SECURE DATA SHARING TECHNIQUES IN IOT USING LIGHTWEIGHT CRYPTOGRAPHY
2024-25
CHAPTER 1: INTRODUCTION
The Internet of Things (IoT) has rapidly emerged as a transformative force in
modern technology, interconnecting billions of smart devices across various domains such
as healthcare, agriculture, manufacturing, transportation, and smart homes. These devices
collect, transmit, and analyze vast amounts of data to enable intelligent decision-making
and automation. As the number of connected devices grows exponentially, ensuring the
security and privacy of data being shared among them becomes a critical concern. Data
shared within IoT environments often contains sensitive information such as health
records, financial data, or critical infrastructure metrics. Unauthorized access to such data
can lead to severe privacy violations, data breaches, and even threats to human life.
Therefore, implementing robust security mechanisms to protect data during transmission
and storage is essential. However, IoT devices are typically constrained in terms of
processing power, memory, and energy, making the adoption of conventional
cryptographic algorithms impractical.
Lightweight cryptography has emerged as a solution specifically designed to
address the unique constraints of IoT devices while ensuring data security. These
cryptographic techniques aim to offer essential security properties such as confidentiality,
integrity, and authentication with minimal computational and energy overhead.
Lightweight algorithms such as PRESENT, SIMON, SPECK, and LEA have been
developed to provide strong cryptographic primitives tailored for low-resource
environments. Secure data sharing in IoT not only involves encryption but also
encompasses secure key management, mutual authentication between devices, access
control, and protection against various attacks such as eavesdropping, spoofing, and replay
attacks. Designing lightweight security protocols that integrate these features is an ongoing
challenge, especially considering the diversity and scale of IoT networks. Recent
developments by standardization bodies such as the National Institute of Standards and
Technology (NIST) have led to global initiatives to identify and recommend lightweight
cryptographic standards suitable for IoT applications. These efforts have further
accelerated research in this domain, with a focus on developing cryptographic primitives
that are both secure and efficient. The integration of lightweight cryptography in IoT
ensures secure data sharing without compromising the performance or battery life of
DEPT. Of CSE, NIEIT 2024-25
SECURE DATA SHARING TECHNIQUES IN IOT USING LIGHTWEIGHT CRYPTOGRAPHY
2024-25
devices. As IoT continues to expand, the role of lightweight cryptography will be pivotal in
building secure, scalable, and trustworthy IoT ecosystems that can be safely deployed
across critical sectors.
1.1 Objective
The primary objective of this technical seminar is to explore and understand secure
data sharing mechanisms in IoT environments using lightweight cryptography. The
seminar focuses on:
Identifying vulnerabilities in traditional data-sharing mechanisms within IoT
ecosystems.
Studying lightweight cryptographic primitives suitable for resource-constrained IoT
devices.
Analyzing modern secure communication protocols and frameworks incorporating
lightweight cryptography.
Highlighting case studies and research advancements in the field for practical
implementation insights.
The goal is to provide a comprehensive understanding of how to design and
implement secure, efficient, and scalable data sharing models for IoT networks using
lightweight cryptographic solutions.
1.2 Scope
The scope of this seminar spans across the following key aspects:
Understanding the nature of security threats in interconnected IoT systems.
A deep dive into lightweight cryptographic algorithms like PRESENT, HIGHT,
SPECK, and SIMON, and their application in real-world IoT scenarios.
Studying various secure data transmission frameworks that leverage lightweight
cryptographic primitives.
Overview of initiatives by organizations like NIST for standardizing lightweight
cryptographic algorithms.
Exploring secure IoT deployment scenarios across healthcare, smart homes,
industrial IoT, and more.
DEPT. Of CSE, NIEIT 2024-25
SECURE DATA SHARING TECHNIQUES IN IOT USING LIGHTWEIGHT CRYPTOGRAPHY
2024-25
CHAPTER 2: LITERATURE SURVEY
2.1 History:
This section discusses various secure data sharing techniques in IoT and highlights
how lightweight cryptographic methods are increasingly being adopted to protect data in
resource-constrained environments.
[1], Kexian Liu et al. (2024) proposed a blockchain-based secure data-sharing scheme for
IoT that incorporates a distributed key generation mechanism, allowing devices to generate
and manage keys independently without relying on a centralized authority. The framework
ensures data privacy, traceability, and resistance against malicious access, making it
suitable for healthcare and smart infrastructure applications. The proposed method
significantly reduces the computational load on edge devices, facilitating real-time secure
communication.
