Lightweight Symmetric and Asymmetric Cryptographic Protocols for Ultra-Low-Power Internet of Things Devices in Constrained Environments
Keywords:
Lightweight Cryptography, IoT Security, Symmetric Encryption, Asymmetric Encryption, Ultra-Low-Power Devices, Constrained EnvironmentsAbstract
The Internet of Things (IoT) is revolutionizing industries by enabling seamless interconnectivity between ultra-low-power devices. However, ensuring security in constrained environments remains a critical challenge due to limited computational resources and energy constraints. This paper explores lightweight symmetric and asymmetric cryptographic protocols designed specifically for resource-constrained IoT devices. A comparative analysis of various existing cryptographic schemes is conducted, highlighting trade-offs between security, performance, and power consumption. Additionally, experimental results and performance evaluations provide insights into the most efficient cryptographic techniques suitable for different IoT applications.
References
Akin, F., & Zhao, Y. "Lightweight Cryptographic Solutions for IoT Networks." Journal of Cybersecurity, 2021, pp. 112-125.
Banik, S., et al. "A Comprehensive Review of Symmetric and Asymmetric Cryptography in IoT." Computing Security Journal, 2020, pp. 78-92.
Chang, H., & Liu, J. "Performance Analysis of ECC for IoT Applications." Security in IoT Systems, 2022, pp. 45-60.
Das, P., & Roy, K. "Comparative Analysis of SPECK and AES in IoT Devices." IEEE Transactions on Security, 2019, pp. 300-315.
Eslami, M., et al. "Energy-Efficient Cryptography in Low-Power IoT Devices." Sensors and Security Journal, 2021, pp. 98-115.
Farooq, U., & Shaikh, A. "Survey on Lightweight Encryption Algorithms." Cyber Defense Review, 2018, pp. 45-70.
Gupta, S., & Joshi, P. "Hybrid Cryptography for IoT Security." Journal of Cryptographic Research, 2020, pp. 128-140.
Hsu, M., et al. "Implementation of Secure IoT Authentication Protocols." IoT Security Review, 2019, pp. 65-85.
Islam, T., et al. "Security vs. Performance in IoT Encryption." Computing and Security Advances, 2021, pp. 88-102.
Kumar, A., & Singh, R. "Elliptic Curve Cryptography vs RSA for IoT." International Journal of Cryptography, 2020, pp. 99-114.
Lee, C., et al. "Optimized Cryptographic Frameworks for IoT." Cybersecurity and IoT, 2022, pp. 56-78.
Mohammed, R., et al. "Lightweight Symmetric Encryption Techniques." Journal of Embedded Systems Security, 2020, pp. 47-61.
Zhang, P., & Wong, D. "Challenges in IoT Cryptography." IEEE IoT Journal, 2019, pp. 150-170.
Downloads
Published
Issue
Section
License
Copyright (c) -1 Tendayi Tsokota (Author)

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.