Elliptic Curve Cryptography Algorithm with Recurrent Neural Networks for Attack Detection in Industrial IoT
Elliptic Curve Cryptography Algorithm with Recurrent Neural Networks for Attack Detection in Industrial IoT
1, January 2025
ABSTRACT
The increasing use of Industrial Internet of Things (IIoT) devices has brought about new security
vulnerabilities, emphasizing the need to create strong and effective security solutions. This research
proposes a two-layered approach to enhance security in IIoT networks by combining lightweight
encryption and RNN-based attack detection. The first layer utilizes Improved Elliptic Curve Cryptography
(IECC), a novel encryption scheme tailored for IIoT devices with limited computational resources. IECC
employs a Modified Windowed Method (MWM) to optimize key generation, reducing computational
overhead and enabling efficient secure data transmission between IIoT sensors and gateways. The second
layer employs a Recurrent Neural Network (RNN) for real-time attack detection. The RNN model is trained
on a comprehensive dataset of IIoT network traffic, including instances of Distributed Denial of Service
(DDoS), Man-in-the-Middle (MitM), ransomware attacks, and normal communications. The RNN
effectively extracts contextual features from IIoT nodes and accurately predicts and classifies potential
attacks. The effectiveness of the proposed two-layered approach is evaluated using three phases. The first
phase compares the computational efficiency of IECC to established cryptographic algorithms including
RSA, AES, DSA, Diffie-Hellman, SHA-256 and ECDSA. IECC outperforms all competitors in key
generation speed, encryption and decryption time, throughput, memory usage, information loss, and
overall processing time. The second phase evaluates the prediction accuracy of the RNN model compared
to other AI-based models DNNs, DBNs, RBFNs, and LSTM networks. The proposed RNN achieves the
highest overall accuracy of 96.4%, specificity of 96.5%, precision of 95.2%, and recall of 96.8%, and the
lowest false positive of 3.2% and false negative rates of 3.1%.
KEYWORDS
Industrial Internet of Things (IIoT), Improved Elliptic Curve Cryptography (IECC), RNN, Cryptographic
Algorithms, Attack Detection, Security
1. INTRODUCTION
The Industrial Internet of Things (IIoT) has revolutionized industrial processes by introducing a
new level of connectivity and efficiency [1][2]. However, this increased connectivity also
presents significant security vulnerabilities, making it imperative to safeguard the integrity and
confidentiality of data transmission in IIoT networks [3][4][5]. This research proposes a two-
layered architecture designed to address these concerns and strengthen the security of IIoT
networks. Traditional cryptographic solutions, particularly those based on Elliptic Curve
Cryptography (ECC), face challenges in resource-constrained IIoT devices [6][7]. These
challenges include computational complexity, key management issues, and susceptibility to
various attacks [8]. Moreover, the constantly changing nature of cyber threats requires advanced
DOI: 10.5121/ijcnc.2025.17105 59
International Journal of Computer Networks & Communications (IJCNC) Vol.17, No.1, January 2025
and adaptable detection methods to protect IIoT networks from new intrusions. Ongoing research
in IIoT security frequently deals with the trade-off between strong cryptography and the limited
resources of industrial devices [9]. Additionally, the effectiveness of attack detection mechanisms
varies, with some existing solutions struggling to provide real-time identification and
classification of evolving cyber threats [10]. There exists a critical need for an integrated and
efficient solution that addresses both the cryptographic and detection aspects of IIoT security.
This research proposes a two-layered approach to strengthen IIoT security. The first layer
introduces the Improved Elliptic Curve Cryptography (IECC), a novel encryption scheme
personalized for lightweight environments. IECC addresses the limitations of traditional ECC by
employing a Lightweight ECC Key Generation process based on the Modified Windowed
Method (MWM). This optimization streamlines the scalar multiplication proces, reducing
computational overhead and lightening key management challenges. IECC encompasses key
exchange, digital signatures, and a secure data transmission scheme to ensure confidentiality and
integrity in IIoT communication. The second layer uses a Recurrent Neural Network (RNN)-
based attack detection system. This system conducts contextual feature analysis to extract crucial
attributes from IIoT nodes. This research utilizes a specially designed dataset containing cases of
Distributed Denial of Service (DDoS), Man-in-the-Middle (MitM), ransomware attacks, and
normal communications to train and evaluate the RNN model's attack detection capabilities. The
model architecture involves layers for input processing, embedding, recurrence, dropout, and
output prediction.
The proposed two-layered architecture addresses the critical challenges in IIoT security by
providing a holistic solution. Lightweight ECC ensures cryptographic protection in resource-
constrained devices, overcoming computational overhead and key management issues.
Simultaneously, the RNN-based attack detection layer enhances the resilience of IIoT networks
by offering real-time identification and classification of potential attacks. This research
contributes significantly to the advancement of industrial cybersecurity, offering an integrated
solution for secure data transmission and effective attack detection in IIoT environments. The
proposed methodology undergoes extensive validation, as outlined in the results and discussion
section. The evaluation showcases the efficiency of IECC in secure data transmission and the
accuracy of the RNN model in detecting and classifying various types of attacks. The promising
results underscore the potential of the two-layered approach to significantly enhance the security
of IIoT networks.
The following section discusses the recently developed attack detection models, Section 3
introduces the proposed two-layer architecture for Industrial Internet of Things (IIoT) security.
Section 4 conducts a comparative analysis of the proposed IECC's computational efficiency
against popular cryptographic algorithms and evaluates the predictive performance of the
proposed method against existing popular attack prediction models. Finally, the research is
concluded.
2. LITERATURE REVIEW
Several researchers have proposed deep learning-based IDS models that exhibit superior
performance in identifying and classifying various attack types.
