Abstract


Security has been a burning issue for IoT devices recently. This includes cryptographic vulnerabilities also which can lead to unauthorized access, data breaches, manipulation of device functionality, and compromise the security and privacy of both the devices and their users. Not only encrypting and decrypting data but also sending them over an insecure network becomes more difficult for an IoT device because of its less computational power, especially in large data. As a result, this increases security risks and runtime, decreases its performance, and consumes more resources. So, an innovative solution is proposed to solve this issue with a cryptographic system called HELO cryptography. This stands for “Hybrid Encryption Lightweight Optimization”. It is hybridized and gives strong protection against several crucial cryptographic cyberattacks. However, the main objective of this research is to maximize the security level of IoT devices without reducing their performance. This system is ideal for resource-constrained devices because of its lightweight mechanism. Lastly, it offers top-level cryptographic security for IoT devices by ensuring integrity, authenticity, and confidentiality while doing P2P data transmission.

Keywords: Cybersecurity, Iot Security, Cryptography, Lightweight, P2P Data Transmission


How To Encrypt & Decrypt File


Encryption:
  • Upload your file
  • Click on "Encrypt" button to execute the program
  • The encrypted file will downloaded automatically along with the digital signature and shared key
Decryption:
  • Unzip the downloaded folder
  • Upload the encrypted file
  • Upload the digital signature
  • Upload the shared key
  • Click on "Decrypt" button to get the decrypted file

File Encryption

File Decryption


Advantages


  • Enhanced Security: Data access is highly secured, making unauthorized access without proper credentials impossible. Also, intruders cannot breach the entire system at once due to its multi-layered security approach. With limited resources can implement robust security measures.
  • Platform Independent: Our algorithm is platform independent, meaning that it runs smoothly regardless of the hardware specification due to its structure as it uses minimal computational power.
  • Reduce Power Consumption: Since the HELO algorithm uses minimal computational resources, it also means that its power cost is also very low, which means that it does not require much power and in the long run when dealing with lots of data, the cumulative cost reduction in power will be reduced significantly.
  • Prolong Battery Life: As it uses minimal power, it means that there is not much pressure on the battery or power supply it uses from, hence it also means that in the long run for devices with low battery capacity.
  • Lower Processing Requirements: As the complexity of the algorithm is simplified compared to other complex algorithms, the processing time is also lower in comparison to those algorithms.
  • Minimal Memory Use: The HELO algorithm uses minimal memory which is effective for devices with minimal memory.
  • Faster Execution: The algorithm executes very fast which means that it is efficient due to its minimal memory usage.
  • Reduce Latency: Faster execution leads to reduced latency, thus improving the overall performance of IoT devices.
  • Cost Effective: Due to its nature in reduced power consumption, prolonged battery life, and minimal memory usage, it fuses to give a cost-effective solution for most IoT systems.


Source Code



Publication


Journal:
  • Coming Soon!