International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 5 | Views: 127 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2

Research Paper | Computer Science and Information Technology | India | Volume 12 Issue 9, September 2023


IoT Security: Symmetric and Asymmetric Cryptography using RSA algorithm

Sabreen M.A. Abualkas | Yaser M. A. Abualkas


Abstract: The Internet of Things (IoT) has witnessed exponential growth, revolutionizing various industries with its interconnected and smart devices. However, this increased connectivity also introduces significant security challenges, particularly concerning data privacy and integrity. Cryptographic techniques play a crucial role in safeguarding IoT communications from unauthorized access and potential breaches. This paper explores the application of both symmetric and asymmetric cryptography, with a specific focus on the widely-used RSA algorithm, in the context of IoT security. Symmetric encryption, utilizing a shared secret key for both encryption and decryption, offers efficient data transmission suitable for resource-constrained IoT devices. However, challenges arise in managing and securely distributing the shared secret key across multiple devices. On the other hand, asymmetric encryption, exemplified by the RSA algorithm, utilizes a pair of keys - public and private - for encryption and decryption processes, providing secure key exchange and authentication. The RSA algorithm's strength lies in its ability to facilitate secure communication channels and robust authentication mechanisms for IoT devices. The paper discusses the strengths and weaknesses of employing symmetric and asymmetric encryption in IoT security. It analyzes the computational overhead, key management complexity, and communication efficiency associated with each encryption approach. Furthermore, the research highlights the significance of secure communication channels and robust authentication mechanisms in ensuring the confidentiality and integrity of IoT data transmission. By leveraging asymmetric encryption, IoT devices can securely exchange public keys, enhancing the overall security of communication channels. In conclusion, this paper contributes to the existing body of knowledge on IoT security by providing insights into the practical implementation of symmetric and asymmetric cryptography using the RSA algorithm. By understanding the capabilities and limitations of each approach, IoT practitioners can make informed decisions to enhance data security, confidentiality, and authenticity in diverse IoT environments. Ultimately, the integration of both symmetric and asymmetric cryptography offers a comprehensive security solution to address the unique challenges posed by the IoT ecosystem.


Keywords: Internet of Things (IoT), Cryptographic techniques, Symmetric cryptography, Asymmetric cryptography, RSA algorithm, Data privacy, Data integrity, Security challenges, Key management, Authentication mechanisms, Secure communication, Computational overhead, Resource-constrained IoT devices, Public key, Private key, Encryption and decryption, Secure key exchange, IoT data transmission, Confidentiality, Authentication


Edition: Volume 12 Issue 9, September 2023,


Pages: 919 - 923


How to Download this Article?

Type Your Valid Email Address below to Receive the Article PDF Link


Verification Code will appear in 2 Seconds ... Wait

Top