Albara Awajan [11] proposed a deep fully connected (FC) network architecture rooted in deep
learning principles for IIoT network protection. The proposed IDS achieved an average accuracy
of 93.74% in detecting various attacks, including Blackhole, Distributed Denial of Service,
Opportunistic Service, Sinkhole, and Workhole.Hakan Can Altunay et al [12] introduced a hybrid
IDS specifically designed for IIoT networks. Their proposed IDS utilizes a combination of
60
International Journal of Computer Networks & Communications (IJCNC) Vol.17, No.1, January 2025
Convolutional Neural Network (CNN), Long Short-Term Memory (LSTM), and a hybrid
CNN+LSTM model. Rigorous testing demonstrated the hybrid CNN+LSTM model's superior
accuracy in intrusion detection, achieving rates of 93.21% for binary classification and 92.9% for
multi-class classification.Joseph Bamidele Awotunde et al [13] proposed a deep learning model
with rule-based feature selection for IIoT network intrusion detection. This approach addresses
the challenge of gathering relevant information for intelligent IDS development. The proposed
IDS achieved promising results in detecting anomalies in network traffic.Rayeesa Malik et al [14]
introduced an enhanced IDS for IoT-based networks in traffic systems. Their proposed IDS
utilized a deep belief network (DBN) as its core and demonstrated effectiveness in detecting
various attack scenarios.Ho-Myung Kim et al [15] addressed the critical issue of malware
detection in smart factories within the IIoT environment. They proposed an innovative solution
using edge computing and deep learning techniques to enhance cybersecurity. The proposed
malware detection system efficiently processed vast amounts of smart factory IIoT traffic
information, demonstrating its potential for practical implementation.Abbas Yazdinejad et [16] al
focused on accurate threat detection in edge devices within the IIoT framework. They proposed a
parallel ensemble model for threat hunting that employed anomaly detection based on the
behavior of IIoT edge devices. This approach demonstrated the feasibility of edge-based threat
detection in IIoT environments.
Almaiah [17] offered a lightweight Hybrid Deep Learning-based model for the Industrial Internet
of Medical Things. This model consisted of a two-layer security structure integrating blockchain
for user and device authentication, and deep learning to predict potential attacks. The Variational
AutoEncoder (VAE) technique and a Bidirectional Long Short-Term Memory intrusion detection
model were employed for privacy and security respectively. Model training was conducted using
the ToN-IoT datasets and IoT-Botnet, expanding the application of hybrid models to medical
IIoT scenarios. In a study by Al-Abassi et al [18], a Deep Learning-Based Attack Detection
system for IIoT networks was introduced. This innovative model aimed to create balanced
representations from imbalanced datasets, using a Decision Tree (DT) and Deep Neural Network
(DNN) to identify potential attacks. The model was trained and validated with Gas Pipeline (GP)
and Secure Water Treatment (SWaT) datasets, extending the scope of deep learning applications
in IIoT security.
While deep learning models have shown promising results in IIoT intrusion detection, the
computational overhead associated with these models can pose challenges for resource-
constrained IIoT devices.
3. PROPOSED METHODOLOGY
To address the security and integrity of industrial networks, a two-layered architecture is
proposed for secure IIoT communication. The first layer, the lightweight secured data
transmission layer, utilizes a novel encryption scheme called IECC to ensure secure data transfer
to the cloud layer. The second layer, the RNN-based attack detection layer, employs an RNN
model to predict potential network attacks and store attack details in the cloud server for future
analysis. This comprehensive approach provides a robust security solution for IIoT networks,
safeguarding sensitive data and ensuring reliable operation. The overall architecture of the
proposed methodology is represented in the figure 1.
61
International Journal of Computer Networks & Communications (IJCNC) Vol.17, No.1, January 2025
Figure 1.Overall process flow proposed a lightweight attack detection model for IIoT.
ECC has become a widely adopted cryptographic algorithm in IIoT systems [19]. However, the
implementation of ECC in IIoT devices poses several challenges and limitations [20]. One of the
primary concerns is the computational overhead associated with ECC operations. Resource-
constrained IIoT devices often lack the processing power to handle the complex mathematical
computations required for ECC, leading to performance degradation and increased energy
consumption. Moreover, the implementation of ECC on these devices often requires specialized
hardware or software libraries, which can further complicate the development and deployment
process. Another challenge lies in the key management and generation process for ECC. IoT
networks involve a large number of devices, each with its own public-private key pair. Managing
and securing these keys becomes increasingly complex as the network grows. Following are the
steps involved in the existing ECC.
Elliptic Curve Cryptography (ECC) involves several key steps, beginning with the selection of an
elliptic curve over a finite field [21]. The curve is typically represented by the equation 𝑦 2 =
𝑥 3 + 𝑎𝑥 + 𝑏, where 𝑎 and 𝑏 are constants. A base point 𝐺 on the curve is chosen with a prime
order 𝑛, such that 𝑛 × 𝐺 = 𝒪, the point at infinity. Following this, a private key 𝑑 is randomly
chosen, and the corresponding public key 𝑄 is computed as 𝑄 = 𝑑 × 𝐺. This establishes the
foundation for key generation in ECC.
Firstly, a specific elliptic curve over a finite field is selected, characterized by parameters like the
prime modulus (p), coefficients (a and b), and a base point (G(x, y)). This elliptic curve serves as
the foundation for the key generation process [22][23]. The next step is to randomly generate a
private key (d) within the range [1, n-1], where n represents the order of the base point G. This
private key remains confidential and is fundamental to the security of the ECC system.
Subsequently, the corresponding public key (Q) is computed using scalar multiplication, where Q
= d * G. This process involves repeated additions of the base point G to itself d times, resulting in
a point on the elliptic curve. Optionally, the public key can be compressed for more efficient
storage by transmitting only the x-coordinate and a parity bit indicating the y-coordinate's parity.
The final key pair, consisting of the private key (d) and the compressed or uncompressed public
key (Q), is then utilized for secure cryptographic operations. The security of ECC relies on the
complexity of the Elliptic Curve Discrete Logarithm Problem (ECDLP), making the private key
62
International Journal of Computer Networks & Communications (IJCNC) Vol.17, No.1, January 2025
difficult to deduce from the public key. Proper implementation and careful validation of key
properties are crucial for the robustness of ECC key generation.
For key exchange using ECC, each party generates a session key by selecting a random integer (𝑘
for Alice and 𝑙 for Bob) and computing a point (𝑃 for Alice and 𝑄 for Bob). The shared secret is
then independently calculated by both parties, involving themultiplication of the other party’s
point with their private key. This shared secret can be used as a symmetric key for secure
communication.
