Implementation of Http Security Protocol for Internet of Things Based on Digital Envelope

Isa Mulia Insan, Febriliyan Samopa*

*Corresponding author for this work

Research output: Contribution to journalConference articlepeer-review


The popularity of the Internet of Things (IoT) has been growing in recent years. Low-end or constrained devices are the best IoT device that provides energy efficiency, small size, and mobility support. Unfortunately, connected devices can create security hazards between devices and servers, so ensuring each sender's and receiver's identity is crucial. This research proposes an authentication scheme using the digital envelope method to overcome authentication problems on constrained devices. Encryption is used to secure the data sent by the digital envelope method. The performance achieved is still within tolerance, considering the authentication scheme has succeeded in providing some security services, namely authentication, data confidentiality, data integrity, and non-repudiation.

Original languageEnglish
Pages (from-to)1332-1339
Number of pages8
JournalProcedia Computer Science
Publication statusPublished - 2024
Event7th Information Systems International Conference, ISICO 2023 - Washington, United States
Duration: 26 Jul 202328 Jul 2023


  • Authentication
  • Constrained device
  • Digital Envelope
  • Encryption
  • Internet of Things


Dive into the research topics of 'Implementation of Http Security Protocol for Internet of Things Based on Digital Envelope'. Together they form a unique fingerprint.

Cite this