve Diffie–Hellman (ECDH) to undertake key distribution while the weak bits problem in the shared secret key is resolved. In this paper, three systems of integration are investigated, while ELCA proposes secure integration between authentication and encryption to facilitate confidentiality and authenticity transfer messages between IoT devices over an insecure communication channel. Furthermore, the security of ELCA is proven mathematically using the random oracle model and IoT adversary model. The findings of the emulation results show the effectiveness of ELCA performance in terms of a reduced CPU execution time by 50%, reduced storage cost by 32–19.6%, and reduced energy consumption by 41% compared to the baseline cryptographic algorithms.https://www.mdpi.com/2227-7390/11/1/220IoTECDHsymmetric cryptographicauthentication
spellingShingle Adel A. Ahmed
Sharaf J. Malebary
Waleed Ali
Ahmed A. Alzahrani
A Provable Secure Cybersecurity Mechanism Based on Combination of Lightweight Cryptography and Authentication for Internet of Things
IoT
ECDH
symmetric cryptographic
authentication
title A Provable Secure Cybersecurity Mechanism Based on Combination of Lightweight Cryptography and Authentication for Internet of Things
title_full A Provable Secure Cybersecurity Mechanism Based on Combination of Lightweight Cryptography and Authentication for Internet of Things
title_fullStr A Provable Secure Cybersecurity Mechanism Based on Combination of Lightweight Cryptography and Authentication for Internet of Things
title_full_unstemmed A Provable Secure Cybersecurity Mechanism Based on Combination of Lightweight Cryptography and Authentication for Internet of Things
title_short A Provable Secure Cybersecurity Mechanism Based on Combination of Lightweight Cryptography and Authentication for Internet of Things
title_sort provable secure cybersecurity mechanism based on combination of lightweight cryptography and authentication for internet of things
topic IoT
ECDH
symmetric cryptographic
authentication
url https://www.mdpi.com/2227-7390/11/1/220
work_keys_str_mv AT adelaahmed aprovablesecurecybersecuritymechanismbasedoncombinationoflightweightcryptographyandauthenticationforinternetofthings
AT sharafjmalebary aprovablesecurecybersecuritymechanismbasedoncombinationoflightweightcryptographyandauthenticationforinternetofthings
AT waleedali aprovablesecurecybersecuritymechanismbasedoncombinationoflightweightcryptographyandauthenticationforinternetofthings
AT ahmedaalzahrani aprovablesecurecybersecuritymechanismbasedoncombinationoflightweightcryptographyandauthenticationforinternetofthings
AT adelaahmed provablesecurecybersecuritymechanismbasedoncombinationoflightweightcryptographyandauthenticationforinternetofthings
AT sharafjmalebary provablesecurecybersecuritymechanismbasedoncombinationoflightweightcryptographyandauthenticationforinternetofthings
AT waleedali provablesecurecybersecuritymechanismbasedoncombinationoflightweightcryptographyandauthenticationforinternetofthings
AT ahmedaalzahrani provablesecurecybersecuritymechanismbasedoncombinationoflightweightcryptographyandauthenticationforinternetofthings