Digital signatures in ECC involve a signing party (e.g., Alice) and a verifying party (e.g., Bob)
[24]. Alice first hashes the message she wants to sign (𝑚 = 𝐻 (message)) and chooses a random
integer 𝑘. She then computes a point 𝑃 = 𝑘 × 𝐺 and calculates 𝑟 ≡ 𝑥 (𝑃 ) (mod 𝑛). The signing
party ensures that 𝑟 is not zero, recalculating 𝑘 if needed. Subsequently, she computes 𝑠 ≡ 𝑘 −1 ×
(𝑚 + 𝑑 × 𝑟) (mod 𝑛), and the signature is formed as (𝑟, 𝑠).
On the verifying side, Bob receives the message and signature and computes the hash of the
message (𝑚 = 𝐻 (message)). He checks that 𝑟 and 𝑠 are within the appropriate range and then
calculates 𝑤 ≡ 𝑠 −1 (mod 𝑛). Bob further computes 𝑢1 = 𝑚 × 𝑤 (mod 𝑛) and 𝑢2 = 𝑟 ×
𝑤 (mod 𝑛). By calculating a point 𝑃 = 𝑢1 × 𝐺 + 𝑢2 × 𝑄, where 𝑄 is the public key of the
signing party, Bob verifies if 𝑟 ≡ 𝑥 (𝑃 ) (mod 𝑛). If this holds, the signature is deemed valid.
To address the computational cost in resource-constrained like IIoT this research introduces a
Lightweight ECC Key Generation based on the Modified Windowed Method (MWM). By using
the MWM, the algorithm optimizes the scalar multiplication process, reducing computational
complexity while maintaining the cryptographic integrity of the generated key pairs. The
algorithm's significance lies in its applicability to a wide range of lightweight cryptographic
scenarios, including IoT deployments and embedded systems. Algorithm 1 explains the process
flow of MWM. In this method, multiples of the base point G are precomputed and stored to
expedite the scalar multiplication. The algorithm initializes a result point R to the point at infinity
and converts the scalar d into its binary representation. Subsequently, it performs the MWM,
where the binary representation is processed in windows, and for each window, the algorithm
63
International Journal of Computer Networks & Communications (IJCNC) Vol.17, No.1, January 2025
efficiently adds the corresponding pre-computed multiple to the resulting point R based on the
extracted bits. This approach significantly reduces the number of point additions required during
scalar multiplication, enhancing the computational efficiency of ECC key generation, especially
in resource-constrained environments. The final result, R, represents the computed point on the
elliptic curve and serves as the public key in the ECC key pair.
The proposed lightweight ECC key generation process using the MWM involves several key
steps to optimize the generation of key pairs in resource-constrained environments. Figure 2
shows the process flow of the proposed lightweight secure data transmission. Firstly, a
lightweight elliptic curve with parameters (p, a, b, G) is carefully chosen to suit the constraints of
the environment. Then, a private key (d) is generated using a lightweight pseudorandom number
generator within the range [1, n-1], where n is the order of the base point G. The core of the
algorithm lies in the Point Generation using the MWM for scalar multiplication. Precomputed
multiples of the base point G are generated, and the private key is represented in binary form. For
each window of bits, the algorithm efficiently adds the corresponding precomputed multiple to
the result point R, significantly reducing the computational complexity of scalar multiplication.
Optionally, the public key is compressed to minimize storage and transmission overhead. The
final output consists of the key pair (d, Q), where Q is the computed public key, and adherence to
ECC security requirements is emphasized throughout the process. This algorithm addresses the
need for an efficient ECC key generation method tailored for lightweight environments while
maintaining the security standards of ECC. Following are the steps involved in the proposed
Lightweight ECC key generation process using MWM.
Algorithm 2 Lightweight ECC Key Generation Process using Modified Windowed Method
1. Curve Selection: Choose a lightweight elliptic curve with parameters (𝑝, 𝑎, 𝑏, 𝐺 ) suitable for
constrained environments.
2. Random Key Generation: Generate a private key (𝑑) using a lightweight pseudorandom
number generator in the range [1, 𝑛 − 1], where 𝑛 is the order of the base point 𝐺.
3. Point Generation (Modified Windowed Method): Compute the public key (𝑄) using the
modified windowed method for scalar multiplication:
64
International Journal of Computer Networks & Communications (IJCNC) Vol.17, No.1, January 2025
a. Initialize 𝑅 to the point at infinity (𝑂).
b. Precompute multiples of the base point 𝐺: 𝐺, 2𝐺, 3𝐺, … , 2𝑤−1 𝐺, where 𝑤 is the window
size.
c. Represent 𝑑 in binary form: 𝑑𝑘−1 𝑑𝑘−2 … 𝑑1 𝑑0.
d. For each window, starting from the most significant bits:
e. Extract the bits 𝑑𝑖 , 𝑑𝑖−1 , … , 𝑑𝑖−𝑤+1 .
f. Multiply 𝑅 by 2𝑤 and add the appropriate precomputed multiple based on the extracted
bits.
g. The final 𝑅 is the computed point 𝑄.
4. Public Key Compression: Compress the public key to reduce storage and transmission
overhead:
Compressed public key: 𝑄compressed = (𝑥𝑄 ,parity(𝑦𝑄 )).
Uncompressed public key: 𝑄uncompressed = (𝑥𝑄 , 𝑦𝑄 ).
5. Output Key Pair: The key pair is (𝑑, 𝑄). Ensure that the generated keys adhere to ECC
security requirements.
In the proposed IoT sensor data transmission scheme, the encryption process begins with the
generation of a Lightweight ECC key pair by the IoT sensor, consisting of a private key (𝑑sensor )
and a public key (𝑄sensor ), utilizing the MWM. The sensor securely transmits its public key to the
gateway. Upon reception, the gateway generates its ECC key pair (𝑑gateway , 𝑄gateway ) using the
same Lightweight ECC with MWM. The shared secret (𝐾shared ) is then calculated through scalar
multiplication of the sensor’s public key and the gateway’s private key. Subsequently, a
symmetric encryption key (𝐾symmetric ) is derived from the shared secret using a key derivation
function (KDF). The IoT sensor employs this symmetric key to encrypt its sensor data (𝑀) using
an encryption algorithm, resulting in the ciphertext (𝐶). The encrypted data is then securely
transmitted to the gateway, ensuring confidentiality and integrity during the communication.
