0% found this document useful (0 votes)
21 views17 pages

Technical Seminar Content

The document discusses secure data sharing techniques in the Internet of Things (IoT) using lightweight cryptography, addressing the unique constraints of IoT devices that limit the use of conventional cryptographic methods. It highlights the importance of implementing robust security mechanisms to protect sensitive data during transmission and storage, while exploring various lightweight cryptographic algorithms and secure communication protocols. The seminar aims to provide insights into vulnerabilities, modern frameworks, and case studies for practical implementation in resource-constrained IoT environments.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views17 pages

Technical Seminar Content

The document discusses secure data sharing techniques in the Internet of Things (IoT) using lightweight cryptography, addressing the unique constraints of IoT devices that limit the use of conventional cryptographic methods. It highlights the importance of implementing robust security mechanisms to protect sensitive data during transmission and storage, while exploring various lightweight cryptographic algorithms and secure communication protocols. The seminar aims to provide insights into vulnerabilities, modern frameworks, and case studies for practical implementation in resource-constrained IoT environments.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd

SECURE DATA SHARING TECHNIQUES IN IOT USING LIGHTWEIGHT CRYPTOGRAPHY

2024-25

CHAPTER 1: INTRODUCTION

The Internet of Things (IoT) has rapidly emerged as a transformative force in


modern technology, interconnecting billions of smart devices across various domains such
as healthcare, agriculture, manufacturing, transportation, and smart homes. These devices
collect, transmit, and analyze vast amounts of data to enable intelligent decision-making
and automation. As the number of connected devices grows exponentially, ensuring the
security and privacy of data being shared among them becomes a critical concern. Data
shared within IoT environments often contains sensitive information such as health
records, financial data, or critical infrastructure metrics. Unauthorized access to such data
can lead to severe privacy violations, data breaches, and even threats to human life.
Therefore, implementing robust security mechanisms to protect data during transmission
and storage is essential. However, IoT devices are typically constrained in terms of
processing power, memory, and energy, making the adoption of conventional
cryptographic algorithms impractical.
Lightweight cryptography has emerged as a solution specifically designed to
address the unique constraints of IoT devices while ensuring data security. These
cryptographic techniques aim to offer essential security properties such as confidentiality,
integrity, and authentication with minimal computational and energy overhead.
Lightweight algorithms such as PRESENT, SIMON, SPECK, and LEA have been
developed to provide strong cryptographic primitives tailored for low-resource
environments. Secure data sharing in IoT not only involves encryption but also
encompasses secure key management, mutual authentication between devices, access
control, and protection against various attacks such as eavesdropping, spoofing, and replay
attacks. Designing lightweight security protocols that integrate these features is an ongoing
challenge, especially considering the diversity and scale of IoT networks. Recent
developments by standardization bodies such as the National Institute of Standards and
Technology (NIST) have led to global initiatives to identify and recommend lightweight
cryptographic standards suitable for IoT applications. These efforts have further
accelerated research in this domain, with a focus on developing cryptographic primitives
that are both secure and efficient. The integration of lightweight cryptography in IoT
ensures secure data sharing without compromising the performance or battery life of

DEPT. Of CSE, NIEIT 2024-25


SECURE DATA SHARING TECHNIQUES IN IOT USING LIGHTWEIGHT CRYPTOGRAPHY
2024-25

devices. As IoT continues to expand, the role of lightweight cryptography will be pivotal in
building secure, scalable, and trustworthy IoT ecosystems that can be safely deployed
across critical sectors.

1.1 Objective
The primary objective of this technical seminar is to explore and understand secure
data sharing mechanisms in IoT environments using lightweight cryptography. The
seminar focuses on:
 Identifying vulnerabilities in traditional data-sharing mechanisms within IoT
ecosystems.
 Studying lightweight cryptographic primitives suitable for resource-constrained IoT
devices.
 Analyzing modern secure communication protocols and frameworks incorporating
lightweight cryptography.
 Highlighting case studies and research advancements in the field for practical
implementation insights.
The goal is to provide a comprehensive understanding of how to design and
implement secure, efficient, and scalable data sharing models for IoT networks using
lightweight cryptographic solutions.

