Designing a New Hashing Algorithm for Enhancing IoT Devices Security and Energy Management


  • Teba Mohammed Ghazi Sami Computer Science Department, Faculty of Science, University of Zakho, Duhok, Iraq
  • Subhi R. M. Zeebaree Energy Eng. Dept., Technical College of Engineering, Duhok Polytechnic University, Duhok, Iraq
  • Sarkar Hasan Ahmed Network Department, Sulaimani Polytechnic University, Sulaimani, Iraq


hashing, IoT security, energy management, multi-level hashing, SHA family, Raspberry Pi 4B


The Internet of Things (IoT) is a rapidly growing network of interconnected devices that collect and exchange data. While IoT devices offer many benefits, they also pose unique security and energy management challenges. One promising approach to addressing these challenges is to develop new hashing algorithms that are both secure and energy-efficient. This paper proposes a new hashing algorithm for IoT devices based on multi-level hashing and the SHA family, called the Multi-Level Hashing Algorithm (MLHA). The MLHA consists of eight levels, starting from a lightweight level to a heavy level. Each level is based on a different modified SHA function, with the heavier levels using more complex SHA functions. The output of each level is then produced and represents the final hash value. The use of multiple levels provides several advantages. First, it makes the algorithm more resistant to brute-force attacks. Second, it allows the algorithm to be tailored to the specific security requirements of the IoT device. For example, a device with limited resources may use a lower of level, while a device with more resources may use upper levels for increased security. The use of SHA functions also provides several advantages. First, SHA functions are well-studied and well-respected. Second, SHA functions are relatively efficient to implement in hardware. The number of levels can be easily adjusted to meet the specific needs of the IoT device. The MLHA can also be used to create different types of hash functions. For example, a collision-resistant hash function can be created by using a large number of levels and complex SHA functions. The MLHA is a promising new approach to hashing for IoT devices. The algorithm is efficient, secure, and energy-saving. It is also flexible and scalable, making it suitable for a wide range of IoT devices, from devices with limited resources to devices with complex resources such as supercomputers. The MLHA was evaluated on a variety of IoT devices, including Raspberry Pi 4B hardware, and on two different operating systems, Windows and Ubuntu. The results showed that the MLHA is both secure and energy-efficient. The fact that the MLHA was tested on two different operating systems and on a variety of IoT devices, including a Raspberry Pi 4B, demonstrates the algorithm's portability and versatility. This is important because it means that the MLHA can be used in a wide range of IoT applications.


Download data is not yet available.


Sadeeq, Mohammed AM, et al. "Internet of Things security: a survey." 2018 International Conference on Advanced Science and Engineering (ICOASE). IEEE, 2018.

Zeebaree, Subhi RM, et al. "Characteristics and analysis of hadoop distributed systems." Technology Reports of Kansai University 62.4 (2020): 1555-1564.

Chataut, Robin, Alex Phoummalayvane, and Robert Akl. "Unleashing the Power of IoT: A Comprehensive Review of IoT Applications and Future Prospects in Healthcare, Agriculture, Smart Homes, Smart Cities, and Industry 4.0." Sensors 23.16 (2023): 7194.

Sami, Teba Mohammed Ghazi, Subhi RM Zeebaree, and Sarkar Hasan Ahmed. "A Comprehensive Review of Hashing Algorithm Optimization for IoT Devices." International Journal of Intelligent Systems and Applications in Engineering 11.6s (2023): 205-231.

Tamrakar, Ashish, et al. "extended review on internet of things (IoT) and its characterisation." Int. J. Health Sci 10 (2022): 8490-8500.

Ansere, James Adu, et al. "Dynamic Resource Optimization for Energy-Efficient 6G-IoT Ecosystems." Sensors 23.10 (2023): 4711.

Abdullah, Pavel Y., et al. "An hrm system for small and medium enterprises (sme) s based on cloud computing technology." International Journal of Research-GRANTHAALAYAH 8.8 (2020): 56-64.

Sadeeq, Mohammed Mohammed, et al. "IoT and Cloud computing issues, challenges and opportunities: A review." Qubahan Academic Journal 1.2 (2021): 1-7.

Raja Santhi, Abirami, and Padmakumar Muthuswamy. "Industry 5.0 or industry 4.0 S? Introduction to industry 4.0 and a peek into the prospective industry 5.0 technologies." International Journal on Interactive Design and Manufacturing (IJIDeM) 17.2 (2023): 947-979.

Syed, Abbas Shah, et al. "IoT in smart cities: A survey of technologies, practices and challenges." Smart Cities 4.2 (2021): 429-475.

Aljuboury, Anwer S., et al. "A New Nonlinear Controller Design for a TCP/AQM Network Based on Modified Active Disturbance Rejection Control." Complexity 2022 (2022).

Tariq, Usman, et al. "A Critical Cybersecurity Analysis and Future Research Directions for the Internet of Things: A Comprehensive Review." Sensors 23.8 (2023): 4117.

Ageed, Zainab Salih, et al. "A state of art survey for intelligent energy monitoring systems." Asian Journal of Research in Computer Science 8.1 (2021): 46-61.

Uddin, Md Ashraf, et al. "A survey on the adoption of blockchain in iot: Challenges and solutions." Blockchain: Research and Applications 2.2 (2021): 100006.

Kumar, K. Pradeep Mohan, et al. "Privacy Preserving Blockchain with Optimal Deep Learning Model for Smart Cities." CMC-COMPUTERS MATERIALS & CONTINUA 73.3 (2022): 5299-5314.

