Security of IoT Device and its Data Transmission on AWS Cloud by Using Hybrid Cryptosystem of ECC and AES

Authors

  • Neha KASHYAP Amity University, Noida
  • Sapna SINHA Amity University, Noida, Uttar Pradesh, India
  • Vineet KANSAL Institute of Engineering & Technology, Lucknow, Uttar Pradesh, India

DOI:

https://doi.org/10.22399/ijcesen.838

Keywords:

IoT, AES, ECC, Raspberry PI, Cloud

Abstract

The expanding prevalence of the Internet of Things (IoT)and its devices presents significant security challenges mostly a lack of multi-factor authentication, light encryption, etc. This study uses Elliptical Curve Cryptography (ECC) and Advanced Encryption Standards (AES) to create a hybrid method with multiple security features for Raspberry Pi and data transmission on the cloud named Hybrid Cryptosystem ECC +AES. Data gathered and transferred to the cloud offers a faster and safer encryption mechanism on Raspberry Pi. This technique provides a notable gain in encryption performance over other previous algorithms by utilizing the speed of AES and the secure key exchange of ECC. The author developed a web application and implemented the algorithm for generating sample data, encryption, decryption processes, and uploading files to an Amazon Web Services (AWS) S3 bucket using Python programming which will benefit other IoT devices with limited memory and computational power.

Author Biographies

Sapna SINHA, Amity University, Noida, Uttar Pradesh, India

Prof.(Dr.) Sapna Sinha is the Deputy Director at Amity University, Noida. She completed her Ph.D. (Computer Science Engineering). She has an experience of 19 years and having more than 20 research papers. 

Vineet KANSAL, Institute of Engineering & Technology, Lucknow, Uttar Pradesh, India

Prof. (Dr.) Vineet Kansal is a professor of the Computer Science and Engineering Department at the Institute of Engineering & Technology, Lucknow, Uttar Pradesh, India. He completed his M.Tech and Ph.D. from IIT Delhi. He has more than 20 publications.

 

References

N. Kashyap, A. Rana, V. Kansal and H. Walia (2021), "Improve Cloud Based IoT Architecture Layer Security - A Literature Review," 2021 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS), Greater Noida, India, pp. 772-777, doi: 10.1109/ICCCIS51004.2021.9397146.

Kapito, B., Nyirenda, M., & Kim, H. (2021). Privacy-preserving Machine Authenticated Key Agreement for the Internet of Things. International Journal of Computer Networks and Communications, 13(2), 99-120.

Na, Y., Joo, Y., Lee, H., Zhao, X., Sajan, K. K., Ramachandran, G., & Krishnamachari, B. (2020, May). Enhancing the reliability of IoT data marketplaces through security validation of IoT devices. In 2020 16th International Conference on distributed computing in Sensor Systems (DCOSS) (pp. 265-272). IEEE, DOI 10.1109/DCOSS49796.2020.00050

Kashyap, N., Rana, A., Kansal, V., & Walia, H. (2021, September). Enhanced Data Security and Authentication Techniques for IoT Devices on Cloud. In 2021 9th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions)(ICRITO) (pp. 1-6). IEEE, doi: 10.1109/ICRITO51393.2021.9596232

Kashyap, N., Sinhaa, S., & Kansal, V. (2024). A Hybrid Lightweight Method of ABE with SHA1 Algorithm for Securing the IoT Data on Cloud. International Journal of Performability Engineering, 20(3). doi: 10.23940/ijpe.24.03.p1.131138

Ashraf, Z., Sohail, A., & Yousaf, M. (2023). Robust and lightweight symmetric key exchange algorithm for next-generation IoE. Internet of Things, 22, 100703, https://doi.org/10.1016/j.iot.2023.100703

Rzepka, K., Szary, P., Cabaj, K., & Mazurczyk, W. (2024). Performance evaluation of Raspberry Pi 4 and STM32 Nucleo boards for security-related operations in IoT environments. Computer Networks, 242, 110252, https://doi.org/10.1016/j.comnet.2024.110252

Rajan, D. A. J., & Naganathan, E. R. (2022). Trust based anonymous intrusion detection for cloud assisted WSN-IOT. Global Transitions Proceedings, 3(1), 104-108., https://doi.org/10.1016/j.gltp.2022.04.022

Hassan, H. E. R., Tahoun, M., & ElTaweel, G. S. (2020). A robust computational DRM framework for protecting multimedia contents using AES and ECC. Alexandria Engineering Journal, 59(3), 1275-1286., https://doi.org/10.1016/j.aej.2020.02.020

Abdulhameed, H. A., Abdalmaaen, H. F., Mohammed, A. T., Mosleh, M. F., & Abdulhameed, A. A. (2022, March). A lightweight hybrid cryptographic algorithm for WSNs tested by the diehard tests and the raspberry Pi. In 2022 International Conference on Computer Science and Software Engineering (CSASE) (pp. 271-276). IEEE., DOI: 10.1109/CSASE51777.2022.9759589

Urooj, S., Lata, S., Ahmad, S., Mehfuz, S., & Kalathil, S. (2023). Cryptographic data security for reliable wireless sensor network. Alexandria Engineering Journal, 72, 37-50., https://doi.org/10.1016/j.aej.2023.03.061

Suárez-Albela, M., Fernández-Caramés, T. M., Fraga-Lamas, P., & Castedo, L. (2018, June). A practical performance comparison of ECC and RSA for resource-constrained IoT devices. In 2018 Global Internet of Things Summit (GIoTS) (pp. 1-6). IEEE., DOI: 10.1109/GIOTS.2018.8534575

