Security of IoT Device and its Data Transmission on AWS Cloud by Using Hybrid Cryptosystem of ECC and AES
DOI:
https://doi.org/10.22399/ijcesen.838Keywords:
IoT, AES, ECC, Raspberry PI, CloudAbstract
The expanding prevalence of the Internet of Things (IoT)and its devices presents significant security challenges mostly a lack of multi-factor authentication, light encryption, etc. This study uses Elliptical Curve Cryptography (ECC) and Advanced Encryption Standards (AES) to create a hybrid method with multiple security features for Raspberry Pi and data transmission on the cloud named Hybrid Cryptosystem ECC +AES. Data gathered and transferred to the cloud offers a faster and safer encryption mechanism on Raspberry Pi. This technique provides a notable gain in encryption performance over other previous algorithms by utilizing the speed of AES and the secure key exchange of ECC. The author developed a web application and implemented the algorithm for generating sample data, encryption, decryption processes, and uploading files to an Amazon Web Services (AWS) S3 bucket using Python programming which will benefit other IoT devices with limited memory and computational power.
References
N. Kashyap, A. Rana, V. Kansal and H. Walia (2021), "Improve Cloud Based IoT Architecture Layer Security - A Literature Review," 2021 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS), Greater Noida, India, pp. 772-777, doi: 10.1109/ICCCIS51004.2021.9397146.
Kapito, B., Nyirenda, M., & Kim, H. (2021). Privacy-preserving Machine Authenticated Key Agreement for the Internet of Things. International Journal of Computer Networks and Communications, 13(2), 99-120.
Na, Y., Joo, Y., Lee, H., Zhao, X., Sajan, K. K., Ramachandran, G., & Krishnamachari, B. (2020, May). Enhancing the reliability of IoT data marketplaces through security validation of IoT devices. In 2020 16th International Conference on distributed computing in Sensor Systems (DCOSS) (pp. 265-272). IEEE, DOI 10.1109/DCOSS49796.2020.00050
Kashyap, N., Rana, A., Kansal, V., & Walia, H. (2021, September). Enhanced Data Security and Authentication Techniques for IoT Devices on Cloud. In 2021 9th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions)(ICRITO) (pp. 1-6). IEEE, doi: 10.1109/ICRITO51393.2021.9596232
Kashyap, N., Sinhaa, S., & Kansal, V. (2024). A Hybrid Lightweight Method of ABE with SHA1 Algorithm for Securing the IoT Data on Cloud. International Journal of Performability Engineering, 20(3). doi: 10.23940/ijpe.24.03.p1.131138
Ashraf, Z., Sohail, A., & Yousaf, M. (2023). Robust and lightweight symmetric key exchange algorithm for next-generation IoE. Internet of Things, 22, 100703, https://doi.org/10.1016/j.iot.2023.100703
Rzepka, K., Szary, P., Cabaj, K., & Mazurczyk, W. (2024). Performance evaluation of Raspberry Pi 4 and STM32 Nucleo boards for security-related operations in IoT environments. Computer Networks, 242, 110252, https://doi.org/10.1016/j.comnet.2024.110252
Rajan, D. A. J., & Naganathan, E. R. (2022). Trust based anonymous intrusion detection for cloud assisted WSN-IOT. Global Transitions Proceedings, 3(1), 104-108., https://doi.org/10.1016/j.gltp.2022.04.022
Hassan, H. E. R., Tahoun, M., & ElTaweel, G. S. (2020). A robust computational DRM framework for protecting multimedia contents using AES and ECC. Alexandria Engineering Journal, 59(3), 1275-1286., https://doi.org/10.1016/j.aej.2020.02.020
Abdulhameed, H. A., Abdalmaaen, H. F., Mohammed, A. T., Mosleh, M. F., & Abdulhameed, A. A. (2022, March). A lightweight hybrid cryptographic algorithm for WSNs tested by the diehard tests and the raspberry Pi. In 2022 International Conference on Computer Science and Software Engineering (CSASE) (pp. 271-276). IEEE., DOI: 10.1109/CSASE51777.2022.9759589
Urooj, S., Lata, S., Ahmad, S., Mehfuz, S., & Kalathil, S. (2023). Cryptographic data security for reliable wireless sensor network. Alexandria Engineering Journal, 72, 37-50., https://doi.org/10.1016/j.aej.2023.03.061
Suárez-Albela, M., Fernández-Caramés, T. M., Fraga-Lamas, P., & Castedo, L. (2018, June). A practical performance comparison of ECC and RSA for resource-constrained IoT devices. In 2018 Global Internet of Things Summit (GIoTS) (pp. 1-6). IEEE., DOI: 10.1109/GIOTS.2018.8534575
Zodpe, H., & Sapkal, A. (2020). An efficient AES implementation using FPGA with enhanced security features. Journal of King Saud University-Engineering Sciences, 32(2), 115-122, https://doi.org/10.1016/j.jksues.2018.07.002