Lee, Seungjin, et al. "Energy-Efficient AP Selection Using Intelligent Access Point System to Increase the Lifespan of IoT Devices." Sensors 23.11 (2023): 5197.

Sadeeq, Mohammed AM, and Subhi Zeebaree. "Energy management for internet of things via distributed systems." Journal of Applied Science and Technology Trends 2.02 (2021): 59-71.

Rashid, Zryan N., et al. "Distributed and Parallel Computing System Using Single-Client Multi-Hash Multi-Server Multi-Thread." 2021 1st Babylon International Conference on Information Technology and Science (BICITS). IEEE, 2021.

Rejeb, Abderahman, et al. "The Internet of Things and the circular economy: A systematic literature review and research agenda." Journal of Cleaner Production 350 (2022): 131439.

Al-Obaidi, Karam M., et al. "A review of using IoT for energy efficient buildings and cities: A built environment perspective." Energies 15.16 (2022): 5991.

Alsharif, Mohammed H., et al. "Green IoT: A review and future research directions." Symmetry 15.3 (2023): 757.

S. Benhamaid, A. Bouabdallah, and H. Lakhlef, "Recent advances in energy management for Green-IoT: An up-to-date and comprehensive survey," Journal of Network and Computer Applications, vol. 198, p. 103257, 2022.

Ibrahim, R., S. R. Zeebaree, and Karwan Jacksi. "Semantic Similarity for Document Clustering using TFIDF and K-mean." Master’s Thesis (2020).

S. K. Mousavi, A. Ghaffari, S. Besharat, and H. Afshari, "Security of internet of things based on cryptographic algorithms: a survey," Wireless Networks, vol. 27, pp. 1515-1555, 2021.

P. P. Pittalia, "A comparative study of hash algorithms in cryptography," International Journal of Computer Science and Mobile Computing, vol. 8, no. 6, pp. 147-152, 2019.

S. Long, "A comparative analysis of the application of hashing encryption algorithms for MD5, SHA-1, and SHA-512," in Journal of Physics: Conference Series, 2019, vol. 1314, no. 1: IOP Publishing, p. 012210.

Razaq, Hussam Hatem Abdul, et al. "Designing and implementing an arabic programming language for teaching pupils." Journal of Southwest Jiaotong University 54.3 (2019).

P. P. Pittalia, "A comparative study of hash algorithms in cryptography," International Journal of Computer Science and Mobile Computing, vol. 8, no. 6, pp. 147-152, 2019.

A. Sideris, T. Sanida, and M. Dasygenis, "Hardware acceleration of SHA-256 algorithm using NIOS-II processor," in 2019 8th International Conference on Modern Circuits and Systems Technologies (MOCAST), 2019: IEEE, pp. 1-4.

Sami, Teba Mohammed Ghazi, Subhi RM Zeebaree, and Sarkar Hasan Ahmed. "A Novel Multi-Level Hashing Algorithm to Enhance Internet of Things Devices’ and Networks’ Security." International Journal of Intelligent Systems and Applications in Engineering 12.1s (2024): 676-696.

B. U. I. Khan, R. F. Olanrewaju, M. A. Morshidi, R. N. Mir, M. L. B. M. Kiah, and A. M. Khan, "Evolution and analysis of secured hash algorithm (SHA) family," Malaysian Journal of Computer Science, vol. 35, no. 3, pp. 179-200, 2022.

F. Hasmawati, Y. T. Samiha, A. Razzaq, and M. Anshari, "Understanding nomophobia among digital natives: Characteristics and challenges," Journal of Critical Reviews, vol. 7, no. 13, pp. 122-131, 2020.

Alanazi, Turki M. "Embedded System Based Raspberry Pi 4 for Text Detection and Recognition." Intelligent Automation & Soft Computing 36.3 (2023).

S. E. Mathe, A. C. Pamarthy, H. K. Kondaveeti, and S. Vappangi, "A review on raspberry pi and its robotic applications," in 2022 2nd International Conference on Artificial Intelligence and Signal Processing (AISP), 2022: IEEE, pp. 1-6.

S. Monk, Raspberry pi cookbook. " O'Reilly Media, Inc.", 2022.

Juan Garcia, Guðmundsdóttir Anna, Johansson Anna, Maria Jansen, Anna Wagner. Machine Learning for Predictive Maintenance and Decision Making in Manufacturing. Kuwait Journal of Machine Learning, 2(4). Retrieved from

Prasad, A. K. ., M, D. K. ., Macedo, V. D. J. ., Mohan, B. R. ., & N, A. P. . (2023). Machine Learning Approach for Prediction of the Online User Intention for a Product Purchase. International Journal on Recent and Innovation Trends in Computing and Communication, 11(1s), 43–51.

Tripathi, R.C., Gupta, P., Anand, R., Jayashankar, R.J., Mohanty, A., Michael, G., Dhabliya, D. Application of information technology law in India on IoT/IoE with image processing (2023) Handbook of Research on Thrust Technologies? Effect on Image Processing, pp. 135-150.




How to Cite

Ghazi Sami, T. M. ., Zeebaree, S. R. M. ., & Ahmed, S. H. . (2023). Designing a New Hashing Algorithm for Enhancing IoT Devices Security and Energy Management. International Journal of Intelligent Systems and Applications in Engineering, 12(4s), 202–215. Retrieved from



Research Article