[2], Iqra Naz et al. (2024) designed a lightweight dynamic encryption model to provide
enhanced security and privacy in IoT environments. The model is based on a frequently
changing encryption key mechanism, making it difficult for attackers to perform brute-
force or replay attacks. The research emphasizes low memory consumption and energy
efficiency while ensuring robust confidentiality, especially in wearable and embedded IoT
devices.
[3], Shreyas Srinath and G. S. Nagaraja (2024) developed a novel cryptographic model
called RLCA (Robust Lightweight Cryptographic Architecture). RLCA is a block cipher
that combines linear and nonlinear transformation layers to ensure high resistance against
differential and linear cryptanalysis. The authors compared RLCA with PRESENT and
reported a 97% improvement in execution time, validating its suitability for secure, fast
data exchange in constrained IoT environments.
[4], K. B. Sarmila and S. V. Manisekaran (2024) proposed a structured lightweight
encryption architecture that integrates Elliptic Light (ELLI) encryption with an RC4-based
authentication function. The design is tailored for data integrity, confidentiality, and
DEPT. Of CSE, NIEIT 2024-25
SECURE DATA SHARING TECHNIQUES IN IOT USING LIGHTWEIGHT CRYPTOGRAPHY
2024-25
authentication in sensitive environments like medical IoT. Performance results indicated
60% reduction in memory usage and 53% faster execution time compared to conventional
methods.
[5], P. S. Suryateja et al. (2024) presented a comprehensive survey of lightweight
cryptographic algorithms for IoT systems. The study classifies 11 different cryptographic
techniques, including Ascon, TinyJAMBU, and Grain-128AEAD, and evaluates them
based on energy efficiency, latency, throughput, and hardware implementation cost. The
paper concludes that lightweight algorithms must be selected based on specific application
requirements, such as environment, hardware capabilities, and threat models.
[6], Chen et al. (2024) introduced a hybrid lightweight cryptographic framework for secure
data transmission in smart grid IoT environments. Their model uses symmetric encryption
for data confidentiality and asymmetric encryption for secure key exchange, offering a
balance between speed and security. The researchers demonstrated that their framework
minimized energy consumption while maintaining end-to-end security.
[7], Zhang et al. (2024) presented a blockchain-integrated secure data-sharing system
tailored for healthcare IoT applications. The system applies lightweight symmetric
cryptographic techniques to encrypt patient data before transmitting it over the blockchain.
The authors highlighted that this approach ensures immutability, auditability, and
confidentiality without overburdening IoT medical sensors.
[8], Ahmed and Sultana (2025) developed a lightweight access control scheme for
industrial IoT environments. The scheme integrates Elliptic Curve Cryptography (ECC)
with hash-based authentication, ensuring secure user identification and data sharing across
heterogeneous devices. Their work outperformed existing models in terms of latency,
energy usage, and attack resistance.
[9], Kumar et al. (2025) investigated the performance of lightweight encryption algorithms
like SIMON, SPECK, and PRESENT across different IoT devices. They evaluated
memory usage, encryption time, and throughput, concluding that SIMON-64/128 offered
the best trade-off between speed and security in low-power sensor environments. Their
benchmarking results serve as a guideline for cryptographic algorithm selection in
resource-constrained deployments.
DEPT. Of CSE, NIEIT 2024-25
SECURE DATA SHARING TECHNIQUES IN IOT USING LIGHTWEIGHT CRYPTOGRAPHY
2024-25
[10], the NIST Lightweight Cryptography Finalists (2024) were analyzed in a comparative
study by Das and Narayanan (2024), focusing on Ascon, Gimli, Grain-128AEAD, and
TinyJAMBU. The study assessed each algorithm’s resistance to differential and algebraic
attacks, as well as their performance on ARM Cortex-M0+ processors. Ascon was
recommended for its robustness and minimal memory footprint, making it ideal for low-
end IoT platforms.
These studies collectively reinforce that lightweight cryptographic schemes are not
only viable but necessary for secure data sharing in modern IoT networks. Research is now
increasingly focusing on domain-specific customization, where security protocols are
tailored to suit the constraints and risk models of specific sectors like healthcare, industry,
and energy.