Upon receiving the encrypted data (𝐶), the gateway initiates the decryption process. The gateway
uses its private key (𝑑gateway ) and the sensor’s public key (𝑄sensor ) in conjunction with the MWM
65
International Journal of Computer Networks & Communications (IJCNC) Vol.17, No.1, January 2025
for scalar multiplication to recompute the shared secret (𝐾shared ). Using the same key derivation
function, the gateway derives the symmetric encryption key (𝐾symmetric ). With the obtained
symmetric key, the gateway decrypts the received ciphertext (𝐶) utilizing a decryption algorithm,
revealing the original sensor data (𝑀). This comprehensive encryption and decryption process
ensures secure and efficient communication between the IoT sensor and the gateway, using
lightweight ECC with MWM for key generation and encryption. Regular key rotation further
strengthens the security of the communication channel, addressing the dynamic nature of IoT
security considerations.
IIoT nodes typically possess various attributes, such as node address, location information,
storage capacity, and processing power. Additionally, nodes engage in communication by
exchanging packets, which contain timestamps, routing information, and payload data. By
analyzing these attributes and communication patterns, contextual features can be extracted to
characterize the behavior of each node.Each contextual feature exhibits a normal range of values
for healthy nodes. Deviations from these normal ranges can indicate potential abnormalities or
attacks. For instance, a node with unusually high computational cost, extended packet
transmission times, or a significantly higher hop count compared to its peers may be
compromised. To identify attacked nodes, threshold values are established for each contextual
feature. These thresholds are typically determined based on a statistical analysis of expert
knowledge of the IIoT network. If a node's contextual feature value falls outside its
corresponding threshold, it is flagged as a potential attack candidate. By aggregating and
analyzing the contextual features of all nodes in the IIoT network, a comprehensive assessment
of network health can be obtained. Nodes with multiple contextual features deviating from their
respective thresholds are considered highly likely to be compromised and require further
investigation. After identifying the attack nodes, the RNN is used to classify the attacks. Figure 3
shows the process flow of theproposed attack prediction model.
Once attack nodes have been identified using the previous module, the next step is to classify the
type of attack being perpetrated. This involves utilizing a trained RNN model to analze the
contextual features and communication patterns of the attack nodes. Before employing the RNN
model, the attack node data undergoes preprocessing to ensure its quality and suitability for
machine learning. Normalization is a crucial step in preparing data for machine learning
algorithms. It scales the features of the attack node data to a common range, preventing features
with larger magnitudes from dominating the model's training process. After preprocessing,
feature selection is performed to eliminate redundant and uncorrelated features that may
introduce noise and degrade the classification accuracy of the RNN model. This process involves
correlation analysis. Correlation analysis measures the strength and direction of the linear
relationship between pairs of features. Features that exhibit high correlations with each other are
considered redundant and can be eliminated, as they provide similar information. The pre-
processed and feature-selected attack node data is then fed into the trained RNN model for
classification. The RNN model, with its ability to capture temporal dependencies in the data,
effectively analyses the sequential patterns and relationships within the contextual features,
enabling it to distinguish between different types of attacks.
Data preprocessing is a crucial step in preparing data for machine learning algorithms. In the
context of classifying attack types in IIoT networks, data preprocessing involves several essential
steps:
Min-Max Normalization: This technique scales the data to a range between 0 and 1. The
formula for min-max normalization is:
(𝑥𝑖 − 𝑚𝑖𝑛(𝑥))
𝑥𝑖 = (1)
(𝑚𝑎𝑥(𝑥) − 𝑚𝑖𝑛(𝑥))
where 𝑥𝑖 is the value of the ith feature, min(x) is the minimum value of the feature, and max(x)
is the maximum value of the feature.
Z-Score Normalization: This method normalizes the data to have a mean of 0 and a standard
deviation of 1. The formula for z-score normalization is:
(𝑥𝑖 − 𝜇(𝑥))
𝑥𝑖 = (2)
𝜎(𝑥)
where 𝑥𝑖 is the value of the ith feature, μ(x) is the mean of the feature, and σ(x) is the standard
deviation of the feature.
Removal of Incomplete Data: This step involves identifying and removing data points with
missing values. The equation for this process can be represented as:
where 𝑥𝑛𝑒𝑤 is the new dataset without missing values, 𝑥𝑖 is the ith data point in the original
dataset, and 𝑥{𝑖𝑗} is the jth feature value of the ith data point. These preprocessing steps play a
critical role in ensuring the quality and consistency of the data, ultimately improving the
performance of the attack classification model.
67
International Journal of Computer Networks & Communications (IJCNC) Vol.17, No.1, January 2025
3.2.4. Feature Selection
The feature selection module of this research employs Linear Regression–Recursive Feature
Elimination (LR-RFE) to enhance the efficiency and interpretability of the RNN model used for
attack detection in IIoT networks. Initialization involves the creation of a linear regression model,
denoted as (𝐿𝑅 ̅̅̅̅ ), utilizing the complete set of features (𝑋̅)and the target variable (𝑌̅ ).
Subsequently, the feature ranking process assigns weights to each feature based on their
contributions to the linear regression model, facilitating the identification of their importance.
Through recursive feature elimination, the module iteratively removes the least important
features, refitting the linear regression model at each step. The process continues until the desired
subset of features is obtained. The final iteration yields the optimal feature subset. Algorithm 5
explains the feature selection process.
The proposed RNN architecture for attack detection in IIoT systems comprises several key layers
designed to efficiently capture and analyse the attacks in IIoT. At the input layer, pre-processed
and feature-selected data representing various contextual parameters, such as computational cost,
packet transmission times, and hop count, is fed into the network. Following the input layer, an
embedding layer transforms the input features into a format suitable for the RNN, facilitating the
capture of relationships and dependencies between different features. The core of the proposed
architecture lies in the recurrent layer, which consists of recurrent units enabling the network to
retain the memory of previous inputs. This layer is instrumental in capturing temporal patterns,
essential for identifying potential attacks that may exhibit specific sequences or patterns over
time. To enhance the robustness of the model and prevent overfitting, a dropout layer is
introduced, randomly deactivating a fraction of neurons during training. A dense layer, maps the
learned features from the recurrent layer to the output layer. This layer combines the temporal
information captured by the recurrent layer to make predictions regarding the presence or absence
of attacks. The output layer, typically utilizing sigmoid activation functions for multiclass
classification, respectively, produces the final predictions.
