Hybrid Data Integrity Verification for Real-Time IoT Systems Using AEAD and VRF with ECDSA

Main Article Content

Harsh Verma, Naga Malleswari Dubba

Abstract

With the rapid growth of the Internet of Things (IoT), maintaining data integrity, confidentiality, and authentication is now an imperative challenge. Most conventional cryptographic solutions cannot satisfy the specific constraints of IoT environments, which include limited computational resources, energy efficiency, and scalability. This study proposes a lightweight hybrid cryptographic framework combining Authenticated Encryption with Associated Data (AEAD) and Verifiable Random Functions (VRF) with Elliptic Curve Digital Signature Algorithm (ECDSA). The hybrid framework is intended to offer robust data integrity, secure authentication, and efficient encryption mechanisms with minimal computational overhead.


Our solution makes use of AEAD (AES-GCM or ChaCha20-Poly1305) in order to establish both confidentiality and integrity within a single encryption process and with much less processing time than in traditional approaches such as AES-CTR with HMAC. Use of VRF guarantees that cryptographic algorithms result in verifiable randomness that increases replay attack and unauthorized entry security. ECDSA is utilized for lightweight digital signatures, providing non-repudiation without the computational overhead being higher than RSA-based integrity mechanisms.


To ensure the efficacy of our methodology, we performed thorough benchmarking tests comparing AEAD + VRF + ECDSA with conventional cryptographic methods like AES-CTR + HMAC and integrity verification based on RSA. It is revealed by our benchmarks that our hybrid solution considerably cuts down encryption time, minimizes CPU utilization, and maximizes memory usage, thus being very suitable for resource-poor IoT devices.


In contrast to AES-CTR + HMAC, which needs independent encryption and authentication phases, AEAD's hybrid approach has the least storage footprint and computational overhead. Furthermore, avoiding a dedicated verification step (necessary in HMAC-based designs) adds to system responsiveness.


Our work adds to the literature through a scalable, effective, and secure cryptographic framework optimized for IoT use cases such as secure messaging, sensor data encryption, and access control in distributed systems. Real-world deployment in IoT platforms, post-quantum cryptographic augmentation, and implementing zero-knowledge proofs (ZKPs) for improved privacy-preserving authentication are next steps.


By solving major problems in IoT security, our hybrid approach provides an efficient yet reliable alternative to state-of-the-art cryptographic solutions to guarantee end-to-end data confidentiality and integrity within contemporary IoT infrastructures.

Article Details

Section
Articles