DEPT. Of CSE, NIEIT 2024-25
SECURE DATA SHARING TECHNIQUES IN IOT USING LIGHTWEIGHT CRYPTOGRAPHY
2024-25
CHAPTER 3: AN INTROSPECTION OF SECURE
DATA SHARING IN IOT
Secure data sharing in IoT is a complex and layered process that requires seamless
coordination between constrained devices, communication protocols, and cryptographic
techniques. IoT systems are inherently vulnerable due to their distributed nature and
reliance on resource-limited devices such as sensors, actuators, and embedded controllers.
To ensure that the sensitive data generated by these devices is securely shared across
networks, lightweight cryptographic solutions are implemented to provide confidentiality,
integrity, and authenticity without compromising performance.
3.1 Fundamental Components of Secure Data Sharing
To address the above limitations, the secure data sharing process in IoT typically
involves the following components:
1. Data Generation
IoT devices such as temperature sensors, motion detectors, and biometric scanners
continuously generate data. This raw data may include critical or sensitive
information (e.g., patient vitals, industrial readings) which must be protected even
at the source.
2. Data Encryption with Lightweight Cryptography
Before transmission, data is encrypted using lightweight cryptographic algorithms.
These include:
Block ciphers: PRESENT, SIMON, SPECK, and LED
Stream ciphers: Grain, Trivium, and TinyJAMBU
Authenticated encryption schemes: Ascon, ACORN
These algorithms are selected based on their small code size, low energy
consumption, and fast encryption/decryption cycles. Encryption ensures that even if
data is intercepted, it remains unreadable to unauthorized entities.
3. Key Management
A critical aspect of secure communication is managing cryptographic keys
securely. In resource-constrained environments, key distribution and renewal must
be efficient. Techniques include:
DEPT. Of CSE, NIEIT 2024-25
SECURE DATA SHARING TECHNIQUES IN IOT USING LIGHTWEIGHT CRYPTOGRAPHY
2024-25
Pre-shared keys
Elliptic Curve Diffie-Hellman (ECDH) for key exchange
Lightweight key management protocols (e.g., LAKE - Lightweight
Authenticated Key Exchange)
Proper key management ensures that devices can authenticate each other
and establish secure channels.
4. Authentication and Access Control
Lightweight authentication protocols ensure that only authorized devices and users
can access or share data. Mechanisms include:
Hash-based authentication using lightweight hash functions (e.g.,
SPONGENT, PHOTON)
Message Authentication Codes (MACs)
Role-based or attribute-based access control systems tailored to IoT
Authentication prevents impersonation attacks, while access control ensures
data is only shared with intended entities.
5. Secure Communication Channels
Data is transmitted through secure protocols, such as:
MQTT over TLS/DTLS
CoAP (Constrained Application Protocol) with DTLS
Custom protocols with integrated lightweight encryption
These protocols ensure the secure, low-latency transmission of encrypted
data even in lossy and low-bandwidth networks.
6. Data Decryption and Processing
At the receiving end, the encrypted data is decrypted using the shared or derived
key. Once verified and decrypted, the data is used for decision-making, automation,
or monitoring purposes.
7. Auditability and Data Integrity
To prevent data tampering and ensure traceability, some systems incorporate:
Digital signatures
Blockchain or distributed ledger technology
Hash chains for message integrity
DEPT. Of CSE, NIEIT 2024-25
SECURE DATA SHARING TECHNIQUES IN IOT USING LIGHTWEIGHT CRYPTOGRAPHY
2024-25
Figure 3.1: IoT Device Data Sharing System
This diagram presents an architecture for data sharing among IoT devices, emphasizing the
integration of blockchain-based solutions for secure data exchange.
3.2 Core Challenges in Secure Data Sharing
Traditional cryptographic algorithms like RSA, AES-256, and SHA-512 offer
robust security but are computationally expensive. In IoT environments, the primary
challenges include:
Low processing power of edge devices
Limited memory and storage capacity
Power constraints (e.g., battery-operated sensors)
Real-time communication needs
Dynamic network topologies
Susceptibility to physical attacks and eavesdropping
These challenges necessitate a lightweight yet effective security framework to facilitate
secure data exchange without exhausting device resources.