Challa, S., Das, A. K., Odelu, V., Kumar, N., Kumari, S., Khan, M. K., & Vasilakos, A. V. (2018). An efficient ECC-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks. Computers & Electrical Engineering, 69, 534-554, http://dx.doi.org/10.1016/j.compeleceng.2017.08.003
Krishnamoorthy, M., & Perumal, V. (2017). Secure and efficient hand-over authentication in WLAN using elliptic curve RSA. Computers & Electrical Engineering, 64, 552-566, http://dx.doi.org/10.1016/j.compeleceng.2017.06.002
Williams, P., Dutta, I. K., Daoud, H., & Bayoumi, M. (2022). A survey on security in internet of things with a focus on the impact of emerging technologies. Internet of Things, 19, 100564, https://doi.org/10.1016/j.iot.2022.100564
Arreaga, N. X., Enriquez, G. M., Blanc, S., & Estrada, R. (2023). Security Vulnerability Analysis for IoT Devices Raspberry Pi using PENTEST. Procedia Computer Science, 224, 223-230. https://creativecommons.org/licenses/by-nc-nd/4.0)
Abas, S. U., Duran, F., & Tekerek, A. (2023). A Raspberry Pi based blockchain application on IoT security. Expert Systems with Applications, 229, 120486. https://doi.org/10.1016/j.eswa.2023.120486
Kumar, K., Ramkumar, K. R., & Kaur, A. (2022). A lightweight AES algorithm implementation for encrypting voice messages using field programmable gate arrays. Journal of King Saud University-Computer and Information Sciences, 34(6), 3878-3885. https://doi.org/10.1016/j.jksuci.2020.08.005
Sowjanya, K., Dasgupta, M., & Ray, S. (2021). A lightweight key management scheme for key-escrow-free ECC-based CP-ABE for IoT healthcare systems. Journal of Systems Architecture, 117, 102108. https://doi.org/10.1016/j.sysarc.2021.102108
Martínez-Fuentes, O., Díaz-Muñoz, J. D., Muñoz-Vázquez, A. J., Tlelo-Cuautle, E., Fernández-Anaya, G., & Cruz-Vega, I. (2024). Family of controllers for predefined-time synchronization of Lorenz-type systems and the Raspberry Pi-based implementation. Chaos, Solitons & Fractals, 179, 114462. https://doi.org/10.1016/j.chaos.2024.114462
McBride, W. J., & Courter, J. R. (2019). Using Raspberry Pi microcomputers to remotely monitor birds and collect environmental data. Ecological Informatics, 54, 101016. https://doi.org/10.1016/j.ecoinf.2019.101016
Kisoon, R., Gumede, K., Fernandes, J., & Stopforth, R. (2024). Design of a remotely accessible satellite tracking system. In MATEC Web of Conferences (Vol. 406, p. 04012). EDP Sciences.
Poorana Senthilkumar, S., Wilfred Blessing, N. R., Rajesh Kanna, R., & Karthik, S. (2024), Performance Evaluation of Predicting IoT Malicious Nodes Using Machine Learning Classification Algorithms. International Journal of Computational and Experimental Science and Engineering, 10(3), 341-349. DOI: https://doi.org/10.22399/ijcesen.395
Olariu, F., Alboaie, L., & Grămescu, R. (2024). Beyond Cloud Boundaries: An Analytical Case Study on the Migration of a Modular Monolith to Azure, AWS, and Google Cloud Platform. Procedia Computer Science, 246, 2782-2791. https://doi.org/10.1016/j.procs.2024.09.393
N. Vidhya, & C. Meenakshi. (2025). Blockchain-Enabled Secure Data Aggregation Routing (BSDAR) Protocol for IoT-Integrated Next-Generation Sensor Networks for Enhanced Security. International Journal of Computational and Experimental Science and Engineering, 11(1). https://doi.org/10.22399/ijcesen.722
Amjan Shaik, Bhuvan Unhelkar, & Prasun Chakrabarti. (2025). Exploring Artificial Intelligence and Data Science-Based Security and its Scope in IoT Use Cases. International Journal of Computational and Experimental Science and Engineering, 11(1). https://doi.org/10.22399/ijcesen.869
Alkhatib, A., Albdor , L., Fayyad, S., & Ali, H. (2024). Blockchain-Enhanced Multi-Factor Authentication for Securing IoT Children’s Toys: Securing IoT Children’s Toys. International Journal of Computational and Experimental Science and Engineering, 10(4). https://doi.org/10.22399/ijcesen.417
P. Jagdish Kumar, & S. Neduncheliyan. (2024). A novel optimized deep learning based intrusion detection framework for an IoT networks. International Journal of Computational and Experimental Science and Engineering, 10(4). https://doi.org/10.22399/ijcesen.597
Vutukuru, S. R., & Srinivasa Chakravarthi Lade. (2025). CoralMatrix: A Scalable and Robust Secure Framework for Enhancing IoT Cybersecurity. International Journal of Computational and Experimental Science and Engineering, 11(1). https://doi.org/10.22399/ijcesen.825
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 International Journal of Computational and Experimental Science and Engineering

This work is licensed under a Creative Commons Attribution 4.0 International License.