In this research, a custom dataset was manually developed to train and evaluate the proposed
attack detection model. The dataset comprises a total of 30,000 instances, categorized into three
types of attacks and normal communications. The attacks included in the dataset are Distributed
Denial of Service (DDoS), Man-in-the-Middle (MitM), and ransomware. To maintain a balanced
distribution, each type of attack consists of 25 instances, summing up to 75 attack instances, and
the remaining instances are labeled as normal communications. To create a balanced dataset, the
distribution is as follows: 25 instances of DDoS attacks, 25 instances of MitM attacks, 25
instances of ransomware attacks, and the remaining instances labelled as normal
communications.
68
International Journal of Computer Networks & Communications (IJCNC) Vol.17, No.1, January 2025
For model training and evaluation, 80 randomly selected instances are used for training the
proposed RNN, and the remaining instances are utilized for testing the model. The training
process of the proposed RNN is explained in detail in Algorithm 6.
69
International Journal of Computer Networks & Communications (IJCNC) Vol.17, No.1, January 2025
In the comparative analysis of this research, the computational efficiency of the proposed
Improved Elliptic Curve Cryptography (IECC) is assessed against existing popular cryptographic
algorithms. The evaluation aims to provide insights into the performance and efficiency of IECC
in comparison to well-established cryptographic techniques. The algorithms selected for this
comparison include RSA (Rivest-Shamir-Adleman), AES (Advanced Encryption Standard), DSA
(Digital Signature Algorithm), Diffie-Hellman, SHA-256 (Secure Hash Algorithm 256-bit), and
ECDSA (Elliptic Curve Digital Signature Algorithm).The computational efficiency of the
proposed IECC will be evaluated in terms of key generation speed, encryption and decryption
time, throughput, memory usage, information loss, and overall processing time in comparison to
these popular cryptographic algorithms. This analysis will contribute to understanding the
strengths and potential advantages of IECC in IIoT security.
Figure 6.Key generation speed analysis of proposed Figure 7. Encryption time analysis of proposed
IECC with existing encryption algorithms. IECC with existing encryption algorithms.
70
International Journal of Computer Networks & Communications (IJCNC) Vol.17, No.1, January 2025
Figure 8. Decryption time analysis of proposed Figure 9. Throughput analysis of proposed IECC
IECC with existing encryption algorithms with existing encryption algorithms.
Figure 10. Memory usage analysis of proposed Figure 11. Information loss analysis of proposed
IECC with existing encryption algorithms. IECC with existing encryption algorithms.
Figure 12. Overall processing time analysis of proposed IECC with existing encryption algorithms.
Figure 6 demonstrates the superior key generation speed of IECC, achieving a remarkable 6.1
milliseconds, outperforming RSA, DSA, and Diffie-Hellman by a significant margin. While AES
and SHA-256 also exhibit competitive speeds, IECC stands out as the most efficient solution for
key generation. Figure 7 illustrates IECC's strong performance in encryption time, with a swift
processing time of 5 seconds. AES closely follows, showcasing its efficiency in securing data.
71
International Journal of Computer Networks & Communications (IJCNC) Vol.17, No.1, January 2025
RSA and Diffie-Hellman, while still performing well, exhibit slightly longer encryption times.
This emphasizes IECC's effectiveness in real-time encryption scenarios. Figure 8 highlights
IECC's excellence in decryption time, achieving an impressively low processing time of 0.129
seconds. RSA and AES demonstrate competitive decryption speeds, while Diffie-Hellman and
ECDSA also perform well. IECC's efficiency in decryption contributes to its overall appeal in
resource-constrained environments. Figure 9 presents the throughput analysis, measured in
Megabytes per second (MBPS), reflecting the efficiency of data processing. IECC attains a
throughput of 31 MBPS, outpacing RSA and AES. This reinforces IECC's suitability for
scenarios where data throughput is a crucial consideration, such as in industrial applications.
Figure 10 showcases IECC's lightweight nature by consuming only 37,000 KB of memory. This
is significantly lower than RSA and SHA-256, making IECC an attractive choice for memory-
constrained environments. The memory efficiency of IECC is vital for IIoT devices with limited
resources. Figure 11 illustrates IECC's effectiveness in preserving data integrity by maintaining a
low information loss rate of 5%. This is a notable advantage over other algorithms, contributing
to the reliability of IECC in secure communications. Figure 12 presents the overall processing
time analysis, considering the combined impact of key generation, encryption, and decryption.
IECC emerges as a well-balanced cryptographic solution with an overall processing time of 4.4
seconds. It outperforms competitors like RSA, DSA, and SHA-256, demonstrating its efficiency
in executing end-to-end cryptographic operations. Overall, the proposed IECC consistently
outperforms existing cryptographic algorithms in terms of key generation speed, encryption time,
decryption time, throughput, memory usage, and information loss. Its overall processing time is
also competitive, making it a well-rounded solution for resource-constrained environments like
IIoT devices. The combination of efficiency and security makes IECC a promising candidate for
various applications that demand secure data transmission and storage.
The proposed IECC algorithm has demonstrated superior performance in key generation speed,
encryption time, decryption time, throughput, memory usage, and information loss compared to
existing cryptographic algorithms. To further evaluate IECC's effectiveness, a comprehensive
performance analysis was conducted across different file sizes, namely 3 MB, 6 MB, and 9 MB.
This analysis aimed to assess the impact of file size on the performance of IECC and compare its
efficiency against popular cryptographic algorithms such as RSA, DSA, Diffie-Hellman, AES,
and SHA-256.
