Lightweight Symmetric and Asymmetric Cryptographic Protocols for Ultra-Low-Power Internet of Things Devices in Constrained Environments

Authors

  • Tendayi Tsokota Computer Forensic Analyst, Zimbabwe Author

Keywords:

Lightweight Cryptography, IoT Security, Symmetric Encryption, Asymmetric Encryption, Ultra-Low-Power Devices, Constrained Environments

Abstract

The Internet of Things (IoT) is revolutionizing industries by enabling seamless interconnectivity between ultra-low-power devices. However, ensuring security in constrained environments remains a critical challenge due to limited computational resources and energy constraints. This paper explores lightweight symmetric and asymmetric cryptographic protocols designed specifically for resource-constrained IoT devices. A comparative analysis of various existing cryptographic schemes is conducted, highlighting trade-offs between security, performance, and power consumption. Additionally, experimental results and performance evaluations provide insights into the most efficient cryptographic techniques suitable for different IoT applications.

References

Akin, F., & Zhao, Y. "Lightweight Cryptographic Solutions for IoT Networks." Journal of Cybersecurity, 2021, pp. 112-125.

Banik, S., et al. "A Comprehensive Review of Symmetric and Asymmetric Cryptography in IoT." Computing Security Journal, 2020, pp. 78-92.

Chang, H., & Liu, J. "Performance Analysis of ECC for IoT Applications." Security in IoT Systems, 2022, pp. 45-60.

Das, P., & Roy, K. "Comparative Analysis of SPECK and AES in IoT Devices." IEEE Transactions on Security, 2019, pp. 300-315.

Eslami, M., et al. "Energy-Efficient Cryptography in Low-Power IoT Devices." Sensors and Security Journal, 2021, pp. 98-115.

Farooq, U., & Shaikh, A. "Survey on Lightweight Encryption Algorithms." Cyber Defense Review, 2018, pp. 45-70.

Gupta, S., & Joshi, P. "Hybrid Cryptography for IoT Security." Journal of Cryptographic Research, 2020, pp. 128-140.

Hsu, M., et al. "Implementation of Secure IoT Authentication Protocols." IoT Security Review, 2019, pp. 65-85.

Islam, T., et al. "Security vs. Performance in IoT Encryption." Computing and Security Advances, 2021, pp. 88-102.

Kumar, A., & Singh, R. "Elliptic Curve Cryptography vs RSA for IoT." International Journal of Cryptography, 2020, pp. 99-114.

Lee, C., et al. "Optimized Cryptographic Frameworks for IoT." Cybersecurity and IoT, 2022, pp. 56-78.

Mohammed, R., et al. "Lightweight Symmetric Encryption Techniques." Journal of Embedded Systems Security, 2020, pp. 47-61.

Zhang, P., & Wong, D. "Challenges in IoT Cryptography." IEEE IoT Journal, 2019, pp. 150-170.

Downloads

Published

2025-02-15