1.2 Scope
The scope of this seminar spans across the following key aspects:

 Understanding the nature of security threats in interconnected IoT systems.


 A deep dive into lightweight cryptographic algorithms like PRESENT, HIGHT,
SPECK, and SIMON, and their application in real-world IoT scenarios.
 Studying various secure data transmission frameworks that leverage lightweight
cryptographic primitives.

 Overview of initiatives by organizations like NIST for standardizing lightweight


cryptographic algorithms.
 Exploring secure IoT deployment scenarios across healthcare, smart homes,
industrial IoT, and more.

DEPT. Of CSE, NIEIT 2024-25


SECURE DATA SHARING TECHNIQUES IN IOT USING LIGHTWEIGHT CRYPTOGRAPHY
2024-25

CHAPTER 2: LITERATURE SURVEY

2.1 History:

This section discusses various secure data sharing techniques in IoT and highlights
how lightweight cryptographic methods are increasingly being adopted to protect data in
resource-constrained environments.

[1], Kexian Liu et al. (2024) proposed a blockchain-based secure data-sharing scheme for
IoT that incorporates a distributed key generation mechanism, allowing devices to generate
and manage keys independently without relying on a centralized authority. The framework
ensures data privacy, traceability, and resistance against malicious access, making it
suitable for healthcare and smart infrastructure applications. The proposed method
significantly reduces the computational load on edge devices, facilitating real-time secure
communication.

[2], Iqra Naz et al. (2024) designed a lightweight dynamic encryption model to provide
enhanced security and privacy in IoT environments. The model is based on a frequently
changing encryption key mechanism, making it difficult for attackers to perform brute-
force or replay attacks. The research emphasizes low memory consumption and energy
efficiency while ensuring robust confidentiality, especially in wearable and embedded IoT
devices.

[3], Shreyas Srinath and G. S. Nagaraja (2024) developed a novel cryptographic model
called RLCA (Robust Lightweight Cryptographic Architecture). RLCA is a block cipher
that combines linear and nonlinear transformation layers to ensure high resistance against
differential and linear cryptanalysis. The authors compared RLCA with PRESENT and
reported a 97% improvement in execution time, validating its suitability for secure, fast
data exchange in constrained IoT environments.

[4], K. B. Sarmila and S. V. Manisekaran (2024) proposed a structured lightweight


encryption architecture that integrates Elliptic Light (ELLI) encryption with an RC4-based
authentication function. The design is tailored for data integrity, confidentiality, and

DEPT. Of CSE, NIEIT 2024-25


SECURE DATA SHARING TECHNIQUES IN IOT USING LIGHTWEIGHT CRYPTOGRAPHY
2024-25

authentication in sensitive environments like medical IoT. Performance results indicated


60% reduction in memory usage and 53% faster execution time compared to conventional
methods.

[5], P. S. Suryateja et al. (2024) presented a comprehensive survey of lightweight


cryptographic algorithms for IoT systems. The study classifies 11 different cryptographic
techniques, including Ascon, TinyJAMBU, and Grain-128AEAD, and evaluates them
based on energy efficiency, latency, throughput, and hardware implementation cost. The
paper concludes that lightweight algorithms must be selected based on specific application
requirements, such as environment, hardware capabilities, and threat models.

[6], Chen et al. (2024) introduced a hybrid lightweight cryptographic framework for secure
data transmission in smart grid IoT environments. Their model uses symmetric encryption
for data confidentiality and asymmetric encryption for secure key exchange, offering a
balance between speed and security. The researchers demonstrated that their framework
minimized energy consumption while maintaining end-to-end security.

[7], Zhang et al. (2024) presented a blockchain-integrated secure data-sharing system


tailored for healthcare IoT applications. The system applies lightweight symmetric
cryptographic techniques to encrypt patient data before transmitting it over the blockchain.
The authors highlighted that this approach ensures immutability, auditability, and
confidentiality without overburdening IoT medical sensors.

