The security of IoT layers has become paramount considering the various attacks facing IoT devices, especially the perceptual layer. Reported attacks in recent times include direct Denial of Service (DDoS), botnet attacks, and falsification attacks. Some security schemes, such as the symmetric polynomial concept, privacy-preserving communication protocols for IoT applications, blockchain-based secure IoT systems, and mutual authentication systems for wearable technology, cannot be directly implemented on the perceptual layer of the IoT device. This study presents a binary field elliptic curve cryptography algorithm for the security of the perceptual layer of IoT, such as mobile phones, contactless cards, and POS devices in electronic payment transactions. The IoT devices have four layers: the application, support, network, and perceptual or sensor layer. The sensors of the devices were locked against any communication between the nodes. Each device is recognised and locked against all forms of communication. Device authentication for key agreement and unlocking, communication phase for exchange of information. The evaluation of this study is based on storage capacity, computational time, and jitter. It was implemented on a contactless ATM card, POS device, and a mobile phone as an IoT device for electronic payment. The evaluation result for storage capacity showed that the mobile phone and the ATM card could run the ECC security protocol directly. The Jitter result reveals that the Jitter value did not deviate from normal for both devices. At the same time, the computational time showed that it is computationally efficient to use ECC over the binary field for the security of the perceptual layer. This scheme is efficient for the security of IoT.