International Journal of Engineering

International Journal of Engineering

Achieving Enhanced Efficiency and Security in IoT: A Hybrid Encryption Approach with ECC and Blowfish

Document Type : Original Article

Authors
1 Department of Electrical Engineering, ST.C., Islamic Azad University, Tehran, Iran
2 Department of Computer Engineering, ST.C., Islamic Azad University, Tehran, Iran
Abstract
The rapid proliferation of the Internet of Things (IoT) has heightened the urgency to address security vulnerabilities inherent in resource-constrained connected devices. Protecting sensitive user information underscores the necessity of securing personal data. Unauthorized access threats require advanced encryption solutions to enhance security and optimize system performance. This study proposes a novel hybrid encryption framework that uniquely combines asymmetric Elliptic Curve Cryptography (ECC) with a symmetric Blowfish algorithm. Unlike conventional methods such as RSA, AES, or standalone ECC, our approach integrates these techniques innovatively to achieve superior efficiency and security. Furthermore, a new adaptive encryption protocol is developed, optimized for data volume and device capabilities. Blowfish efficiently encrypts large data (over 64 KB) while maintaining speed. Additionally, ECC employs smaller key sizes, enhancing security without significant processing overhead. This research used data from various IoT devices like sensors, wearable gadgets, smart home systems, traffic, and industrial tools, tested both in labs and real-world settings. The data included various types of sensitive information, with each dataset averaging over 50 KB. Furthermore, all experiments were implemented on a system with a dual-core Intel processor at 2.5 GHz, ensuring a consistent performance evaluation. Compared to traditional cryptographic solutions such as RSA, AES, and standalone ECC implementations, our approach demonstrates a significant improvement in execution time—greater than 15%—and substantially enhances overall efficiency. This research shows that our hybrid approach improves IoT security while saving processing power and energy, helping future device performance.

Graphical Abstract

Achieving Enhanced Efficiency and Security in IoT: A Hybrid Encryption Approach with ECC and Blowfish
Keywords