[8], Ahmed and Sultana (2025) developed a lightweight access control scheme for
industrial IoT environments. The scheme integrates Elliptic Curve Cryptography (ECC)
with hash-based authentication, ensuring secure user identification and data sharing across
heterogeneous devices. Their work outperformed existing models in terms of latency,
energy usage, and attack resistance.

[9], Kumar et al. (2025) investigated the performance of lightweight encryption algorithms
like SIMON, SPECK, and PRESENT across different IoT devices. They evaluated
memory usage, encryption time, and throughput, concluding that SIMON-64/128 offered
the best trade-off between speed and security in low-power sensor environments. Their
benchmarking results serve as a guideline for cryptographic algorithm selection in
resource-constrained deployments.
DEPT. Of CSE, NIEIT 2024-25
SECURE DATA SHARING TECHNIQUES IN IOT USING LIGHTWEIGHT CRYPTOGRAPHY
2024-25

[10], the NIST Lightweight Cryptography Finalists (2024) were analyzed in a comparative
study by Das and Narayanan (2024), focusing on Ascon, Gimli, Grain-128AEAD, and
TinyJAMBU. The study assessed each algorithm’s resistance to differential and algebraic
attacks, as well as their performance on ARM Cortex-M0+ processors. Ascon was
recommended for its robustness and minimal memory footprint, making it ideal for low-
end IoT platforms.

These studies collectively reinforce that lightweight cryptographic schemes are not
only viable but necessary for secure data sharing in modern IoT networks. Research is now
increasingly focusing on domain-specific customization, where security protocols are
tailored to suit the constraints and risk models of specific sectors like healthcare, industry,
and energy.

DEPT. Of CSE, NIEIT 2024-25


SECURE DATA SHARING TECHNIQUES IN IOT USING LIGHTWEIGHT CRYPTOGRAPHY
2024-25

CHAPTER 3: AN INTROSPECTION OF SECURE


DATA SHARING IN IOT

Secure data sharing in IoT is a complex and layered process that requires seamless
coordination between constrained devices, communication protocols, and cryptographic
techniques. IoT systems are inherently vulnerable due to their distributed nature and
reliance on resource-limited devices such as sensors, actuators, and embedded controllers.
To ensure that the sensitive data generated by these devices is securely shared across
networks, lightweight cryptographic solutions are implemented to provide confidentiality,
integrity, and authenticity without compromising performance.

3.1 Fundamental Components of Secure Data Sharing

To address the above limitations, the secure data sharing process in IoT typically
involves the following components:
1. Data Generation
IoT devices such as temperature sensors, motion detectors, and biometric scanners
continuously generate data. This raw data may include critical or sensitive
information (e.g., patient vitals, industrial readings) which must be protected even
at the source.
2. Data Encryption with Lightweight Cryptography
Before transmission, data is encrypted using lightweight cryptographic algorithms.
These include:
 Block ciphers: PRESENT, SIMON, SPECK, and LED
 Stream ciphers: Grain, Trivium, and TinyJAMBU
 Authenticated encryption schemes: Ascon, ACORN
These algorithms are selected based on their small code size, low energy
consumption, and fast encryption/decryption cycles. Encryption ensures that even if
data is intercepted, it remains unreadable to unauthorized entities.
3. Key Management
A critical aspect of secure communication is managing cryptographic keys
securely. In resource-constrained environments, key distribution and renewal must
be efficient. Techniques include:

