Enhanced Key Exchange And Lightweight Encryption For IOT Security Using Timestamp-Based OTP And Sit

Authors

  • Mohammed Abdul Sameer B.E. Students; Department Of Computer Science And Engineering, ISL Engineering College, Hyderabad, India. Author
  • Mohammed Irfan B.E. Students; Department Of Computer Science And Engineering, ISL Engineering College, Hyderabad, India. Author
  • Haroon B.E. Students; Department Of Computer Science And Engineering, ISL Engineering College, Hyderabad, India. Author
  • Mrs. Imreena Ali Assistant Professor, Department of CSE ISL Engineering College, Hyderabad, India. Author

DOI:

https://doi.org/10.63665/bch8th30

Keywords:

One-Time Password (OTP), RSA Algorithm, Data Security, Secure Data Transmission, Asymmetric Encryption, Key Exchange Mechanism, Data Confidentiality, Data Integrity, User Authentication, Secure Communication

Abstract

In today’s digital era, secure data transmission between a data owner and users is critical. This paper presents a novel framework that combines One-Time Password (OTP) generation with an RSA-based key exchange mechanism to ensure robust data protection. Each time the data owner initiates data sharing; a unique OTP is dynamically generated and encrypted using the RSA algorithm. This OTP acts as a secure access key, ensuring that only authorized users can decrypt and retrieve the shared information. The RSA encryption not only secures the OTP but also establishes a secure communication channel between the data owner and the user, preventing unauthorized access or interception during transmission. By integrating dynamic OTPs with asymmetric encryption, this scheme enhances the confidentiality and integrity of data in environments where security.

Downloads

Download data is not yet available.

References

[1] H. Suo, J. Wan, C. Zou and J. Liu. Security in the internet of things: a review. In Proceedings of the International conference on computer science and electronics engineering, IEEE, 3: 648–651, 2012.

[2] A. M. MohamadAl-Aboosi, S. Kamil, S. N. H. Sheikh Abdullah and K. A. Zainol Ariffin. Lightweight Cryptography for Resource Constraint Devices: Challenges and Recommendation. In Proceedings of the 3rd International Cyber Resilience Conference(CRC), IEEE, 1–6, 2021.

[3] S. Misra, M. Maheswaran, S. Hashmi. Security challenges and approaches in internet of things. Cham: Springer International Publishing, 2017.

[4] I. K. Dutta, B. Ghosh and M. Bayoumi. Lightweight cryptography for internet of insecure things: A survey. In Proceedings of the 9th Annual Computing and Communication Workshop and Conference(CCWC), IEEE, 0475–0481, 2019.

[5] P. Shah, M. Arora and K. Adhvaryu. Lightweight Cryptography Algorithms in IoT-A Study. In Proceedings of the Fourth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(ISMAC), IEEE, 332–336, 2020.

96 V.N.H.Kollipara et al.

[6] S. A. Kumar, T. Vealey and H. Srivastava. Security in internet of things: Challenges, solutions and future directions. In Proceedings of the 49th Hawaii International Conference on System Sciences (HICSS), IEEE, 5772–5781, 2016.

[7] N. A. Gunathilake, A. Al-Dubai and W. J. Buchana. Recent Advances and Trends in Lightweight Cryptography for IoT Security. In Proceedings of the 16th International Conference on Network and Service Management(CNSM), IEEE, 1–5, 2020.

[8] M. Katagi and S. Moriai. “Lightweight cryptography for the internet of things.” Sony Corporation, 7–10, 2008.

[9] T. Eisenbarth, S. Kumar, C. Paar, A. Poschmann and L. Uhsadel. A survey of lightweight-cryptography implementations. IEEE Design & Test of Computers, 24(6):522—533, 2007.

[10] D. M’Raihi, David, S. Machani, M. Pei, and J. Rydell. Totp: Time-based one-time password algorithm, Internet Engineering Task Force, RFC: 6238, 2011.

[11] M’Raihi, David, M. Bellare, F. Hoornaert, D. Naccache, and O. Ranen. Hotp: An hmac-based one-time password algorithm. In The Internet Society, Network Working Group. RFC4226, 2005. [12] M. L. T. Uymatiao and W. E. S. Yu. Time-based OTP authentication via secure tunnel (TOAST): A mobile TOTP scheme using TLS seed exchange and encrypted offline keystore. In Proceedings of the 4th IEEEInternational Conference on Information Science and Technology, IEEE, 225–229, 2014.

[13] D. Kumar, A. Agrawal and P. Goyal. Efficiently improving the security of OTP. In Proceedings of the International Conference on Advances in Computer Engineering and Applications, IEEE, 912–915, 2015.

[14] V. L. Shivraj, M. A. Rajan, M. Singh and P. Bala Muralidhar. One time password authentication scheme based on elliptic curves for Internet of Things (IoT). In Proceedings of the 5th National Symposium on Information Technology: Towards New Smart World, IEEE, 1–6, 2015.

[15] K. S. Roy and H. K. Kalita. A survey on authentication schemes in IoT. In Proceedings of the International Conference on Information Technology(ICIT), IEEE, 202–207, 2017.

[16] M. Abd Zaid, Mustafa, and S. Hassan. Lightweight RSA Algorithm Using Three Prime Numbers. Journal of Engineering and Applied Sciences, 14(5): 9032–9035, 2019.

[17] J. Sahu, V. Singh, V. Sahu, and A. Chopra. An enhanced version of RSA to increase the security. Journal of Network Communication and Emerging Technologies, 7(4), 1–4, 2017.

[18] T. K. Goyal and V. Sahula. Lightweight security algorithm for low power IoT devices. In Proceedings of the International Conference on Advances in Computing, Communications and Informatics (ICACCI), IEEE, 1725–1729, 2016.

[19] V.G. Kumar Kiran, S.J. Mascarenhas, S. Kumar, J. Pais Viven Rakesh. Design and implementation of Tiny encryption algorithm. International Journal of Engineering Research and Applications, 5(6): 94–97, 2015.

[20] R. Beaulieu, D. Shors, J. Smith, S. Treatman-Clark, B. Weeks, and L. Wingers. SIMONandSPECK:BlockCiphersfortheInternet of Things. NIST Lightweight Cryptography Workshop., 1–15, 2015.

[21] M. Usman, I. Ahmed, M.I. Aslam, S. Khan, and U.A. Shah. SIT: a lightweight encryption algorithm for secure internet of things. International Journal of Advanced Computer Science and Applications, 8(1): 1–10, 2017.

Downloads

Published

2026-04-26

How to Cite

Enhanced Key Exchange And Lightweight Encryption For IOT Security Using Timestamp-Based OTP And Sit. (2026). International Journal of Multidisciplinary Engineering In Current Research, 11(4s), 52-57. https://doi.org/10.63665/bch8th30