A Hybrid Cryptography-Based Secure Data Exchange Algorithm for Blockchain-Enabled IoT Systems
DOI:
https://doi.org/10.37547/ijasr-06-05-04Keywords:
Network security, Intrusion Detection Systems (IDS), anomaly detectionAbstract
The rapid development of Internet of Things (IoT) technologies has significantly increased the demand for secure and efficient communication mechanisms. However, traditional security approaches are often unsuitable for IoT environments due to limited computational resources and vulnerability to various cyberattacks. This paper proposes a secure data exchange algorithm based on blockchain technology and hybrid cryptography. The proposed method integrates an enhanced elliptic curve-based digital signature algorithm (EECHERI) with symmetric encryption (AES-192) to ensure authentication, confidentiality, and integrity. A cluster-based architecture is adopted to improve scalability and efficiency, while a dynamic session key generation mechanism enhances security. The communication protocol is designed in seven sequential steps, ensuring secure device-to-device interaction. The proposed approach provides strong resistance against spoofing, replay, and unauthorized access attacks while maintaining low computational overhead, making it suitable for real-world IoT applications.
References
1. Whitfield Diffie and Martin Hellman, “New Directions in Cryptography,” IEEE Transactions on Information Theory, vol. 22, no. 6, pp. 644–654, 1976.
2. Victor S. Miller, “Use of Elliptic Curves in Cryptography,” Advances in Cryptology (CRYPTO’85), Springer, 1986.
3. Neal Koblitz, “Elliptic Curve Cryptosystems,” Mathematics of Computation, vol. 48, no. 177, pp. 203–209, 1987.
4. NIST, “Digital Signature Standard (DSS),” FIPS PUB 186-4, 2013.
5. NIST, “Advanced Encryption Standard (AES),” FIPS PUB 197, 2001.
6. Satoshi Nakamoto, “Bitcoin: A Peer-to-Peer Electronic Cash System,” 2008.
7. Vitalik Buterin, “A Next-Generation Smart Contract and Decentralized Application Platform,” 2014.
8. Dorri, A., Kanhere, S. S., and Jurdak, R., “Blockchain in Internet of Things: Challenges and Solutions,” IEEE Communications Surveys & Tutorials, vol. 19, no. 3, pp. 200–234, 2017.
9. Christidis, K., and Devetsikiotis, M., “Blockchains and Smart Contracts for the Internet of Things,” IEEE Access, vol. 4, pp. 2292–2303, 2016.
10. Alaba, F. A., Othman, M., Hashem, I. A. T., and Alotaibi, F., “Internet of Things Security: A Survey,” Journal of Network and Computer Applications, vol. 88, pp. 10–28, 2017.
11. Hankerson, D., Vanstone, S., and Menezes, A., Guide to Elliptic Curve Cryptography, Springer, 2004.
12. Dobraunig, C., Eichlseder, M., and Mendel, F., “Ascon v1.2: Lightweight Authenticated Encryption,” 2016.
13. Singh, S., Sharma, P. K., Moon, S. Y., and Park, J. H., “Advanced Lightweight Encryption Techniques for IoT,” Future Generation Computer Systems, vol. 49, pp. 1–14, 2019.
14. Zhang, Y., Kasahara, S., Shen, Y., Jiang, X., and Wan, J., “Smart Contract-Based Access Control for IoT,” IEEE Internet of Things Journal, vol. 6, no. 2, pp. 1594–1605, 2019.
15. Xu, X., Weber, I., and Staples, M., Architecture for Blockchain Applications, Springer, 2019.
16. Roman, R., Zhou, J., and Lopez, J., “On the Features and Challenges of Security in IoT,” Computer Networks, vol. 57, no. 10, pp. 2266–2279, 2013.
17. Sicari, S., Rizzardi, A., Grieco, L. A., and Coen-Porisini, A., “Security, Privacy and Trust in IoT,” Computer Networks, vol. 76, pp. 146–164, 2015.
18. Biryukov, A., Dinu, D., and Khovratovich, D., “Argon2: The Memory-Hard Function for Password Hashing,” 2016.
19. Internet of Things xavfsizligi va blokcheyn integratsiyasi bo‘yicha zamonaviy ilmiy sharhlar, Springer, 2025.
20. Blockchain Technology asosida IoT tizimlarida xavfsiz ma’lumot almashish usullari bo‘yicha tadqiqotlar, IEEE, 2024.
Downloads
Published
Issue
Section
License
Copyright (c) 2026 Seidullayev M.K.

This work is licensed under a Creative Commons Attribution 4.0 International License.