The Hybrid Cryptographic Algorithms for Secure RFID Data Protection in The Internet of Things

RFID is often used by companies to identify employees and company assets, as well as in supermarkets to identify goods when shopping. In this increasingly sophisticated era, IoT technology has wide applications. The use of RFID technology in IoT networks may pose vulnerabilities to security and priv...

Full description

Bibliographic Details
Main Authors: Alief Vickry Thaha Maulidzart, Robby Harahap, Antonius Irianto Sukowati, Dyah Nur’ainingsih, Widyastuti Widyastuti
Format: Article
Language:English
Published: P3M Politeknik Negeri Banjarmasin 2023-12-01
Series:Jurnal ELTIKOM: Jurnal Teknik Elektro, Teknologi Informasi dan Komputer
Subjects:
Online Access:https://eltikom.poliban.ac.id/index.php/eltikom/article/view/860
_version_ 1797316813322715136
author Alief Vickry Thaha Maulidzart
Robby Harahap
Antonius Irianto Sukowati
Dyah Nur’ainingsih
Widyastuti Widyastuti
author_facet Alief Vickry Thaha Maulidzart
Robby Harahap
Antonius Irianto Sukowati
Dyah Nur’ainingsih
Widyastuti Widyastuti
author_sort Alief Vickry Thaha Maulidzart
collection DOAJ
description RFID is often used by companies to identify employees and company assets, as well as in supermarkets to identify goods when shopping. In this increasingly sophisticated era, IoT technology has wide applications. The use of RFID technology in IoT networks may pose vulnerabilities to security and privacy because it contains sensitive information, and RFID data transmitted over communication channels is vulnerable to attacks. IoT technology has characteristics such as high autonomous data capture rate, network connectivity, and interoperability for services and applications. Therefore, this research aims to improve the security of RFID data by taking into account the characteristics of IoT. The method used is hybrid cryptography by combining AES (Advanced Encryption Standard) and ECDH (Elliptic-curve Diffie-Hellman) keys. AES, as a commonly used symmetric cryptography, is chosen to protect the data, while ECDH, as the latest asymmetric cryptography, is used for a faster and more efficient process compared to previous asymmetric methods. This study utilizes the Python programming language on Jupyter Notebook. The initial step of the study involved scanning the RFID data to be secured and configuring the key on ECDH. The subsequent process included encryption and decryption of the data. The study successfully tested the success of encryption and decryption on RFID UIDs. The test data includes the result display of the hybrid encryption, the encryption and decryption processing time, and the file size of the encryption (ciphertext) and decryption (decodetext). These results show an excellent level of security for RFID UIDs. Only those with a specific key can know the contents of the cipher. It should be noted that this study was only conducted at the program level and was not implemented on hardware. Therefore, the results can be a valuable reference for future research.
first_indexed 2024-03-08T03:24:46Z
format Article
id doaj.art-bfa71b7348264254a33b162baa61cd43
institution Directory Open Access Journal
issn 2598-3245
2598-3288
language English
last_indexed 2024-03-08T03:24:46Z
publishDate 2023-12-01
publisher P3M Politeknik Negeri Banjarmasin
record_format Article
series Jurnal ELTIKOM: Jurnal Teknik Elektro, Teknologi Informasi dan Komputer
spelling doaj.art-bfa71b7348264254a33b162baa61cd432024-02-12T04:09:19ZengP3M Politeknik Negeri BanjarmasinJurnal ELTIKOM: Jurnal Teknik Elektro, Teknologi Informasi dan Komputer2598-32452598-32882023-12-017216016910.31961/eltikom.v7i2.860816The Hybrid Cryptographic Algorithms for Secure RFID Data Protection in The Internet of ThingsAlief Vickry Thaha Maulidzart0Robby Harahap1Antonius Irianto Sukowati2Dyah Nur’ainingsih3Widyastuti Widyastuti4Universitas Gunadarma, IndonesiaUniversitas Gunadarma, IndonesiaUniversitas Cendekia Abditama, IndonesiaUniversitas Gunadarma, IndonesiaUniversitas Gunadarma, IndonesiaRFID is often used by companies to identify employees