Zodpe, H., & Sapkal, A. (2020). An efficient AES implementation using FPGA with enhanced security features. Journal of King Saud University-Engineering Sciences, 32(2), 115-122, https://doi.org/10.1016/j.jksues.2018.07.002

Challa, S., Das, A. K., Odelu, V., Kumar, N., Kumari, S., Khan, M. K., & Vasilakos, A. V. (2018). An efficient ECC-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks. Computers & Electrical Engineering, 69, 534-554, http://dx.doi.org/10.1016/j.compeleceng.2017.08.003

Krishnamoorthy, M., & Perumal, V. (2017). Secure and efficient hand-over authentication in WLAN using elliptic curve RSA. Computers & Electrical Engineering, 64, 552-566, http://dx.doi.org/10.1016/j.compeleceng.2017.06.002

Williams, P., Dutta, I. K., Daoud, H., & Bayoumi, M. (2022). A survey on security in internet of things with a focus on the impact of emerging technologies. Internet of Things, 19, 100564, https://doi.org/10.1016/j.iot.2022.100564

Arreaga, N. X., Enriquez, G. M., Blanc, S., & Estrada, R. (2023). Security Vulnerability Analysis for IoT Devices Raspberry Pi using PENTEST. Procedia Computer Science, 224, 223-230. https://creativecommons.org/licenses/by-nc-nd/4.0)

Abas, S. U., Duran, F., & Tekerek, A. (2023). A Raspberry Pi based blockchain application on IoT security. Expert Systems with Applications, 229, 120486. https://doi.org/10.1016/j.eswa.2023.120486

Kumar, K., Ramkumar, K. R., & Kaur, A. (2022). A lightweight AES algorithm implementation for encrypting voice messages using field programmable gate arrays. Journal of King Saud University-Computer and Information Sciences, 34(6), 3878-3885. https://doi.org/10.1016/j.jksuci.2020.08.005

Sowjanya, K., Dasgupta, M., & Ray, S. (2021). A lightweight key management scheme for key-escrow-free ECC-based CP-ABE for IoT healthcare systems. Journal of Systems Architecture, 117, 102108. https://doi.org/10.1016/j.sysarc.2021.102108

Martínez-Fuentes, O., Díaz-Muñoz, J. D., Muñoz-Vázquez, A. J., Tlelo-Cuautle, E., Fernández-Anaya, G., & Cruz-Vega, I. (2024). Family of controllers for predefined-time synchronization of Lorenz-type systems and the Raspberry Pi-based implementation. Chaos, Solitons & Fractals, 179, 114462. https://doi.org/10.1016/j.chaos.2024.114462

McBride, W. J., & Courter, J. R. (2019). Using Raspberry Pi microcomputers to remotely monitor birds and collect environmental data. Ecological Informatics, 54, 101016. https://doi.org/10.1016/j.ecoinf.2019.101016

Kisoon, R., Gumede, K., Fernandes, J., & Stopforth, R. (2024). Design of a remotely accessible satellite tracking system. In MATEC Web of Conferences (Vol. 406, p. 04012). EDP Sciences.

Poorana Senthilkumar, S., Wilfred Blessing, N. R., Rajesh Kanna, R., & Karthik, S. (2024), Performance Evaluation of Predicting IoT Malicious Nodes Using Machine Learning Classification Algorithms. International Journal of Computational and Experimental Science and Engineering, 10(3), 341-349. DOI: https://doi.org/10.22399/ijcesen.395

Olariu, F., Alboaie, L., & Grămescu, R. (2024). Beyond Cloud Boundaries: An Analytical Case Study on the Migration of a Modular Monolith to Azure, AWS, and Google Cloud Platform. Procedia Computer Science, 246, 2782-2791. https://doi.org/10.1016/j.procs.2024.09.393

N. Vidhya, & C. Meenakshi. (2025). Blockchain-Enabled Secure Data Aggregation Routing (BSDAR) Protocol for IoT-Integrated Next-Generation Sensor Networks for Enhanced Security. International Journal of Computational and Experimental Science and Engineering, 11(1). https://doi.org/10.22399/ijcesen.722

Amjan Shaik, Bhuvan Unhelkar, & Prasun Chakrabarti. (2025). Exploring Artificial Intelligence and Data Science-Based Security and its Scope in IoT Use Cases. International Journal of Computational and Experimental Science and Engineering, 11(1). https://doi.org/10.22399/ijcesen.869

Alkhatib, A., Albdor , L., Fayyad, S., & Ali, H. (2024). Blockchain-Enhanced Multi-Factor Authentication for Securing IoT Children’s Toys: Securing IoT Children’s Toys. International Journal of Computational and Experimental Science and Engineering, 10(4). https://doi.org/10.22399/ijcesen.417

P. Jagdish Kumar, & S. Neduncheliyan. (2024). A novel optimized deep learning based intrusion detection framework for an IoT networks. International Journal of Computational and Experimental Science and Engineering, 10(4). https://doi.org/10.22399/ijcesen.597

Vutukuru, S. R., & Srinivasa Chakravarthi Lade. (2025). CoralMatrix: A Scalable and Robust Secure Framework for Enhancing IoT Cybersecurity. International Journal of Computational and Experimental Science and Engineering, 11(1). https://doi.org/10.22399/ijcesen.825

Downloads

Published

2025-02-12

How to Cite

KASHYAP, N., SINHA, S., & KANSAL, V. (2025). Security of IoT Device and its Data Transmission on AWS Cloud by Using Hybrid Cryptosystem of ECC and AES. International Journal of Computational and Experimental Science and Engineering, 11(1). https://doi.org/10.22399/ijcesen.838

Issue

Section

Research Article