Subjects


  1. Rana M, Mamun Q, Islam R. Lightweight cryptography in IoT networks: A survey. Future Generation Computer Systems. 2022;129:77-89. 10.1016/j.future.2021.11.011
  2. Kumar V, Malik N, Singla J, Jhanjhi N, Amsaad F, Razaque A. Light weight authentication scheme for smart home iot devices. Cryptography. 2022;6(3):37. 10.3390/cryptography6030037
  3. Liao Y, Tang Z, Gao K, Trik M. Optimization of resources in intelligent electronic health systems based on Internet of Things to predict heart diseases via artificial neural network. Heliyon. 2024;10(11). j. heliyon. 2024.e32090
  4. Panahi U, Bayılmış C. Enabling secure data transmission for wireless sensor networks based IoT applications. Ain Shams Engineering Journal. 2023;14(2):101866. 10.1016/j.asej.2022.101866
  5. Khezri E, Zeinali E, Sargolzaey H. SGHRP: Secure Greedy Highway Routing Protocol with authentication and increased privacy in vehicular ad hoc networks. Plos one. 2023;18(4):e0282031. 10.1371/journal.pone.0282031
  6. Trik M, Molk AMNG, Ghasemi F, Pouryeganeh P. A hybrid selection strategy based on traffic analysis for improving performance in networks on chip. Journal of Sensors. 2022;2022(1):3112170. 10.1155/2022/3112170
  7. Nasiraee H, Ashouri-Talouki M. DoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation. International Journal of Engineering Transactions C: Aspects. 2019;32(9):1290-8. 10.5829/ije.2019.32.09c.09
  8. Devi RA, Arunachalam A. Enhancement of IoT device security using an Improved Elliptic Curve Cryptography algorithm and malware detection utilizing deep LSTM. High-Confidence Computing. 2023;3(2):100117. 10.1016/j.hcc.2023.100117
  9. Trik M, Pour Mozaffari S, Bidgoli AM. Providing an adaptive routing along with a hybrid selection strategy to increase efficiency in NoC‐based neuromorphic systems. Computational Intelligence and Neuroscience. 2021;2021(1):8338903. 10.1155/2021/8338903
  10. Wang Z, Jin Z, Yang Z, Zhao W, Trik M. Increasing efficiency for routing in internet of things using binary gray wolf optimization and fuzzy logic. Journal of King Saud University-Computer and Information Sciences. 2023;35(9):101732. 10.1016/j.jksuci.2023.101732
  11. Puneeth R, Parthasarathy G. Security and data privacy of medical information in blockchain using lightweight cryptographic system. International Journal of Engineering Transactions B: Applications. 2023;36(5):925-33. 10.5829/ije.2023.36.05b.09
  12. Fadia T, Toufik L. Elliptic curves cryptography for lightweight devices in IoT system. Brazilian Journal of Technology. 2024;7(4):e73725-e. 10.38152/bjtv7n4-003
  13. Mahandru T KR. A study on the impact of cloud computing on the digital transformation of organizations. International Journal of Computer Applications. 2018;179(22):41-4. 10.5120/ijca2018916422
  14. Bhagwatrao G, Lakshmanan R. A Novel Approach to use Deep Dyna Q Learning for Enhancing Selection and Performace of Encryption and Hashing Techniques in Remote Healthcare Environment. International Journal of Engineering Transactions A: Basics. 2024;38(1). 10.5829/ije.2025.38.01a.07
  15. Prashant MSH, Amrinder Kaur, Pankaj Yadav. . Comparative analysis of AES and RSA with other encryption techniques for secure communication. International Journal of Scientific Research in Computer Science Engineering and Information Technology. 2024;10(2):565-74. 10.32628/CSEIT2410263
  16. Qader RAHA, AL-Wattar AHS. A Review of the Blowfish Algorithm Modifications in Terms of Execution Time and Security. Technium Science Journal. 2022;4(9):89-101. 10.47577/technium. v4i9
  17. Kapalova N, Algazy K, Haumen A. DEVELOPMENT OF A NEW LIGHTWEIGHT ENCRYPTION ALGORITHM. Eastern-European Journal of Enterprise Technologies. 2023;123(9). 10.15587/1729-4061.2023.280055
  18. Trick M, Boukani B. Placement algorithms and logic on logic (LOL) 3D integration. Journal of mathematics and computer science. 2014;8(2):128-36. 10.22436/jmcs.08.02.04
  19. Obaidat M, Brown J, Obeidat S, Rawashdeh M. A hybrid dynamic encryption scheme for multi-factor verification: a novel paradigm for remote authentication. Sensors. 2020;20(15):4212. 10.3390/s20154212
  20. Olutola A, Olumuyiwa M. Comparative analysis of encryption algorithms. European Journal of Technology. 2023;7(1):1-9. 10.47672/ejt.1312
  21. Lo O, Buchanan WJ, Carson D, editors. Correlation power analysis on the PRESENT block cipher on an embedded device. Proceedings of the 13th International Conference on Availability, Reliability and Security; 2018. 10.1145/3230833.3232801
  22. Khezri E, Zeinali E, Sargolzaey H. A Novel Highway Routing Protocol in Vehicular Ad Hoc Networks Using VMaSC‐LTE and DBA‐MAC Protocols. Wireless communications and mobile computing. 2022;2022(1):1680507. 10.1155/2022/1680507
  23. Khalafi M, Boob D, editors. Accelerated primal-dual methods for convex-strongly-concave saddle point problems. International conference on machine learning; 2023: PMLR. 10.48550/arXiv.2209.04604
  24. Khezri E, Yahya RO, Hassanzadeh H, Mohaidat M, Ahmadi S, Trik M. DLJSF: data-locality aware job scheduling IoT tasks in fog-cloud computing environments. Results in Engineering. 2024;21:101780. 10.1016/j.rineng.2024.101780
  25. Ding X, Yao R, Khezri E. An efficient algorithm for optimal route node sensing in smart tourism Urban traffic based on priority constraints. Wireless Networks. 2024;30(9):7189-206. 10.21203/rs.3.rs-3276051/v1
  26. Zhu J, Hu C, Khezri E, Ghazali MMM. Edge intelligence-assisted animation design with large models: a survey. Journal of Cloud Computing. 2024;13(1):48. 10.1186/s13677-024-00601-3
  27. Hosseini A, Rahaeifard M, Mojahedi M. Analytical and numerical investigations of the ultrasonic microprobe considering size effects. Mechanics of Advanced Materials and Structures. 2020;27(24):2043-51. 10.1080/15376494.2018.1539890
  28. Karabulut E, Gholizadeh F, Akhavan-Tabatabaei R. The value of adaptive menu sizes in peer-to-peer platforms. Transportation Research Part C: Emerging Technologies. 2022;145:103948. 10.2139/ssrn.4073150
  29. Golovko G, Kalynovych M. SPECIFICS OF IMPLEMENTATION OF THE ASYMMETRIC ENCRYPTION ALGORITHM ON ELLIPTIC CURVES. Системи управління, навігації та зв’язку Збірник наукових праць. 2023;1(71):84-90. 10.26906/SUNZ.2023.1.084
  30. Goyal TK, Sahula V, Kumawat D. Energy efficient lightweight cryptography algorithms for IoT devices. IETE Journal of Research. 2022;68(3):1722-35. 10.1080/03772063.2019.1670103