Figure 13. Key generation speed analysis of Figure14. Encryption speed analysis of proposed
proposed IECC with existing encryption algorithms IECC with existing encryption algorithms across
across different file sizes different file sizes
72
International Journal of Computer Networks & Communications (IJCNC) Vol.17, No.1, January 2025
Figure 15. Decryption speed analysis of proposed Figure 16. Throughput analysis of proposed IECC
IECC with existing encryption algorithms across with existing encryption algorithms across different
different file sizes file sizes
Figure 17. Memory usage analysis of proposed Figure 18. Information loss analysis of proposed
IECC with existing encryption algorithms across IECC with existing encryption algorithms across
different file sizes different file sizes
The key generation speed analysis (Figure 13) highlights IECC's superior performance across
various file sizes (3 MB, 6 MB, and 9 MB). IECC consistently outperforms RSA, DSA, Diffie-
Hellman, AES, and SHA-256 in milliseconds, demonstrating its efficiency in generating
cryptographic keys. For instance, at 3 MB, IECC achieves a key generation speed of 7.1 ms,
while RSA, DSA, Diffie-Hellman, AES, and SHA-256 exhibit 12.5 ms, 10.8 ms, 15.2 ms, 14.0
ms, and 13.5 ms, respectively. Similar trends are observed at 6 MB and 9 MB, further
strengthening IECC's efficiency. IECC's superior performance extends to encryption speed, as
demonstrated in figure 14. Across different file sizes, IECC consistently achieves faster
encryption times in seconds compared to RSA, DSA, Diffie-Hellman, AES, and SHA-256. At 3
MB, IECC encrypts data in 0.9 seconds, while RSA, DSA, Diffie-Hellman, AES, and SHA-256
require 3.5 seconds, 2.8 seconds, 4.2 seconds, 3.8 seconds, and 3.5 seconds, respectively. This
efficiency is maintainedat 6 MB and 9 MB, further establishing IECC as a highly efficient
encryption solution. The decryption speed analysis presented in figure 15 further strengthens
IECC's efficiency in decrypting data. IECC consistently outperforms RSA, DSA, Diffie-Hellman,
AES, and SHA-256 in seconds across different file sizes. This efficiency makes IECC suitable
for real-time decryption for resource limited devices. Figure 16 illustrates IECC's superior
throughput, measured in Megabytes per second (MBPS), across various file sizes. IECC
consistently achieves higher throughput values compared to RSA, DSA, Diffie-Hellman, AES,
73
International Journal of Computer Networks & Communications (IJCNC) Vol.17, No.1, January 2025
and SHA-256. This emphasizes IECC's suitability for scenarios where data throughput is crucial,
such as in industrial applications. IECC exhibits efficient memory usage (figure 17), consuming
significantly less memory (in kilobytes) compared to RSA, DSA, Diffie-Hellman, AES, and
SHA-256. This lightweight nature makes IECC an attractive choice for memory-constrained
environments like IoT devices. The information loss analysis (figure 18) demonstrates IECC's
effectiveness in preserving data integrity with low information loss percentages. IECC
consistently outperforms RSA, DSA, Diffie-Hellman, AES, and SHA-256, contributing to the
reliability of IECC in secure communications.
This section presents a comprehensive evaluation of the prediction efficiency of the proposed
RNN-based attack prediction model. To establish a benchmark, we compare the performance of
the proposed model against a range of established AI-based attack prediction models, including
deep neural networks (DNNs), deep belief networks (DBNs), radial basis function networks
(RBFNs), and long short-term memory (LSTM) networks. Table 1 lists the stimulation
parameters for theabove AI models. To objectively assess the prediction efficiency of these
models, we employ a variety of performance metrics, including accuracy, specificity, precision,
recall, false positive rate (FPR), and false negative rate (FNR). Accuracy measures the overall
correctness of the model's predictions, while specificity and precision indicate the model's ability
to correctly identify normal traffic and attack traffic, respectively. Recall measures the proportion
of attack traffic correctly identified by the model, while FPR and FNR indicate the model's
tendency to incorrectly classify normal as attack and vice versa, respectively. Which are
calculated by using the following formulas.
𝑇𝑃 + 𝑇𝑁
𝐴𝑐𝑐𝑢𝑟𝑎𝑐𝑦 = (4)
𝑇𝑃 + 𝑇𝑁 + 𝐹𝑃 + 𝐹𝑁
𝑇𝑁 𝑇𝑃
𝑆𝑝𝑒𝑐𝑖𝑓𝑖𝑐𝑖𝑡𝑦 = (5) 𝑃𝑟𝑒𝑐𝑖𝑠𝑖𝑜𝑛 = (6)
𝑇𝑁 + 𝐹𝑃 𝑇𝑃 + 𝐹𝑃
𝑇𝑃
𝑅𝑒𝑐𝑎𝑙𝑙 = (7)
𝑇𝑃 + 𝐹𝑁
𝐹𝑃
𝐹𝑃𝑅 = (8)
𝐹𝑃 + 𝑇𝑁
𝐹𝑁
𝐹𝑁𝑅 = (9)
𝐹𝑁 + 𝑇𝑃
where 𝑇𝑃 is True Positive, 𝑇𝑁 is True Negative, 𝐹𝑃 is False Positive, and 𝐹𝑁 is False Negative.
74
International Journal of Computer Networks & Communications (IJCNC) Vol.17, No.1, January 2025
Figure 21.Precision comparison of proposed RNN Figure 22.Recall the comparison of the proposed
with existing AI-based attack prediction models. RNN with existing AI-based attack prediction
models.
Figure23. FPR comparison of proposed RNN with Figure24. FNR comparison of proposed RNN with
existing AI-based attack prediction models. existing AI-based attack prediction models.
