Published: 2024-08-01
Data Transfer Security in IoT Communication Based on Attribute-Based Cryptography
DOI: 10.35870/ijsecs.v4i2.2887
Adel Abidullah, Khoshal Rahman Rahmani, Wali Mohammad Wadeed, Musawer Hakimi
Article Metrics
- Views 0
- Downloads 0
- Scopus Citations
- Google Scholar
- Crossref Citations
- Semantic Scholar
- DataCite Metrics
-
If the link doesn't work, copy the DOI or article title for manual search (API Maintenance).
Abstract
Due to the drastic growth, the Internet of Things (IoT) has become an inevitable form of human life. However, IoT communication is subjected to a vast range of security breaches in the vulnerable environment, which leads to the demand for appropriate technology security issues in IoT communication. The cryptography technique exhibits effective security characteristics that promise promising results for identifying security breaches in IoT. This paper proposes attribute-based elliptical curve cryptography (ATB_ECC) to improve security in IoT communication. IoT devices perform communication to overcome security issues in IoT based on defined attributes of access points. Attributes are involved in the characteristics of trusted nodes in the network. The cryptography technique utilizes Elliptical Curve Cryptography (ECC) to transmit messages securely in the IoT environment. Through integrating attribute factors and cryptography techniques, the IoT network can distinguish variations in the active data communication and threats in the IoT network. Simulation performance is examined for different critical structures, such as low, medium, and high. The proposed ATB_ECC is examined for attack prediction scenarios considering real-time servers. The examined results stated that the proposed ATB_ECC has effectively prevented attacks, especially brute force attacks. Analysis of results stated that low-key structure exhibits minimal complexity, but the security level is minimal. A high-key structure consumes vast energy and has increased complexity, but the security is significantly improved. The comparative analysis of various key structure results illustrated that the proposed attributes-based ECC exhibits improved performance at 15% for throughput.
Keywords
Enterprise Architecture ; Blockchain Technology ; Artificial Intelligence ; Digital Governance ; E-Government
Article Metadata
Peer Review Process
This article has undergone a double-blind peer review process to ensure quality and impartiality.
Indexing Information
Discover where this journal is indexed at our indexing page to understand its reach and credibility.
Open Science Badges
This journal supports transparency in research and encourages authors to meet criteria for Open Science Badges by sharing data, materials, or preregistered studies.
How to Cite
Article Information
This article has been peer-reviewed and published in the International Journal Software Engineering and Computer Science (IJSECS). The content is available under the terms of the Creative Commons Attribution 4.0 International License.
-
Issue: Vol. 4 No. 2 (2024)
-
Section: Articles
-
Published: %750 %e, %2024
-
License: CC BY 4.0
-
Copyright: © 2024 Authors
-
DOI: 10.35870/ijsecs.v4i2.2887
AI Research Hub
This article is indexed and available through various AI-powered research tools and citation platforms. Our AI Research Hub ensures that scholarly work is discoverable, accessible, and easily integrated into the global research ecosystem. By leveraging artificial intelligence for indexing, recommendation, and citation analysis, we enhance the visibility and impact of published research.
Adel Abidullah
Assistant Professor, Computer Science Faculty, Kunduz University, Kunduz City, Kunduz Province, Afghanistan
Khoshal Rahman Rahmani
Assistant Professor, Computer Science Faculty, Kunduz University, Kunduz City, Kunduz Province, Afghanistan
Wali Mohammad Wadeed
Assistant Professor, Computer Science Faculty, Kunduz University, Kunduz City, Kunduz Province, Afghanistan
-
Kim, S., & Lee, I. (2018). IoT device security based on proxy re-encryption. Journal of Ambient Intelligence and Humanized Computing, 9(4), 1267-1273. https://doi.org/10.1007/s12652-017-0602-5
-
Ko, E., Kim, T., & Kim, H. (2018). Management platform of threats information in IoT environment. Journal of Ambient Intelligence and Humanized Computing, 9(4), 1167-1176. https://doi.org/10.1007/s12652-017-0581-6
-
Kim, W., Ko, H., Yun, H., Sung, J., Kim, S., & Nam, J. (2019). A generic Internet of things (IoT) platform supporting plug-and-play device management based on the semantic web. Journal of Ambient Intelligence and Humanized Computing, 1-11. https://doi.org/10.1007/s12652-019-01464-2