DEPT. Of CSE, NIEIT 2024-25


SECURE DATA SHARING TECHNIQUES IN IOT USING LIGHTWEIGHT CRYPTOGRAPHY
2024-25

 Pre-shared keys
 Elliptic Curve Diffie-Hellman (ECDH) for key exchange
 Lightweight key management protocols (e.g., LAKE - Lightweight
Authenticated Key Exchange)
Proper key management ensures that devices can authenticate each other
and establish secure channels.
4. Authentication and Access Control
Lightweight authentication protocols ensure that only authorized devices and users
can access or share data. Mechanisms include:
 Hash-based authentication using lightweight hash functions (e.g.,
SPONGENT, PHOTON)
 Message Authentication Codes (MACs)
 Role-based or attribute-based access control systems tailored to IoT
Authentication prevents impersonation attacks, while access control ensures
data is only shared with intended entities.
5. Secure Communication Channels
Data is transmitted through secure protocols, such as:
 MQTT over TLS/DTLS
 CoAP (Constrained Application Protocol) with DTLS
 Custom protocols with integrated lightweight encryption
These protocols ensure the secure, low-latency transmission of encrypted
data even in lossy and low-bandwidth networks.
6. Data Decryption and Processing
At the receiving end, the encrypted data is decrypted using the shared or derived
key. Once verified and decrypted, the data is used for decision-making, automation,
or monitoring purposes.
7. Auditability and Data Integrity
To prevent data tampering and ensure traceability, some systems incorporate:
 Digital signatures
 Blockchain or distributed ledger technology
 Hash chains for message integrity

DEPT. Of CSE, NIEIT 2024-25


SECURE DATA SHARING TECHNIQUES IN IOT USING LIGHTWEIGHT CRYPTOGRAPHY
2024-25

Figure 3.1: IoT Device Data Sharing System

This diagram presents an architecture for data sharing among IoT devices, emphasizing the
integration of blockchain-based solutions for secure data exchange.

3.2 Core Challenges in Secure Data Sharing


Traditional cryptographic algorithms like RSA, AES-256, and SHA-512 offer
robust security but are computationally expensive. In IoT environments, the primary
challenges include:
 Low processing power of edge devices
 Limited memory and storage capacity
 Power constraints (e.g., battery-operated sensors)
 Real-time communication needs
 Dynamic network topologies
 Susceptibility to physical attacks and eavesdropping
These challenges necessitate a lightweight yet effective security framework to facilitate
secure data exchange without exhausting device resources.

DEPT. Of CSE, NIEIT 2024-25


SECURE DATA SHARING TECHNIQUES IN IOT USING LIGHTWEIGHT CRYPTOGRAPHY
2024-25

CHAPTER 4: SECURE DATA SHARING PROCESS

Secure data sharing in IoT involves a series of well-structured steps that enable the
confidential, authenticated, and efficient exchange of data between devices with limited
resources. The process is built on lightweight cryptographic algorithms and secure
communication protocols tailored for constrained environments.

The main stages in the secure data sharing process are:

 Pre-processing (Data collection and preparation)


 Encryption and key management
 Authentication and access control
 Secure transmission over the network
 Decryption and data verification
 Storage or forwarding to other systems

4.1 Data Acquisition and Pre-processing


The process begins with data acquisition from IoT sensors, actuators, or smart
devices. This data may include environmental readings, biometric details, or machine
status.

 The data is usually collected in raw form and may be temporarily stored in edge
memory.
 In some applications, data is compressed or formatted to minimize size before
encryption.

4.2 Lightweight Encryption


Once the data is pre-processed, it undergoes encryption using lightweight
cryptographic algorithms, selected based on the device’s constraints.

1. Block Ciphers: Used to encrypt fixed-size blocks of data with low memory and CPU
overhead. Examples: PRESENT, SPECK, SIMON
2. Stream Ciphers: Encrypt data bit by bit, ideal for continuous streams like real-time
sensor feeds. Examples: Grain-128AEAD, Trivium

DEPT. Of CSE, NIEIT 2024-25


SECURE DATA SHARING TECHNIQUES IN IOT USING LIGHTWEIGHT CRYPTOGRAPHY
2024-25

3. Authenticated Encryption: Provides both confidentiality and integrity in a single


operation. Ensures tamper-resistance during transmission. Example: Ascon (NIST
finalist)

4.3 Key Management and Exchange


Efficient key distribution is crucial for secure encryption and decryption.

