INFORMATION SECURITY FRAMEWORK INTEGRATING CRYPTOGRAPHY FOR SECURE INTERNET OF THINGS COMMUNICATION

Zainal Syahlan (1), Khalid Al-Shaibani (2), Layla Al-Farsi (3)
(1) Sekolah Tinggi Teknologi Angkatan Laut, Indonesia,
(2) University of Thi-Qar, Iraq,
(3) University of Babylon, Iraq

Abstract

The rapid growth of the Internet of Things (IoT) has introduced significant security challenges due to the increasing interconnectivity of devices and the sensitive nature of the data exchanged. Securing IoT communications is crucial to prevent unauthorized access, data breaches, and cyberattacks. However, traditional cryptographic methods often fail to meet the unique needs of IoT systems, which are constrained by resource limitations such as processing power and energy consumption. This research aims to develop a comprehensive information security framework that integrates cryptographic protocols tailored to secure IoT communications while maintaining efficiency. The study employs a mixed-methods approach, combining simulation-based experiments and expert interviews. Various cryptographic techniques, including AES, RSA, and Elliptic Curve Cryptography (ECC), are evaluated in IoT network configurations across different environments. Performance metrics such as encryption time, energy consumption, and data integrity are measured to assess the framework’s effectiveness. The results demonstrate that ECC offers the best balance between security and resource consumption, outperforming AES and RSA in terms of efficiency. Expert feedback confirms the feasibility and scalability of the proposed framework. This research contributes to the field by offering a novel approach to IoT security that can be applied to real-world networks, ensuring secure and efficient communication.

Full text article

Generated from XML file

References

Ahmed, O., Tennie, F., & Magri, L. (2025). Optimal training of finitely sampled quantum reservoir computers for forecasting of chaotic dynamics. Quantum Machine Intelligence, 7(1), 31. https://doi.org/10.1007/s42484-025-00261-9

Alier, M., Pereira, J., García-Peñalvo, F. J., Casañ, M. J., & Cabré, J. (2025). LAMB: An open-source software framework to create artificial intelligence assistants deployed and integrated into learning management systems. Computer Standards & Interfaces, 92, 103940. https://doi.org/10.1016/j.csi.2024.103940

Arun, M., Barik, D., Othman, N. A., Praveenkumar, S., & Tudu, K. (2025). Investigating the performance of AI-driven smart building systems through advanced deep learning model analysis. Energy Reports, 13, 5885–5899. https://doi.org/10.1016/j.egyr.2025.05.003

Ayd?n, Y., Garipcan, A. M., & Özkaynak, F. (2025). A novel post-processing approach for improving minimum nonlinearity in S-boxes: A case study based on 2D hyper chaotic Schaffer transformation map. Expert Systems with Applications, 289, 128067. https://doi.org/10.1016/j.eswa.2025.128067

Bai, X., Zhang, L., Feng, Y., Yan, H., & Mi, Q. (2025). Multivariate temperature prediction model based on CNN-BiLSTM and RandomForest. The Journal of Supercomputing, 81(1), 162. https://doi.org/10.1007/s11227-024-06689-3

Farshadinia, H., Barati, A., & Barati, H. (2025). A secure and energy-efficient architecture in Internet of Things–cloud computing network by enhancing and combining three cryptographic techniques via defining new features, areas, and entities. The Journal of Supercomputing, 81(8), 944. https://doi.org/10.1007/s11227-025-07390-9

Gaitan, N. C., Batinas, B. I., Ursu, C., & Crainiciuc, F. N. (2025). Integrating Artificial Intelligence into an Automated Irrigation System. Sensors, 25(4), 1199. https://doi.org/10.3390/s25041199

Gao, J., & Ying, Z. (2025). A Robust Dynamic Searchable Encryption Framework Supporting Secondary Confirmation for Secure Cloud Environments. 2025 3rd International Conference on Big Data and Privacy Computing (BDPC), 80–89. https://doi.org/10.1109/BDPC63545.2025.11135870

Han, L., Hu, G., Li, X., Xia, F., Wang, S., & You, L. (2025). A Novel Lattice-Based Blockchain Infrastructure and Its Application on Trusted Data Management. IEEE Transactions on Network Science and Engineering, 12(4), 2524–2536. https://doi.org/10.1109/TNSE.2025.3550158