DEPT. Of CSE, NIEIT 2024-25
SECURE DATA SHARING TECHNIQUES IN IOT USING LIGHTWEIGHT CRYPTOGRAPHY
2024-25
CHAPTER 4: SECURE DATA SHARING PROCESS
Secure data sharing in IoT involves a series of well-structured steps that enable the
confidential, authenticated, and efficient exchange of data between devices with limited
resources. The process is built on lightweight cryptographic algorithms and secure
communication protocols tailored for constrained environments.
The main stages in the secure data sharing process are:
Pre-processing (Data collection and preparation)
Encryption and key management
Authentication and access control
Secure transmission over the network
Decryption and data verification
Storage or forwarding to other systems
4.1 Data Acquisition and Pre-processing
The process begins with data acquisition from IoT sensors, actuators, or smart
devices. This data may include environmental readings, biometric details, or machine
status.
The data is usually collected in raw form and may be temporarily stored in edge
memory.
In some applications, data is compressed or formatted to minimize size before
encryption.
4.2 Lightweight Encryption
Once the data is pre-processed, it undergoes encryption using lightweight
cryptographic algorithms, selected based on the device’s constraints.
1. Block Ciphers: Used to encrypt fixed-size blocks of data with low memory and CPU
overhead. Examples: PRESENT, SPECK, SIMON
2. Stream Ciphers: Encrypt data bit by bit, ideal for continuous streams like real-time
sensor feeds. Examples: Grain-128AEAD, Trivium
DEPT. Of CSE, NIEIT 2024-25
SECURE DATA SHARING TECHNIQUES IN IOT USING LIGHTWEIGHT CRYPTOGRAPHY
2024-25
3. Authenticated Encryption: Provides both confidentiality and integrity in a single
operation. Ensures tamper-resistance during transmission. Example: Ascon (NIST
finalist)
4.3 Key Management and Exchange
Efficient key distribution is crucial for secure encryption and decryption.
Pre-shared keys (PSK) are used in static environments.
In dynamic networks, Elliptic Curve Diffie-Hellman (ECDH) is employed to
exchange keys securely with minimal computational effort.
Group key management is implemented in multi-node systems using lightweight
key agreement protocols (e.g., LAKE).
4.4 Authentication and Access Control
To prevent unauthorized access, devices and users are authenticated before data
sharing.
Hash-based Authentication using lightweight hash functions like SPONGENT,
QUARK, or PHOTON.
Role-Based Access Control (RBAC) and Attribute-Based Encryption (ABE)
enforce policies on who can read, write, or modify data.
Tokens and certificates are kept small to reduce payload size.
4.5 Secure Transmission
MQTT over TLS/DTLS, CoAP over DTLS, or custom secure protocols.
These ensure data confidentiality, reliability, and protection from replay attacks
even in lossy networks.
Optionally, blockchain networks are used for logging and verifying immutable
transactions in critical applications.
DEPT. Of CSE, NIEIT 2024-25 10
SECURE DATA SHARING TECHNIQUES IN IOT USING LIGHTWEIGHT CRYPTOGRAPHY
2024-25
4.6 Decryption and Data Utilization
Devices decrypt the data using the shared or session key.
Decrypted data is verified for integrity using message authentication codes or
digital signatures.
If authenticated, the data is forwarded for storage, processing, or real-time decision-
making.
DEPT. Of CSE, NIEIT 2024-25 11
SECURE DATA SHARING TECHNIQUES IN IOT USING LIGHTWEIGHT CRYPTOGRAPHY
2024-25
CHAPTER 5: SUMMARIZED BLOCK DIAGRAM
IoT Device/ Sensor
Data Collection
Key Management
Lightweight Encryption (ECDH/PSK)
Authentication and Access
Control Mechanism
Secure Transmission (MQTT/
CoAP over DTLS)
Lightweight Decryption
Data Verification and
utilization
Figure 5.1 overall process of secure data sharing in IoT
This architecture ensures the confidentiality, integrity, and authenticity of shared data
while operating under constrained resources typical of IoT systems.
DEPT. Of CSE, NIEIT 2024-25 12
SECURE DATA SHARING TECHNIQUES IN IOT USING LIGHTWEIGHT CRYPTOGRAPHY
2024-25
1. IoT Device/Sensor
This is the starting point of the process. IoT devices such as sensors, actuators, or
embedded microcontrollers are responsible for generating data from the physical
environment (e.g., temperature, heart rate, motion, humidity).