-
Azmoodeh, A., Dehghantanha, A., Conti, M., & Choo, K. K. R. (2018). Detecting crypto-ransomware in IoT networks based on energy consumption footprint. Journal of Ambient Intelligence and Humanized Computing, 9(4), 1141-1152. https://doi.org/10.1007/s12652-017-0558-5
-
Chen, J., Tian, Z., Cui, X., Yin, L., & Wang, X. (2019). Trust architecture and reputation evaluation for internet of things. Journal of Ambient Intelligence and Humanized Computing, 10(8), 3099-3107. https://doi.org/10.1007/s12652-018-0887-z
-
Lin, F., Zhou, Y., An, X., You, I., & Choo, K. K. R. (2018). Fair resource allocation in an intrusion-detection system for edge computing: Ensuring the security of Internet of Things devices. IEEE Consumer Electronics Magazine, 7(6), 45-50. https://doi.org/10.1109/MCE.2018.2851723
-
Stergiou, C., Psannis, K. E., Kim, B. G., & Gupta, B. (2018). Secure integration of IoT and cloud computing. Future Generation Computer Systems, 78, 964-975. https://doi.org/10.1016/j.future.2016.11.031
-
-
-
-
Guo, D., Wen, Q., Jin, Z., Zhang, H., & Li, W. (2019). Authenticated public key broadcast encryption with short ciphertexts. Multimedia Tools and Applications, 78(16), 23399-23414. https://doi.org/10.1007/s11042-019-7598-0
-
-
-
Das, A. K., Zeadally, S., & He, D. (2018). Taxonomy and analysis of security protocols for Internet of Things. Future Generation Computer Systems, 89, 110-125. https://doi.org/10.1016/j.future.2018.06.027
-
-
Kaur, A., Rai, G., & Malik, A. (2018, January). Authentication and Context Awareness Access Control in Internet of Things: A Review. In 2018 8th International Conference on Cloud Computing, Data Science & Engineering (Confluence) (pp. 630-635). IEEE. https://doi.org/10.1109/CONFLUENCE.2018.8443067
-
-
Kayal, P., & Perros, H. (2017, March). A comparison of IoT application layer protocols through a smart parking implementation. In 2017 20th Conference on Innovations in Clouds, Internet and Networks (ICIN) (pp. 331-336). IEEE. https://doi.org/10.1109/ICIN.2017.7899436
-
De Caro, N., Colitti, W., Steenhaut, K., Mangino, G., & Reali, G. (2013, November). Comparison of two lightweight protocols for smartphone-based sensing. In 2013 IEEE 20th Symposium on Communications and Vehicular Technology in the Benelux (SCVT) (pp. 1-6). IEEE. https://doi.org/10.1109/SCVT.2013.6735994
-
Mun, D. H., Le Dinh, M., & Kwon, Y. W. (2016, June). An assessment of internet of things protocols for resource-constrained applications. In 2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC) (Vol. 1, pp. 555-560). IEEE. https://doi.org/10.1109/COMPSAC.2016.51
-
Akatyev, N., & James, J. I. (2019). Evidence identification in IoT networks based on threat assessment. Future Generation Computer Systems, 93, 814-821. https://doi.org/10.1016/j.future.2017.10.012.

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Authors who publish with this journal agree to the following terms:
1. Copyright Retention and Open Access License
Authors retain copyright of their work and grant the journal non-exclusive right of first publication under the Creative Commons Attribution 4.0 International License (CC BY 4.0).
This license allows unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
2. Rights Granted Under CC BY 4.0
Under this license, readers are free to:
- Share — copy and redistribute the material in any medium or format
- Adapt — remix, transform, and build upon the material for any purpose, including commercial use
- No additional restrictions — the licensor cannot revoke these freedoms as long as license terms are followed
3. Attribution Requirements
All uses must include:
- Proper citation of the original work
- Link to the Creative Commons license
- Indication if changes were made to the original work
- No suggestion that the licensor endorses the user or their use
4. Additional Distribution Rights
Authors may:
- Deposit the published version in institutional repositories
- Share through academic social networks
- Include in books, monographs, or other publications
- Post on personal or institutional websites
Requirement: All additional distributions must maintain the CC BY 4.0 license and proper attribution.
5. Self-Archiving and Pre-Print Sharing
Authors are encouraged to:
- Share pre-prints and post-prints online
- Deposit in subject-specific repositories (e.g., arXiv, bioRxiv)
- Engage in scholarly communication throughout the publication process
6. Open Access Commitment
This journal provides immediate open access to all content, supporting the global exchange of knowledge without financial, legal, or technical barriers.