Hou, X., Zhang, Ying, Liu, Y., Xia, Q., Zhang, Yinan, Wang, J., Li, J., Wang, F., Wang, L., Liu, H., & Fan, C. (2025). A DNA origami framework cryptosystem with nanoconfinement control of fluorescence logic permutations. Science Advances, 11(49), eaea7518. https://doi.org/10.1126/sciadv.aea7518

Jiang, Y., Niu, B., Zhao, T., Zhao, X., Wang, X., & Wang, H. (2025). Intelligent Consensus Asymptotic Tracking Control for Nonlinear Multiagent Systems Under Denial-of-Service Attacks. IEEE Transactions on Automation Science and Engineering, 22, 776–787. https://doi.org/10.1109/TASE.2024.3354047

Lai, Q., & Liu, Y. (2025). A family of image encryption schemes based on hyperchaotic system and cellular automata neighborhood. Science China Technological Sciences, 68(3), 1320401. https://doi.org/10.1007/s11431-024-2678-7

Li, J., Yang, L., Hao, W., Ahmad, I., Liu, H., Shu, F., & Niyato, D. (2025). Multi-Layer Transmitting RIS-Aided Receiver for Collaborative Jamming and Anti-Jamming Networks. IEEE Transactions on Wireless Communications, 24(8), 6518–6534. https://doi.org/10.1109/TWC.2025.3554386

Lim, S., & Oh, J. (2025). Navigating Privacy: A Global Comparative Analysis of Data Protection Laws. IET Information Security, 2025(1), 5536763. https://doi.org/10.1049/ise2/5536763

Liu, Z., Yu, X., Liu, N., Liu, C., Jiang, A., & Chen, L. (2025). Integrating AI with detection methods, IoT, and blockchain to achieve food authenticity and traceability from farm-to-table. Trends in Food Science & Technology, 158, 104925. https://doi.org/10.1016/j.tifs.2025.104925

Maragathavalli, K., & Jothi, R. M. J. (2025). Advanced Cryptographic Schemes Using Prism Graphs for Secure Data Transmission. 2025 4th International Conference on Distributed Computing and Electrical Circuits and Electronics (ICDCECE), 1–9. https://doi.org/10.1109/ICDCECE65353.2025.11035375

Mishra, D., & Rewal, P. (2025). A blockchain-based quantum-secure protocol for efficient V2I handover authentication in vehicular Ad-Hoc networks. Peer-to-Peer Networking and Applications, 18(6), 304. https://doi.org/10.1007/s12083-025-02142-1

Othman, S. B., & Getahun, M. (2025). Leveraging blockchain and IoMT for secure and interoperable electronic health records. Scientific Reports, 15(1), 12358. https://doi.org/10.1038/s41598-025-95531-8

Pavan Nishith, V. S. S., Saha, A., & Patwari, A. (2025). A novel modification and hardware implementation of the simplified AES algorithm for IoT applications. Results in Engineering, 27, 106567. https://doi.org/10.1016/j.rineng.2025.106567

Peng, X., Zheng, C., Shi, J., & Cui, X. (2026). A decentralized defense model for covert zero-dynamic attacks in industrial control systems. Reliability Engineering & System Safety, 265, 111483. https://doi.org/10.1016/j.ress.2025.111483

Pushpendra, & Naidu, B. S. (2025). Luminescent nanomaterials based covert tags for anti-counterfeiting applications: A review. Advances in Colloid and Interface Science, 341, 103480. https://doi.org/10.1016/j.cis.2025.103480

Ramachandraiah, J., Basavaraja, P. H., Channabasava, U., Venkatachalam, C., & Kumaran, Y. (2025). A Chaotic Model?Based Dynamic Resource Allocation and Adaptive Task Offloading With Lightweight Encryption in Multi?Access Edge Computing. Concurrency and Computation: Practice and Experience, 37(27–28), e70448. https://doi.org/10.1002/cpe.70448

Scholvin, S., & Kalvelage, L. (2025). New development paths through green hydrogen?: An ex-ante assessment of structure and agency in Chile and Namibia. Energy Research & Social Science, 120, 103904. https://doi.org/10.1016/j.erss.2024.103904

