Smart City Gnosys

Smart city article details

Title A Hybrid Cryptographic Cipher Solution For Secure Communication In Smart Cities
ID_Doc 2150
Authors Alatawi M.N.
Year 2023
Published International Journal of Computer Networks and Applications, 10, 5
DOI http://dx.doi.org/10.22247/ijcna/2023/223423
Abstract The proliferation of sensor networks and other Internet of Things devices has prompted growing privacy and safety concerns. These devices have very little memory, computing power, and storage space. Security for low-powered IoT devices, such as RFID tags, nodes in wireless sensor networks (WSNs), etc., has become increasingly difficult. So, enough security for these devices was achieved by the development of lightweight cryptographic algorithms. In recent years, "smart cities" have emerged to improve contemporary lifestyles and further social development. These are enabled by developments in ICT and may open up new avenues for social and economic development. However, not everything is as secure and private as we hope it will be. The effects of the Internet of Things on IoT-based data transmission networks have been the subject of extensive study over the past few decades. Due to this flaw in the authentication process, verifying the identification of such people safely is extremely difficult. The study's goal is to provide a safe authentication technique for IoT that makes use of Hybrid and Adaptive Cryptography (HAC). In this study, we focus on authentication as a potential security risk in IoT data transmission networks. The study proposes a hybrid and adaptive cryptography (HAC) approach to authentication for the Internet of Things as a means of resolving this issue. The proposed technique of cryptographic protection makes use of the exclusive-or (Ex-or) operation, a hashing function, and a hybrid encryption strategy based on the Rivest Shamir Adleman (RSA) and the Advanced Encryption Standard (AES) algorithms. The proposed solution is simple to implement while effectively overcoming the cryptographic system's constraints via a hybrid encryption mechanism. Using the Diffie-Hellman key exchange protocol, the RSA algorithm for privacy, and the SHA-1 algorithm for authenticity, this study aims to provide a unified security architecture for modern networks. © 2023 EverScience Publications. All rights reserved
Author Keywords AES; Authentication; Cryptography; GPS; HAC; IoT; RFID; RSA; SHA; Smart City; WSN


Similar Articles


Id Similarity Authors Title Published
25826 View0.91Pandey S.; Bhushan B.Exploring The Viability And Effectiveness Of Lightweight Cryptographic Techniques In Enhancing The Iot Data Security Of Smart CitiesProceedings of International Conference on Computational Intelligence and Sustainable Engineering Solution, CISES 2023 (2023)
35256 View0.905Rana M.; Mamun Q.; Islam R.Lightweight Cryptography In Iot Networks: A SurveyFuture Generation Computer Systems, 129 (2022)
29755 View0.901Mathews R.; Jose D.V.Hybrid Homomorphic-Asymmetric Lightweight Cryptosystem For Securing Smart Devices: A ReviewTransactions on Emerging Telecommunications Technologies, 35, 1 (2024)
9105 View0.896David V.; Ragu H.; Nikhil V.; Sasikumar P.Analysis Of Algorithms For Effective Cryptography For Enhancement Of Iot SecurityLecture Notes in Networks and Systems, 396 (2023)
35244 View0.891Khalique A.; Siddiqui F.; Ahad M.A.; Hussain I.Lightweight Authentication For Iot Devices (Laid) In Sustainable Smart CitiesScientific Reports, 15, 1 (2025)
35254 View0.891Rajesh S.M.; Prabha R.Lightweight Cryptographic Approach To Address The Security Issues In Intelligent Applications: A SurveyIDCIoT 2023 - International Conference on Intelligent Data Communication Technologies and Internet of Things, Proceedings (2023)
3069 View0.885Hazzaa F.; Hasan M.M.; Qashou A.; Yousef S.A New Lightweight Cryptosystem For Iot In Smart City EnvironmentsMesopotamian Journal of CyberSecurity, 4, 3 (2024)
2311 View0.883Guo H.; Li X.; Qin H.A Lightweight And Secure Certificateless Encryption Scheme For Smart City Iot SecurityDiscover Computing, 28, 1 (2025)
4211 View0.881Alotaibi A.; Aldawghan H.; Aljughaiman A.A Review Of The Authentication Techniques For Internet Of Things Devices In Smart Cities: Opportunities, Challenges, And Future DirectionsSensors, 25, 6 (2025)
35277 View0.881Joshi M.; Mazumdar B.; Dey S.Lightweight Security Protocols For Securing Iot Devices In Smart CitiesAdvanced Sciences and Technologies for Security Applications (2021)