75
International Journal of Computer Networks & Communications (IJCNC) Vol.17, No.1, January 2025
Figure 19 illustrates the superior overall accuracy of the proposed RNN model compared to other
AI-based attack prediction models. The proposed RNN stands out with the highest overall
accuracy at 96.4%, surpassing DNN (91.5%), DBN (90.7%), RBFN (88.5%), and LSTM
(92.3%). Figure 20 demonstrates the high specificity of the proposed RNN model. Specificity
measures the model's ability to correctly identify normal traffic. The proposed RNN again leads
with a specificity of 96.5%, while DNN (94.2%), DBN (93.8%), RBFN (92.3%), and LSTM
(95.1%) follow closely. This suggests that the proposed RNN excels in distinguishing normal
network behaviour, effectively reducing false positives. Figure 21 highlights the precision of the
proposed RNN model. The proposed RNN exhibits superior precision with a value of 95.2%,
outperforming DNN (91.5%), DBN (89.7%), RBFN (90.8%), and LSTM (92.1%). This indicates
that the proposed RNN effectively distinguishes genuine attacks from normal traffic. Figure 22
demonstrates the high recall of the proposed RNN model. Recall measures the proportion of
correctly identified attack traffic. The proposed RNN achieves the highest recall score at 96.8%,
outperforming DNN (93.2%), DBN (91.4%), RBFN (92.7%), and LSTM (94.1%). This indicates
that the RNN effectively captures instances of actual attacks, minimizing false negatives. Figure
23 showcases the low false positive rate of the proposed RNN model. The false positive rate
(FPR) indicates the model's tendency to classify normal as anattack. The proposed RNN again
demonstrates superior performance with a low FPR of 3.2%. This suggests that the RNN
effectively avoids labelling normal as attacks, reducing false alarms. Figure 24 indicates the low
false negative rate of the proposed RNN model. Similarly, in terms of false negative rate (FNR),
representing the model's tendency to incorrectly classify attacks as normal, the proposed RNN
exhibits a minimal FNR of 3.1%. This indicates that the RNN effectively identifies genuine
attacks, minimizing missed detections. The Receiver Operating Characteristic (ROC) chart for
the research project demonstrates a high level of performance, achieving an impressive area
under the curve (AUC) value of 0.988. This indicates the strong ability of the proposed RNN-
based attack detection model to distinguish between true positive and false positive rates
effectively. In Figure 25, the ROC chart visually represents the trade-off between the true
positive rate (sensitivity) and the false positive rate.
4.5. Discussions
The results of the computational efficiency analysis demonstrate the superiority of the Improved
Elliptic Curve Cryptography (IECC) over established cryptographic algorithms. IECC
outperforms in key areas such as key generation speed, encryption and decryption time,
throughput, memory usage, information loss, and overall processing time. This suggests that
76
International Journal of Computer Networks & Communications (IJCNC) Vol.17, No.1, January 2025
IECC is well-suited for resource-constrained IIoT devices, addressing challenges related to
computational complexity and key management. The lightweight nature of IECC, as indicated by
its minimal memory usage, positions it as an efficient cryptographic solution for IIoT
environments.
The evaluation of IECC across different file sizes strengthens its consistent efficiency in key
generation, encryption, decryption, throughput, memory usage, and information loss. This robust
performance across varied data sizes underscores the adaptability of IECC, making it a reliable
choice for securing data transmission in IIoT networks, regardless of the file size.
The RNN exhibits outstanding performance in accurately identifying and classifying various
types of attacks, including Distributed Denial of Service (DDoS), Man-in-the-Middle (MitM),
and ransomware attacks. The high precision, recall, and overall accuracy of the RNN contribute
to its effectiveness in real-time attack detection. The low false positive and false negative rates
further enhance the reliability of the RNN, minimizing both false alarms and missed detections.
The integration of IECC and RNN in the proposed two-layered architecture emerges as a
comprehensive solution for IIoT security. IECC ensures secure data transmission by addressing
cryptographic challenges in resource-constrained devices, while the RNN enhances the network's
resilience through accurate and timely attack detection. The combination of these two layers
addresses the inherent trade-off between cryptographic strength and resource constraints,
providing a balanced approach to IIoT security. The research significantly contributes to the field
of industrial cybersecurity by presenting an integrated solution. The two-layered architecture not
only improves cryptographic protection but also introduces an effective attack detection
mechanism. This integrated approach aligns with the evolving landscape of cyber threats and the
need for adaptive security measures in IIoT networks.
Despite the benefits of the proposed two-layered architecture, several drawbacks must be
considered. First, while the method introduces minimal overhead, the cryptographic demands of
the IECC implementation can still impose a significant computational burden, particularly for
resource-constrained IIoT devices. Second, the system requires specialized expertise to deploy
and manage encryption and RNN-based detection mechanisms effectively, leading to increased
operational costs and added complexity. Third, the performance of the RNN is highly reliant on
the quality of the training dataset; inadequate and biased data can severely compromise detection
accuracy.
5. CONCLUSION
This research introduces a two-layered security architecture designed to enhance the security and
integrity of IIoT networks. The first layer incorporates the IECC, addressing challenges related to
computational complexity and key management in resource-constrained IIoT devices. IECC's
lightweight nature and superior efficiency in key generation, encryption, and decryption
processes position it as a promising solution for secure data transmission in industrial
environments. The second layer of the architecture employs an RNN-based attack detection
system, showcasing high accuracy, specificity, precision, and recall in identifying and classifying
potential network attacks. The RNN's ability to minimize false positives and false negatives
enhances its reliability in real-time attack detection scenarios. The integration of IECC and RNN
in this two-layered approach offers a balanced solution, effectively addressing the inherent trade-
off between cryptographic strength and the resource constraints of industrial devices. The
performance analysis of IECC reveals several key findings. IECC consistently outperforms
popular cryptographic algorithms in terms of key generation speed, encryption and decryption
times, throughput, memory usage, information loss, and overall processing time. Notably, IECC
77
International Journal of Computer Networks & Communications (IJCNC) Vol.17, No.1, January 2025
showcases remarkable speed in key generation (6.1 milliseconds), swift encryption time (5
seconds), and impressively low decryption time (0.129 seconds). Its efficiency in resource-
constrained environments is evident in its low memory usage (37,000 KB) and low information
loss rate (5%). IECC emerges as a well-balanced cryptographic solution with an overall
processing time of 4.4 seconds, outperforming its competitors across various file sizes (3 MB, 6
MB, and 9 MB). The evaluation of the RNN-based attack prediction model further strengthens
the research findings. The RNN exhibits superior overall accuracy (96.4%), specificity (96.5%),
precision (95.2%), and recall (96.8%) when compared to existing AI-based models. Its low false
positive rate (FPR) of 3.2% and minimal false negative rate (FNR) of 3.1% underscore its
effectiveness in identifying and classifying potential network attacks.
CONFLICTS OF INTEREST
REFERENCES
[1] M. Javaid, A. Haleem, R. Pratap Singh, S. Rab, and R. Suman, “Upgrading the manufacturing
sector via applications of Industrial Internet of Things (IIoT),” Sensors International, vol. 2, p.
100129, 2021.