 Pre-shared keys (PSK) are used in static environments.


 In dynamic networks, Elliptic Curve Diffie-Hellman (ECDH) is employed to
exchange keys securely with minimal computational effort.
 Group key management is implemented in multi-node systems using lightweight
key agreement protocols (e.g., LAKE).

4.4 Authentication and Access Control


To prevent unauthorized access, devices and users are authenticated before data
sharing.

 Hash-based Authentication using lightweight hash functions like SPONGENT,


QUARK, or PHOTON.
 Role-Based Access Control (RBAC) and Attribute-Based Encryption (ABE)
enforce policies on who can read, write, or modify data.
 Tokens and certificates are kept small to reduce payload size.

4.5 Secure Transmission


 MQTT over TLS/DTLS, CoAP over DTLS, or custom secure protocols.
 These ensure data confidentiality, reliability, and protection from replay attacks
even in lossy networks.
 Optionally, blockchain networks are used for logging and verifying immutable
transactions in critical applications.

DEPT. Of CSE, NIEIT 2024-25 10


SECURE DATA SHARING TECHNIQUES IN IOT USING LIGHTWEIGHT CRYPTOGRAPHY
2024-25

4.6 Decryption and Data Utilization


 Devices decrypt the data using the shared or session key.
 Decrypted data is verified for integrity using message authentication codes or
digital signatures.
 If authenticated, the data is forwarded for storage, processing, or real-time decision-
making.

DEPT. Of CSE, NIEIT 2024-25 11


SECURE DATA SHARING TECHNIQUES IN IOT USING LIGHTWEIGHT CRYPTOGRAPHY
2024-25

CHAPTER 5: SUMMARIZED BLOCK DIAGRAM

IoT Device/ Sensor

Data Collection

Key Management
Lightweight Encryption (ECDH/PSK)

Authentication and Access


Control Mechanism

Secure Transmission (MQTT/


CoAP over DTLS)

Lightweight Decryption

Data Verification and


utilization

Figure 5.1 overall process of secure data sharing in IoT


This architecture ensures the confidentiality, integrity, and authenticity of shared data
while operating under constrained resources typical of IoT systems.

DEPT. Of CSE, NIEIT 2024-25 12


SECURE DATA SHARING TECHNIQUES IN IOT USING LIGHTWEIGHT CRYPTOGRAPHY
2024-25

1. IoT Device/Sensor
This is the starting point of the process. IoT devices such as sensors, actuators, or
embedded microcontrollers are responsible for generating data from the physical
environment (e.g., temperature, heart rate, motion, humidity).
2. Data Collection
The generated data is first collected and possibly filtered, formatted, or compressed
depending on the device's capabilities. This pre-processing step ensures that only
valid and relevant information moves forward in the security pipeline.
3. Lightweight Encryption
Before data is transmitted over potentially insecure networks, it is encrypted using
lightweight cryptographic algorithms. These algorithms are optimized for
constrained environments and protect the data's confidentiality.
 Block ciphers work on fixed-size blocks.
 Stream ciphers work on bit/byte streams.
 Authenticated encryption adds both confidentiality and integrity.
4. Key Management
Key management is a parallel process that feeds into encryption. Cryptographic
keys are generated, distributed, and managed using secure protocols. In IoT, this
must be lightweight and adaptable to dynamic topologies. Key management
ensures that both sender and receiver share a common secret to encrypt and decrypt
data.
5. Authentication & Access Control
Once data is encrypted, the system must verify the sender and receiver identities to
prevent spoofing or unauthorized access. This is done using:
 Hash-based authentication
 Digital signatures
 Access control models (e.g., Role-Based, Attribute-Based)
6. Secure Transmission
Encrypted and authenticated data is transmitted over secure communication
protocols. These are specially designed for low-bandwidth and lossy networks
typically found in IoT deployments.
 MQTT and CoAP are widely used protocols for messaging.