and company assets, as well as in supermarkets to identify goods when shopping. In this increasingly sophisticated era, IoT technology has wide applications. The use of RFID technology in IoT networks may pose vulnerabilities to security and privacy because it contains sensitive information, and RFID data transmitted over communication channels is vulnerable to attacks. IoT technology has characteristics such as high autonomous data capture rate, network connectivity, and interoperability for services and applications. Therefore, this research aims to improve the security of RFID data by taking into account the characteristics of IoT. The method used is hybrid cryptography by combining AES (Advanced Encryption Standard) and ECDH (Elliptic-curve Diffie-Hellman) keys. AES, as a commonly used symmetric cryptography, is chosen to protect the data, while ECDH, as the latest asymmetric cryptography, is used for a faster and more efficient process compared to previous asymmetric methods. This study utilizes the Python programming language on Jupyter Notebook. The initial step of the study involved scanning the RFID data to be secured and configuring the key on ECDH. The subsequent process included encryption and decryption of the data. The study successfully tested the success of encryption and decryption on RFID UIDs. The test data includes the result display of the hybrid encryption, the encryption and decryption processing time, and the file size of the encryption (ciphertext) and decryption (decodetext). These results show an excellent level of security for RFID UIDs. Only those with a specific key can know the contents of the cipher. It should be noted that this study was only conducted at the program level and was not implemented on hardware. Therefore, the results can be a valuable reference for future research.https://eltikom.poliban.ac.id/index.php/eltikom/article/view/860aesecdhhybrid cryptographicinternet of thingsrfid
spellingShingle Alief Vickry Thaha Maulidzart
Robby Harahap
Antonius Irianto Sukowati
Dyah Nur’ainingsih
Widyastuti Widyastuti
The Hybrid Cryptographic Algorithms for Secure RFID Data Protection in The Internet of Things
Jurnal ELTIKOM: Jurnal Teknik Elektro, Teknologi Informasi dan Komputer
aes
ecdh
hybrid cryptographic
internet of things
rfid
title The Hybrid Cryptographic Algorithms for Secure RFID Data Protection in The Internet of Things
title_full The Hybrid Cryptographic Algorithms for Secure RFID Data Protection in The Internet of Things
title_fullStr The Hybrid Cryptographic Algorithms for Secure RFID Data Protection in The Internet of Things
title_full_unstemmed The Hybrid Cryptographic Algorithms for Secure RFID Data Protection in The Internet of Things
title_short The Hybrid Cryptographic Algorithms for Secure RFID Data Protection in The Internet of Things
title_sort hybrid cryptographic algorithms for secure rfid data protection in the internet of things
topic aes
ecdh
hybrid cryptographic
internet of things
rfid
url https://eltikom.poliban.ac.id/index.php/eltikom/article/view/860
work_keys_str_mv AT aliefvickrythahamaulidzart thehybridcryptographicalgorithmsforsecurerfiddataprotectionintheinternetofthings
AT robbyharahap thehybridcryptographicalgorithmsforsecurerfiddataprotectionintheinternetofthings
AT antoniusiriantosukowati thehybridcryptographicalgorithmsforsecurerfiddataprotectionintheinternetofthings
AT dyahnurainingsih thehybridcryptographicalgorithmsforsecurerfiddataprotectionintheinternetofthings
AT widyastutiwidyastuti thehybridcryptographicalgorithmsforsecurerfiddataprotectionintheinternetofthings
AT aliefvickrythahamaulidzart hybridcryptographicalgorithmsforsecurerfiddataprotectionintheinternetofthings
AT robbyharahap hybridcryptographicalgorithmsforsecurerfiddataprotectionintheinternetofthings
AT antoniusiriantosukowati hybridcryptographicalgorithmsforsecurerfiddataprotectionintheinternetofthings
AT dyahnurainingsih hybridcryptographicalgorithmsforsecurerfiddataprotectionintheinternetofthings
AT widyastutiwidyastuti hybridcryptographicalgorithmsforsecurerfiddataprotectionintheinternetofthings