The Hybrid Cryptographic Algorithms for Secure RFID Data Protection in The Internet of Things
DOI:
https://doi.org/10.31961/eltikom.v7i2.860Keywords:
AES, ECDH, Hybrid Cryptographic, internet of things, RFIDAbstract
RFID is often used by companies to identify employees and company assets, as well as in supermarkets to identify goods when shopping. In this increasingly sophisticated era, IoT technology has wide applications. The use of RFID technology in IoT networks may pose vulnerabilities to security and privacy because it contains sensitive information, and RFID data transmitted over communication channels is vulnerable to attacks. IoT technology has characteristics such as high autonomous data capture rate, network connectivity, and interoperability for services and applications. Therefore, this research aims to improve the security of RFID data by taking into account the characteristics of IoT. The method used is hybrid cryptography by combining AES (Advanced Encryption Standard) and ECDH (Elliptic-curve Diffie-Hellman) keys. AES, as a commonly used symmetric cryptography, is chosen to protect the data, while ECDH, as the latest asymmetric cryptography, is used for a faster and more efficient process compared to previous asymmetric methods. This study utilizes the Python programming language on Jupyter Notebook. The initial step of the study involved scanning the RFID data to be secured and configuring the key on ECDH. The subsequent process included encryption and decryption of the data. The study successfully tested the success of encryption and decryption on RFID UIDs. The test data includes the result display of the hybrid encryption, the encryption and decryption processing time, and the file size of the encryption (ciphertext) and decryption (decodetext). These results show an excellent level of security for RFID UIDs. Only those with a specific key can know the contents of the cipher. It should be noted that this study was only conducted at the program level and was not implemented on hardware. Therefore, the results can be a valuable reference for future research.
Downloads
References
S. Gabsi, Y. Kortli, V. Beroulle, Y. Kieffer, A. Alasiry, and B. Hamdi, “Novel ECC-based RFID mutual authentication protocol for emerging IoT applications,†IEEE access, vol. 9, pp. 130895–130913, 2021.
W. Viriyasitavat, T. Anuphaptrirong, and D. Hoonsopon, “When blockchain meets Internet of Things: Characteristics, challenges, and business opportunities,†J. Ind. Inf. Integr., vol. 15, pp. 21–28, 2019.
L. Tawalbeh, F. Muheidat, M. Tawalbeh, and M. Quwaider, “IoT Privacy and security: Challenges and solutions,†Appl. Sci., vol. 10, no. 12, p. 4102, 2020.
J. R. Naif, G. H. Abdul-Majeed, and A. K. Farhan, “Secure IOT system based on chaos-modified lightweight AES,†in 2019 International Conference on Advanced Science and Engineering (ICOASE), IEEE, 2019, pp. 1–6.
R. Munir, “Kriptografi Edisi Kedua,†Bandung. Penerbit Inform., 2019.
R. H. Prayitno, S. A. Sudiro, S. Madenda, and S. Harmanto, “Hardware Implementation Of Galois Field Multiplication For Mixcolumn And Inversemixcolumn Process In Encryption-Decryption Algorithms,†J. Theor. Appl. Inf. Technol., vol. 100, no. 14, 2022.
T. Hidayat and R. Mahardiko, “A Systematic literature review method on aes algorithm for data sharing encryption on cloud computing,†Int. J. Artif. Intell. Res., vol. 4, no. 1, pp. 49–57, 2020.
S. Aikins-Bekoe and J. Ben Hayfron-Acquah, “Elliptic curve diffie-hellman (ECDH) analogy for secured wireless sensor networks,†Int. J. Comput. Appl., vol. 176, no. 10, pp. 1–8, 2020.
R. K. Harahap, E. P. Wibowo, D. Nur’ainingsih, A. K. Wijaya, and R. A. S. C. Anindya, “Dogs Feed Smart System With Food Scales Indicator IoT Based,†in 2022 4th International Conference on Cybernetics and Intelligent System (ICORIS), IEEE, 2022, pp. 1–7.
R. K. Kodali and A. Naikoti, “ECDH based security model for IoT using ESP8266,†in 2016 International conference on control, instrumentation, communication and computational technologies (ICCICCT), IEEE, 2016, pp. 629–633.
T. Yue, C. Wang, and Z. Zhu, “Hybrid encryption algorithm based on wireless sensor networks,†in 2019 IEEE international conference on mechatronics and automation (ICMA), IEEE, 2019, pp. 690–694.
W. Adhiwibowo, A. M. Hirzan, and M. S. Suprayogi, “Peningkatan Keamanan Data End-to-End Smart Door Menggunakan Advanced Encryption Standard,†J. ELTIKOM J. Tek. Elektro, Teknol. Inf. dan Komput., vol. 6, no. 2, pp. 186–194, 2022.
A. Orobosade, T. A. Favour-Bethy, A. B. Kayode, and A. J. Gabriel, “Cloud application security using hybrid encryption,†Commun. Appl. Electron., vol. 7, no. 33, pp. 25–31, 2020.
P. M. Chanal and M. S. Kakkasageri, “Hybrid algorithm for data confidentiality in Internet of Things,†in 2019 10th International Conference on Computing, Communication and Networking Technologies (ICCCNT), IEEE, 2019, pp. 1–5.
S. Farooq and P. Chawla, “A novel approach of asymmetric key generation in symmetric AES via ECDH,†Int. J. Syst. Assur. Eng. Manag., vol. 11, no. 5, pp. 962–971, 2020.
R. H. Prayitno, S. A. Sudiro, and S. Madenda, “Avoiding Lookup Table in AES Algorithm,†in 2021 Sixth International Conference on Informatics and Computing (ICIC), IEEE, 2021, pp. 1–6.
L. Widyawati, H. Husain, M. Azwar, and M. C. S. Girsang, “Analisa Perbandingan Hybrid Cryptography RSA-AES dan ECDH-AES untuk Keamanan Pesan,†J. Teknol. Inf. dan Komput., vol. 9, no. 2, 2023.
G. Kanda, A. O. A. Antwi, and K. Ryoo, “Hardware architecture design of AES cryptosystem with 163-bit elliptic curve,†in Advanced Multimedia and Ubiquitous Engineering: MUE/FutureTech 2018 12, Springer, 2019, pp. 423–429.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2023 Jurnal ELTIKOM : Jurnal Teknik Elektro, Teknologi Informasi dan Komputer
This work is licensed under a Creative Commons Attribution-NoDerivatives 4.0 International License.
All accepted papers will be published under a Creative Commons Attribution 4.0 International (CC BY 4.0) License. Authors retain copyright and grant the journal right of first publication. CC-BY Licenced means lets others to Share (copy and redistribute the material in any medium or format) and Adapt (remix, transform, and build upon the material for any purpose, even commercially).