2. Data Collection
The generated data is first collected and possibly filtered, formatted, or compressed
depending on the device's capabilities. This pre-processing step ensures that only
valid and relevant information moves forward in the security pipeline.
3. Lightweight Encryption
Before data is transmitted over potentially insecure networks, it is encrypted using
lightweight cryptographic algorithms. These algorithms are optimized for
constrained environments and protect the data's confidentiality.
Block ciphers work on fixed-size blocks.
Stream ciphers work on bit/byte streams.
Authenticated encryption adds both confidentiality and integrity.
4. Key Management
Key management is a parallel process that feeds into encryption. Cryptographic
keys are generated, distributed, and managed using secure protocols. In IoT, this
must be lightweight and adaptable to dynamic topologies. Key management
ensures that both sender and receiver share a common secret to encrypt and decrypt
data.
5. Authentication & Access Control
Once data is encrypted, the system must verify the sender and receiver identities to
prevent spoofing or unauthorized access. This is done using:
Hash-based authentication
Digital signatures
Access control models (e.g., Role-Based, Attribute-Based)
6. Secure Transmission
Encrypted and authenticated data is transmitted over secure communication
protocols. These are specially designed for low-bandwidth and lossy networks
typically found in IoT deployments.
MQTT and CoAP are widely used protocols for messaging.
DEPT. Of CSE, NIEIT 2024-25 13
SECURE DATA SHARING TECHNIQUES IN IOT USING LIGHTWEIGHT CRYPTOGRAPHY
2024-25
DTLS (Datagram Transport Layer Security) ensures end-to-end encryption
over UDP.
7. Lightweight Decryption
At the receiver end, the data is decrypted using the same or a derived key. The
decryption algorithm mirrors the encryption process and restores the original data.
This operation is also lightweight to suit the receiving device’s constraints.
8. Data Verification & Utilization
The decrypted data is then:
Verified for integrity (ensuring it wasn't tampered with),
Checked against authentication tokens, and
Used for real-time processing, analysis, or decision-making (e.g., alert
generation, actuation, storage in cloud).
Depending on the use case, the data may also be:
Re-encrypted and forwarded,
Logged onto a blockchain for traceability,
Stored in an edge/cloud database for further processing.
5.1 Advantages
Resource Efficiency: Lightweight cryptographic algorithms are specifically
designed to operate with minimal computational power, making them suitable for
low-power IoT devices.
Low Memory Footprint: These algorithms require less memory and storage
compared to traditional cryptographic methods.
High Speed: Most lightweight ciphers offer fast encryption and decryption,
enabling real-time secure communication.
Scalability: Lightweight encryption schemes can easily scale across large networks
of heterogeneous IoT devices.
Enhanced Security in Constrained Environments: Despite limited resources,
these techniques ensure strong data confidentiality and integrity.
5.2 Limitations
DEPT. Of CSE, NIEIT 2024-25 14
SECURE DATA SHARING TECHNIQUES IN IOT USING LIGHTWEIGHT CRYPTOGRAPHY
2024-25
While lightweight cryptography provides significant benefits, there are still some
limitations that need to be considered:
Limited Security Margin: Some lightweight algorithms may not offer the same
level of resistance against advanced cryptanalysis as traditional cryptographic
schemes.
Key Management Challenges: Securely managing keys across billions of devices
in a scalable and dynamic IoT environment remains a complex task.
Hardware Diversity: IoT devices vary widely in terms of CPU, memory, and OS,
complicating the implementation of uniform security protocols.
Latency Sensitivity: Real-time systems demand extremely low latency, making
even lightweight operations critical in timing-sensitive applications.
5.3 Applications
Secure data sharing in IoT using lightweight cryptography has a wide range of real-
world applications across various domains:
Smart Healthcare: Protecting patient vitals and medical history across wearable
devices and remote monitoring systems.
Smart Cities: Ensuring secure sensor data exchange for intelligent traffic systems,
environmental monitoring, and smart utilities.
Industrial IoT (IIoT): Securing machine-to-machine communication in automated
factories and predictive maintenance systems.
Agriculture: Safe data transmission from remote sensors measuring soil moisture,
temperature, and crop health.
Military and Defence: Lightweight encrypted communication among unmanned
devices and surveillance systems in battlefield conditions.