[2] W. Z. Khan, M. H. Rehman, H. M. Zangoti, M. K. Afzal, N. Armi, and K. Salah, “Industrial
internet of things: Recent advances, enabling technologies and open challenges,” Computers &
Electrical Engineering, vol. 81, p. 106522, Jan. 2020.
[3] N. N. Hurrah, S. A. Parah, J. A. Sheikh, F. Al-Turjman, and K. Muhammad, “Secure data
transmission framework for confidentiality in IoTs,” Ad Hoc Networks, vol. 95, p. 101989, Dec.
2019.
[4] A. Mosteiro-Sanchez, M. Barcelo, J. Astorga, and A. Urbieta, “Securing IIoT using Defence-in-
Depth: Towards an End-to-End secure Industry 4.0,” Journal of Manufacturing Systems, vol. 57, pp.
367–378, Oct. 2020.
[5] L. Tawalbeh, F. Muheidat, M. Tawalbeh, and M. Quwaider, “IoT Privacy and Security: Challenges
and Solutions,” Applied Sciences, vol. 10, no. 12, p. 4102, Jun. 2020.
[6] A. Lohachab and Karambir, “ECC based inter-device authentication and authorization scheme using
MQTT for IoT networks,” Journal of Information Security and Applications, vol. 46, pp. 1–12, Jun.
2019.
[7] Y. Yang, S.-H. Lee, J. Wang, C.-S. Yang, Y.-M. Huang, and T.-W. Hou, “Lightweight
Authentication Mechanism for Industrial IoT Environment Combining Elliptic Curve Cryptography
and Trusted Token,” Sensors, vol. 23, no. 10, pp. 4970–4970, May 2023.
[8] S. Ullah and R. Zahilah, “Curve25519 based lightweight end-to-end encryption in resource
constrained autonomous 8-bit IoT devices,” Cybersecurity, vol. 4, no. 1, Mar. 2021.
[9] K. Tsiknas, D. Taketzis, K. Demertzis, and C. Skianis, “Cyber Threats to Industrial IoT: A Survey
on Attacks and Countermeasures,” IoT, vol. 2, no. 1, pp. 163–186, Mar. 2021.
[10] P. Williams, I. K. Dutta, H. Daoud, and M. Bayoumi, “A Survey on Security in Internet of Things
with a Focus on the Impact of Emerging Technologies,” Internet of Things, vol. 19, p. 100564, Jul.
2022.
[11] A. Awajan, “A Novel Deep Learning-Based Intrusion Detection System for IoT Networks,”
Computers, vol. 12, no. 2, p. 34, Feb. 2023.
[12] H. C. Altunay and Z. Albayrak, “A hybrid CNN+LSTM-based intrusion detection system for
industrial IoT networks,” Engineering Science and Technology, an International Journal, vol. 38, p.
101322, Feb. 2023.
[13] J. B. Awotunde, C. Chakraborty, and A. E. Adeniyi, “Intrusion Detection in Industrial Internet of
Things Network-Based on Deep Learning Model with Rule-Based Feature Selection,” Wireless
Communications and Mobile Computing, vol. 2021, p. e7154587, Sep. 2021.
[14] R. Malik, Y. Singh, Z. A. Sheikh, P. Anand, P. K. Singh, and T. C. Workneh, “An Improved Deep
Belief Network IDS on IoT-Based Network for Traffic Systems,” Journal of Advanced
Transportation, vol. 2022, p. e7892130, Apr. 2022.
78
International Journal of Computer Networks & Communications (IJCNC) Vol.17, No.1, January 2025
[15] H. Kim and K. Lee, “IIoT Malware Detection Using Edge Computing and Deep Learning for
Cybersecurity in Smart Factories,” Applied Sciences, vol. 12, no. 15, p. 7679, Jul. 2022.
[16] A. Yazdinejad, B. Zolfaghari, A. Dehghantanha, H. Karimipour, G. Srivastava, and R. M. Parizi,
“Accurate threat hunting in industrial internet of things edge devices,” Digital Communications and
Networks, Sep. 2022.
[17] Almaiah, M.A.; Ali, A.; Hajjej, F.; Pasha, M.F.; Alohali, M.A. A Lightweight Hybrid Deep
Learning Privacy Preserving Model for FC-Based Industrial Internet of Medical Things. Sensors
2022, 22, 2112.
[18] A. Al-Abassi, H. Karimipour, A. Dehghantanha and R. M. Parizi, "An Ensemble Deep Learning-
Based Cyber-Attack Detection in Industrial Control System," in IEEE Access, vol. 8, pp. 83965-
83973, 2020, doi: 10.1109/ACCESS.2020.2992249.
[19] H. AlMajed and A. AlMogren, “A Secure and Efficient ECC-Based Scheme for Edge Computing
and Internet of Things,” Sensors, vol. 20, no. 21, p. 6158, Oct. 2020.
[20] B. Hammi, A. Fayad, R. Khatoun, S. Zeadally and Y. Begriche, "A Lightweight ECC-Based
Authentication Scheme for Internet of Things (IoT)," in IEEE Systems Journal, vol. 14, no. 3, pp.
3440-3450, Sept. 2020.
[21] U. Gulen and S. Baktir, “Elliptic Curve Cryptography for Wireless Sensor Networks Using the
Number Theoretic Transform,” Sensors, vol. 20, no. 5, p. 1507, Mar. 2020.
[22] A. Subashini and P. Kanaka Raju, “Hybrid AES model with elliptic curve and ID based key
generation for IOT in telemedicine,” Measurement: Sensors, vol. 28, p. 100824, Aug. 2023.
[23] M. A. Shaaban, A. S. Alsharkawy, M. T. AbouKreisha, and M. A. Razek, “Efficient ECC-Based
Authentication Scheme for Fog-Based IoT Environment,” International journal of Computer
Networks & Communications, vol. 15, no. 04, pp. 55–71, Jul. 2023.
[24] S. Bose, T. Arjariya, A. Goswami, and S. Chowdhury, “Multi-Layer Digital Validation of Candidate
Service Appointment with Digital Signature and Bio-Metric Authentication Approach,”
International journal of Computer Networks & Communications, vol. 14, no. 5, pp. 81–100, Sep.
2022.
79