Singamaneni, K. K. (2025). A novel lightweight hybrid cryptographic framework for secure smart card operations. EURASIP Journal on Information Security, 2025(1), 19. https://doi.org/10.1186/s13635-025-00204-8

Tang, J., Lu, M., & Zhang, Z. (2025). A novel asymmetric encryption framework based on a 2D hyperchaotic map and enhanced S-box for secure medical image transmission. Physica Scripta, 100(1), 015239. https://doi.org/10.1088/1402-4896/ad99a0

Temara, S., Bhagyalakshmi, L., Suman, S. K., Shakunthala, M., Chitra, N. T., & Golla, K. (2025). Cryptography Innovations for Securing Data in the Quantum Computing Era: Integrating Machine Learning for Enhanced Security. 2025 International Conference on Computer, Electrical & Communication Engineering (ICCECE), 1–6. https://doi.org/10.1109/ICCECE61355.2025.10940245

Tiwari, K., & Kumar, S. (2025). A healthcare data management system: Blockchain-enabled IPFS providing algorithmic solutions for increased privacy-preserving scalability and interoperability. The Journal of Supercomputing, 81(8), 895. https://doi.org/10.1007/s11227-025-07400-w

Wang, D., Li, J., Lv, Q., He, Y., Li, L., Hua, Q., Alfarraj, O., & Zhang, J. (2025). Integrating Reconfigurable Intelligent Surface and AAV for Enhanced Secure Transmissions in IoT-Enabled RSMA Networks. IEEE Internet of Things Journal, 12(8), 9405–9419. https://doi.org/10.1109/JIOT.2024.3523500

Wang, W., & Xian, H. (2025). Adaptive Selective Encryption for Surveillance Videos via Hierarchical Grading and YOLO Detection. 2025 34th International Conference on Computer Communications and Networks (ICCCN), 1–6. https://doi.org/10.1109/ICCCN65249.2025.11133824

Xin, W., Jiaqian, L., Xueshuang, D., Haoji, Z., & Lianshan, S. (2025). A Survey of Differential Privacy Techniques for Federated Learning. IEEE Access, 13, 6539–6555. https://doi.org/10.1109/ACCESS.2024.3523909

Xu, Y., Wang, H., Zhou, F., Luo, C., Sun, X., Rahardja, S., & Ren, P. (2025). MambaHSISR: Mamba Hyperspectral Image Super-Resolution. IEEE Transactions on Geoscience and Remote Sensing, 63, 1–16. https://doi.org/10.1109/TGRS.2025.3560632

Yu, B., Zhao, J., Zhang, K., Gong, J., & Qian, H. (2025). Lightweight and Dynamic Privacy-Preserving Federated Learning via Functional Encryption. IEEE Transactions on Information Forensics and Security, 20, 2496–2508. https://doi.org/10.1109/TIFS.2025.3540312

Zhang, J. (2025). A Framework for Secure and Scalable Metaverse Environments Leveraging IoT Technologies. IEEE Transactions on Consumer Electronics, 71(2), 5708–5715. https://doi.org/10.1109/TCE.2025.3548588

Zhang, K., Wang, H., Chen, M., Chen, X., Liu, L., Geng, Q., & Zhou, Y. (2025). Leveraging machine learning to proactively identify phishing campaigns before they strike. Journal of Big Data, 12(1), 124. https://doi.org/10.1186/s40537-025-01174-x

Zhang, Y., Lin, P., Chen, J., & Sun, W. (2026). A hybrid cryptosystem for medical image security: Integrating finite fields with conservative hyperchaos. Nonlinear Dynamics, 114(2), 129. https://doi.org/10.1007/s11071-025-11994-4

Authors

Zainal Syahlan
zsyahlan@gmail.com (Primary Contact)
Khalid Al-Shaibani
Layla Al-Farsi
Syahlan, Z., Al-Shaibani, K. ., & Al-Farsi, L. (2026). INFORMATION SECURITY FRAMEWORK INTEGRATING CRYPTOGRAPHY FOR SECURE INTERNET OF THINGS COMMUNICATION. Journal of Computer Science Advancements, 4(1), 27–38. https://doi.org/10.70177/jsca.v4i1.3393

Article Details