Supply Chain & Logistics: Secure real-time location tracking and condition
monitoring of goods during transit.
DEPT. Of CSE, NIEIT 2024-25 15
SECURE DATA SHARING TECHNIQUES IN IOT USING LIGHTWEIGHT CRYPTOGRAPHY
2024-25
CHAPTER 6: CONCLUSION
The Internet of Things has transformed the way devices interact, creating intelligent
environments where real-time data exchange is critical to functionality. However, with
increased connectivity comes increased vulnerability. Ensuring secure data sharing across
billions of resource-constrained devices is a pressing challenge, and lightweight
cryptography has emerged as a practical and effective solution.
Lightweight cryptographic algorithms provide a balance between security strength and
computational efficiency, making them ideal for devices with limited processing power,
memory, and battery life. These algorithms form the backbone of secure communication
protocols in IoT, enabling encryption, authentication, and integrity checks without
introducing significant latency or energy consumption. Secure data sharing in IoT requires
more than just encryption. It involves a coordinated system of data confidentiality, mutual
authentication, secure key exchange, access control, and tamper resistance. Lightweight
cryptography supports these needs by offering modularity and flexibility, allowing
developers to tailor security mechanisms according to device capabilities and application-
specific requirements. As IoT continues to expand into critical sectors like healthcare,
defense, agriculture, and smart infrastructure, the importance of robust and efficient
security frameworks increases. In such domains, the consequences of data breaches or
device compromise are not limited to information loss — they can lead to physical
damage, system failures, or even threats to human safety. Despite the advantages,
challenges remain. Many lightweight algorithms still lack formal verification or
widespread standardization. Key management and secure onboarding of devices in large,
heterogeneous networks remain complex. Furthermore, most IoT devices are deployed in
unsecured physical environments, making them susceptible to side-channel attacks,
firmware tampering, and reverse engineering. Solutions such as hardware-assisted security,
post-quantum lightweight cryptography, and AI-integrated anomaly detection offer
promising future directions. Addressing these challenges will require collaborative efforts
among researchers, hardware designers, protocol developers, and standardization bodies. It
DEPT. Of CSE, NIEIT 2024-25 16
SECURE DATA SHARING TECHNIQUES IN IOT USING LIGHTWEIGHT CRYPTOGRAPHY
2024-25
is essential to design cross-platform compatible, resource-aware, and adaptive security
frameworks that not only protect against known threats but also evolve to counter
emerging risks.
CHAPTER 7: REFERENCES
[1] Kexian Liu, Jianfeng Guan, Xiaolong Hu, Jianli Liu, Hongke Zhang,
Efficient and Secure Cross-Domain Data-Sharing for Resource-Constrained IoT,
arXiv preprint, November 2024.
[2] Iqra Naz, Rehmat Illahi, Neelam Shahzadi, Hafiz Gulfam Umer Ahmad,
Lightweight Encryption Model for IoT Security and Privacy Protection,
Advances in Wireless Communications and Networks, September 2024.
[3] Shreyas Srinath, G. S. Nagaraja, RLCA: Robust Lightweight Cryptographic Paradigm
for Secure Data Transfer Between IoT Devices, SN Computer Science, June 2024.
[4] K. B. Sarmila, S. V. Manisekaran, A Structured Lightweight Encryption Architecture
for Data Protection in IoT, International Journal of Electronics, August 2024.
[5] P. S. Suryateja, G. V. Subrahmanyam, V. Pradeep, A Survey on Lightweight
Cryptographic Algorithms in IoT, Computer Applications: An International Journal
(CAIJ), March 2024.
[7] Chen, L., et al., Hybrid Cryptography Scheme for Secure Data Transmission in Smart
Grid IoT, IEEE Internet of Things Journal, 2024.
[8] Zhang, F., et al., Blockchain-Based Lightweight Data Sharing Framework for
Healthcare IoT, Future Generation Computer Systems, 2024.
[9] Ahmed, M., Sultana, R., An Efficient Lightweight Access Control Scheme for
Industrial IoT, Journal of Information Security and Applications, 2025.
[10] Kumar, A., et al., Performance Analysis of Lightweight Encryption Algorithms in IoT
Devices, International Journal of Embedded Systems and IoT, 2025.
DEPT. Of CSE, NIEIT 2024-25 17