The Hybrid Cryptographic Algorithms for Secure RFID Data Protection in The Internet of Things
DOI:
https://doi.org/10.31961/eltikom.v7i2.860Keywords:
AES, ECDH, Hybrid Cryptographic, internet of things, RFIDAbstract
RFID is often used by companies to identify employees and company assets, as well as in supermarkets to identify goods when shopping. In this increasingly sophisticated era, IoT technology has wide applications. The use of RFID technology in IoT networks may pose vulnerabilities to security and privacy because it contains sensitive information, and RFID data transmitted over communication channels is vulnerable to attacks. IoT technology has characteristics such as high autonomous data capture rate, network connectivity, and interoperability for services and applications. Therefore, this research aims to improve the security of RFID data by taking into account the characteristics of IoT. The method used is hybrid cryptography by combining AES (Advanced Encryption Standard) and ECDH (Elliptic-curve Diffie-Hellman) keys. AES, as a commonly used symmetric cryptography, is chosen to protect the data, while ECDH, as the latest asymmetric cryptography, is used for a faster and more efficient process compared to previous asymmetric methods. This study utilizes the Python programming language on Jupyter Notebook. The initial step of the study involved scanning the RFID data to be secured and configuring the key on ECDH. The subsequent process included encryption and decryption of the data. The study successfully tested the success of encryption and decryption on RFID UIDs. The test data includes the result display of the hybrid encryption, the encryption and decryption processing time, and the file size of the encryption (ciphertext) and decryption (decodetext). These results show an excellent level of security for RFID UIDs. Only those with a specific key can know the contents of the cipher. It should be noted that this study was only conducted at the program level and was not implemented on hardware. Therefore, the results can be a valuable reference for future research.
Downloads
References
S. Gabsi, Y. Kortli, V. Beroulle, Y. Kieffer, A. Alasiry, and B. Hamdi, “Novel ECC-based RFID mutual authentication protocol for emerging IoT applications,” IEEE access, vol. 9, pp. 130895–130913, 2021.
W. Viriyasitavat, T. Anuphaptrirong, and D. Hoonsopon, “When blockchain meets Internet of Things: Characteristics, challenges, and business opportunities,” J. Ind. Inf. Integr., vol. 15, pp. 21–28, 2019.
L. Tawalbeh, F. Muheidat, M. Tawalbeh, and M. Quwaider, “IoT Privacy and security: Challenges and solutions,” Appl. Sci., vol. 10, no. 12, p. 4102, 2020.
J. R. Naif, G. H. Abdul-Majeed, and A. K. Farhan, “Secure IOT system based on chaos-modified lightweight AES,” in 2019 International Conference on Advanced Science and Engineering (ICOASE), IEEE, 2019, pp. 1–6.
R. Munir, “Kriptografi Edisi Kedua,” Bandung. Penerbit Inform., 2019.
R. H. Prayitno, S. A. Sudiro, S. Madenda, and S. Harmanto, “Hardware Implementation Of Galois Field Multiplication For Mixcolumn And Inversemixcolumn Process In Encryption-Decryption Algorithms,” J. Theor. Appl. Inf. Technol., vol. 100, no. 14, 2022.
T. Hidayat and R. Mahardiko, “A Systematic literature review method on aes algorithm for data sharing encryption on cloud computing,” Int. J. Artif. Intell. Res., vol. 4, no. 1, pp. 49–57, 2020.
S. Aikins-Bekoe and J. Ben Hayfron-Acquah, “Elliptic curve diffie-hellman (ECDH) analogy for secured wireless sensor networks,” Int. J. Comput. Appl., vol. 176, no. 10, pp. 1–8, 2020.
R. K. Harahap, E. P. Wibowo, D. Nur’ainingsih, A. K. Wijaya, and R. A. S. C. Anindya, “Dogs Feed Smart System With Food Scales Indicator IoT Based,” in 2022 4th International Conference on Cybernetics and Intelligent System (ICORIS), IEEE, 2022, pp. 1–7.
R. K. Kodali and A. Naikoti, “ECDH based security model for IoT using ESP8266,” in 2016 International conference on control, instrumentation, communication and computational technologies (ICCICCT), IEEE, 2016, pp. 629–633.
T. Yue, C. Wang, and Z. Zhu, “Hybrid encryption algorithm based on wireless sensor networks,” in 2019 IEEE international conference on mechatronics and automation (ICMA), IEEE, 2019, pp. 690–694.
W. Adhiwibowo, A. M. Hirzan, and M. S. Suprayogi, “Peningkatan Keamanan Data End-to-End Smart Door Menggunakan Advanced Encryption Standard,” J. ELTIKOM J. Tek. Elektro, Teknol. Inf. dan Komput., vol. 6, no. 2, pp. 186–194, 2022.
A. Orobosade, T. A. Favour-Bethy, A. B. Kayode, and A. J. Gabriel, “Cloud application security using hybrid encryption,” Commun. Appl. Electron., vol. 7, no. 33, pp. 25–31, 2020.
P. M. Chanal and M. S. Kakkasageri, “Hybrid algorithm for data confidentiality in Internet of Things,” in 2019 10th International Conference on Computing, Communication and Networking Technologies (ICCCNT), IEEE, 2019, pp. 1–5.
S. Farooq and P. Chawla, “A novel approach of asymmetric key generation in symmetric AES via ECDH,” Int. J. Syst. Assur. Eng. Manag., vol. 11, no. 5, pp. 962–971, 2020.
R. H. Prayitno, S. A. Sudiro, and S. Madenda, “Avoiding Lookup Table in AES Algorithm,” in 2021 Sixth International Conference on Informatics and Computing (ICIC), IEEE, 2021, pp. 1–6.
L. Widyawati, H. Husain, M. Azwar, and M. C. S. Girsang, “Analisa Perbandingan Hybrid Cryptography RSA-AES dan ECDH-AES untuk Keamanan Pesan,” J. Teknol. Inf. dan Komput., vol. 9, no. 2, 2023.
G. Kanda, A. O. A. Antwi, and K. Ryoo, “Hardware architecture design of AES cryptosystem with 163-bit elliptic curve,” in Advanced Multimedia and Ubiquitous Engineering: MUE/FutureTech 2018 12, Springer, 2019, pp. 423–429.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2023 Jurnal ELTIKOM : Jurnal Teknik Elektro, Teknologi Informasi dan Komputer
This work is licensed under a Creative Commons Attribution-NoDerivatives 4.0 International License.
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work’s authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal’s published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.