A Vithya Vijayalakshmi, Dr. L. Arockiam


Internet of Things (IoT) plays a vital role in the field of Information Technology, Industries and Healthcare etc. As data in IoT applications will be related to the physical realm, ensuring data security is a primary constraint for many cases. Because in the IoT context not only users, but also authorized objects may access data. Security represents a critical component for enabling the widespread adoption of IoT technologies and applications. Therefore this paper proposes a multilevel encryption technique to enhance the security of the IoT data. In this approach the data sensed from the IoT devices are encrypted in the gateway using Merkle-Hellman encryption and Elliptic Curve Cryptography (ECC) to ensure the security of the data.


Internet of Things, Data Security, ECC, Merkle-Hellman Cryptosystem

Full Text:



Isha and Ashish Kr. Luhach, “Analysis of Lightweight Cryptographic Solutions for Internet of Things”, Indian Journal of Science and Technology, 2016, ISSN: 0974-6846, Vol. 9. Iss.28, pp. 1-7.

P. Nandhini and Dr.V.Vanitha, “A Study of Lightweight Cryptographic Algorithms for IoT”, International Journal of Innovations and Advancement in Computer Science, 2017, ISSN: 2347-8616, Vol.6, Iss.1, pp. 26-35.

S.D.Pingle, “A Survey of Latest Trends in Cryptography and Elliptic Curve Cryptography”, International Journal of Scientific Research and Education, 2016, ISSN: 2321-7574, Vol.4, Iss.5, pp. 5294-5301.

Arghya Roy and Santhoshi Bhat, “Enhancement of Merkle-Hellman Knapack Cryptosystem by use of Discrete Logarithmics”, International Journal of Scientific and Research Publications, 2013, ISSN: 2250-3153, Vol.3, Iss.4, pp. 1-4.

Koblitz. N, “Elliptic Curve Cryptosystems”, Mathematics of Computation, 1987, Vol. 48, Iss. 177, pp. 203-209.

Miller. V, “Use of Elliptic Curves in Cryptography”, CRYPTO’85, Springer-Verlag, 1986, pp.417-426.

Laiphrakpam Dolendra Singh and Khumanthem Manglem Singh, “Implementation of Text Encryption using Elliptic Curve Cryptography”, Elsevier, Internation Multi-Conference on Information Processing, 2015, pp. 1 -10.

Alfred J.Menezes, Paul C.van Oorschot and Scott A. Vanstone, “Handbook of Applied Cryptography”, Massachusetts Institute of Technology, 1996.

Daisy Premila Bai T, Albert Rabara S and Vimal Jerald M, “Elliptic Curve Cryptography based Security Framework for Internet of Things and Cloud Computing”, Recent Advances on Computer Engineering, 2015, pp. 1 -10.

Mailov Arif, Abbasov Habib, Isayev Rufat and Safaeov Azer, “Study and Implementation of Elliptic Curve Encryption Algorithm for Azerbaijan E-ID Card”, 2015, ISSN: 2320-9798, Vol.3, Iss. 5, pp. 3708-3713.

DOI: https://doi.org/10.26483/ijarcs.v8i9.4959


  • There are currently no refbacks.

Copyright (c) 2018 International Journal of Advanced Research in Computer Science