• Arkan A. Saffer Information Technology Department, Kalar Technical College, Sulaimani Polytechnic University, Kurdistan Region, Iraq
  • Soran A. Pasha Information Technology Department, Kalar Technical College, Sulaimani Polytechnic University, Kurdistan Region, Iraq
  • Ammar M. Aliakbar Department of IT, College of Computer & IT, University of Garmian, Kalar, Kurdistan Region, Iraq



IoT, Data Security, Cryptography, CSA, ECC, SHA-256


The Internet of Things (IoT) as an important technology consists of a heterogeneous and huge number of devices that generates an enormous amount of data in various applications. However, generating and transmitting huge amount of data in the IoT makes it crucial to implement a secure and safe data transmission scheme. Cryptography methods can secure the confidentiality, data integrity, access control, and authentication. Due to constrained resources in IoT devices, providing classical cryptography schemes isn’t efficient for IoT applications, so a lightweight cryptography scheme is one of the most important solutions to overcome security challenges in IoT. In this paper, a new security scheme called ECCCSASHA256 based on Elliptic Curve Cryptography (ECC) and Secure Hash Algorithm (SHA-256) using Crow Search Algorithm (CSA) has been proposed for secure data transmission in IoT devices. The ECCCSASHA256 model uses the CSA for generating a private key to encode the elliptic curve. Furthermore, the proposed scheme uses SHA-256 model for hashing the incoming encoded data using ECC. The simulation results indicate that the average throughput of the proposed model was about 8.22% and 8.97% higher in encryption and 8.72% and 9.81% higher in decryption compared to 3DES&ECC&SHA-256 and RC4&ECC&SHA-256, respectively.


Askarzadeh, A. (2016). A novel metaheuristic method for solving constrained engineering optimization problems: crow search algorithm. Computers & structures, 169, 1-12.

Das, S., & Namasudra, S. (2022). A Novel Hybrid Encryption Method to Secure Healthcare Data in IoT-enabled Healthcare Infrastructure. Computers and Electrical Engineering, 101, 107991.

Davahli, A., Shamsi, M., & Abaei, G. (2020). Hybridizing genetic algorithm and grey wolf optimizer to advance an intelligent and lightweight intrusion detection system for IoT wireless networks. Journal of Ambient Intelligence and Humanized Computing, 11(11), 5581-5609.

Dhanda, S. S., Singh, B., & Jindal, P. (2020). Lightweight cryptography: a solution to secure IoT. Wireless Personal Communications, 112(3), 1947-1980.

Dhillon, P. K., & Kalra, S. (2019). Secure and efficient ECC based SIP authentication scheme for VoIP communications in internet of things. Multimedia Tools and Applications, 78(16), 22199-22222.

Elhoseny, M., Shankar, K., Lakshmanaprabu, S., Maseleno, A., & Arunkumar, N. (2020). Hybrid optimization with cryptography encryption for medical image security in Internet of Things. Neural computing and applications, 32(15), 10979-10993.

Farah, M., Guesmi, R., Kachouri, A., & Samet, M. (2020). A new design of cryptosystem based on S-box and chaotic permutation. Multimedia Tools and Applications, 79(27), 19129-19150.

Fotohi, R., & Aliee, F. S. (2021). Securing communication between things using blockchain technology based on authentication and SHA-256 to improving scalability in large-scale IoT. Computer Networks, 197, 108331.

Jazebi, S. J., & Ghaffari, A. (2020). RISA: routing scheme for Internet of Things using shuffled frog leaping optimization algorithm. Journal of Ambient Intelligence and Humanized Computing, 11(10), 4273-4283.

Joglekar, J., Bhutani, S., Patel, N., & Soman, P. (2019). Lightweight Elliptical Curve Cryptography (ECC) for Data Integrity and User Authentication in Smart Transportation IoT System. Paper presented at the International Conference on Sustainable Communication Networks and Application.

Kamal, R., Bag, M., & Kule, M. (2021). On the cryptanalysis of S-DES using nature inspired optimization algorithms. Evolutionary Intelligence, 14(1), 163-173.

Kandhoul, N., & Dhurandher, S. K. (2018). An asymmetric RSA-based security approach for opportunistic IoT. Paper presented at the International Conference on Wireless Intelligent and Distributed Environment for Communication.

Kota, S., Padmanabhuni, V. N. R., & Budda, K. (2018). Authentication and encryption using modified elliptic curve cryptography with particle swarm optimization and cuckoo search algorithm. Journal of The Institution of Engineers (India): Series B, 99(4), 343-351.

Kumar, S. S., & Koti, M. S. (2021). An hybrid security framework using internet of things for healthcare system. Network Modeling Analysis in Health Informatics and Bioinformatics, 10(1), 1-10.

Miller, V. S. (1986). Use of elliptic curves in cryptography. Paper presented at the Conference on the theory and application of cryptographic techniques.

Mousavi, S. K., Ghaffari, A., Besharat, S., & Afshari, H. (2021). Improving the security of internet of things using cryptographic algorithms: a case of smart irrigation systems. Journal of Ambient Intelligence and Humanized Computing, 12(2), 2033-2051.

Raja Rajeshwari, K., & Ramakrishnan, M. (2022). Trivial Cryptographic Protocol for Resource-Constraint IoT Device Security Using OECC-KA. In Mobile Computing and Sustainable Informatics (pp. 531-538): Springer.

Reddy, M. I., & Kumar, A. (2020). An efficient data transmission approach using IAES-BE. Cluster Computing, 23(3), 1633-1645.

Roselin Kiruba, R., & Sree Sharmila, T. (2021). Secure data hiding by fruit fly optimization improved hybridized seeker algorithm. Multidimensional systems and signal processing, 32(2), 405-430.

Sadhukhan, D., Ray, S., Biswas, G., Khan, M. K., & Dasgupta, M. (2021). A lightweight remote user authentication scheme for IoT communication using elliptic curve cryptography. The Journal of Supercomputing, 77(2), 1114-1151.

Seyfollahi, A., & Ghaffari, A. (2020). Reliable data dissemination for the Internet of Things using Harris hawks optimization. Peer-to-Peer Networking and Applications, 13(6), 1886-1902.

Verma, O. P., Jain, N., & Pal, S. K. (2020). Design and analysis of an optimal ECC algorithm with effective access control mechanism for big data. Multimedia Tools and Applications, 79(15), 9757-9783.

Wang, Z., Dong, X., Kang, Y., & Chen, H. (2023). Parallel SHA-256 on SW26010 many-core processor for hashing of multiple messages. The Journal of Supercomputing, 79(2), 2332-2355.

Wei, D., Jiang, M., & Deng, Y. (2023). A secure image encryption algorithm based on hyper-chaotic and bit-level permutation. Expert Systems with Applications, 213, 119074.

Zou, L., Ni, M., Huang, Y., Shi, W., & Li, X. (2020a). Hybrid encryption algorithm based on AES and RSA in file encryption. Paper presented at the International Conference on Frontier Computing.

Zou, L., Ni, M., Huang, Y., Shi, W., & Li, X. (2020b, 2020//). Hybrid Encryption Algorithm Based on AES and RSA in File Encryption. Paper presented at the Frontier Computing, Singapore.




How to Cite

Saffer , A. A., Pasha, S. A., & Aliakbar, A. M. (2023). LIGHTWEIGHT CRYPTOGRAPHY METHOD IN THE INTERNET OF THINGS USING ELLIPTIC CURVE AND CROW SEARCH ALGORITHM. Science Journal of University of Zakho, 11(3), 323–332.



Science Journal of University of Zakho