DEPT. Of CSE, NIEIT 2024-25 13


SECURE DATA SHARING TECHNIQUES IN IOT USING LIGHTWEIGHT CRYPTOGRAPHY
2024-25

 DTLS (Datagram Transport Layer Security) ensures end-to-end encryption


over UDP.
7. Lightweight Decryption
At the receiver end, the data is decrypted using the same or a derived key. The
decryption algorithm mirrors the encryption process and restores the original data.
This operation is also lightweight to suit the receiving device’s constraints.
8. Data Verification & Utilization
The decrypted data is then:
 Verified for integrity (ensuring it wasn't tampered with),
 Checked against authentication tokens, and
 Used for real-time processing, analysis, or decision-making (e.g., alert
generation, actuation, storage in cloud).

Depending on the use case, the data may also be:

 Re-encrypted and forwarded,


 Logged onto a blockchain for traceability,
 Stored in an edge/cloud database for further processing.

5.1 Advantages
 Resource Efficiency: Lightweight cryptographic algorithms are specifically
designed to operate with minimal computational power, making them suitable for
low-power IoT devices.
 Low Memory Footprint: These algorithms require less memory and storage
compared to traditional cryptographic methods.
 High Speed: Most lightweight ciphers offer fast encryption and decryption,
enabling real-time secure communication.
 Scalability: Lightweight encryption schemes can easily scale across large networks
of heterogeneous IoT devices.
 Enhanced Security in Constrained Environments: Despite limited resources,
these techniques ensure strong data confidentiality and integrity.

5.2 Limitations

DEPT. Of CSE, NIEIT 2024-25 14


SECURE DATA SHARING TECHNIQUES IN IOT USING LIGHTWEIGHT CRYPTOGRAPHY
2024-25

While lightweight cryptography provides significant benefits, there are still some
limitations that need to be considered:

 Limited Security Margin: Some lightweight algorithms may not offer the same
level of resistance against advanced cryptanalysis as traditional cryptographic
schemes.
 Key Management Challenges: Securely managing keys across billions of devices
in a scalable and dynamic IoT environment remains a complex task.
 Hardware Diversity: IoT devices vary widely in terms of CPU, memory, and OS,
complicating the implementation of uniform security protocols.
 Latency Sensitivity: Real-time systems demand extremely low latency, making
even lightweight operations critical in timing-sensitive applications.

5.3 Applications
Secure data sharing in IoT using lightweight cryptography has a wide range of real-
world applications across various domains:

 Smart Healthcare: Protecting patient vitals and medical history across wearable
devices and remote monitoring systems.
 Smart Cities: Ensuring secure sensor data exchange for intelligent traffic systems,
environmental monitoring, and smart utilities.
 Industrial IoT (IIoT): Securing machine-to-machine communication in automated
factories and predictive maintenance systems.
 Agriculture: Safe data transmission from remote sensors measuring soil moisture,
temperature, and crop health.
 Military and Defence: Lightweight encrypted communication among unmanned
devices and surveillance systems in battlefield conditions.
 Supply Chain & Logistics: Secure real-time location tracking and condition
monitoring of goods during transit.

DEPT. Of CSE, NIEIT 2024-25 15


SECURE DATA SHARING TECHNIQUES IN IOT USING LIGHTWEIGHT CRYPTOGRAPHY
2024-25

CHAPTER 6: CONCLUSION

The Internet of Things has transformed the way devices interact, creating intelligent
environments where real-time data exchange is critical to functionality. However, with
increased connectivity comes increased vulnerability. Ensuring secure data sharing across
billions of resource-constrained devices is a pressing challenge, and lightweight
cryptography has emerged as a practical and effective solution.

Lightweight cryptographic algorithms provide a balance between security strength and


computational efficiency, making them ideal for devices with limited processing power,
memory, and battery life. These algorithms form the backbone of secure communication
protocols in IoT, enabling encryption, authentication, and integrity checks without
introducing significant latency or energy consumption. Secure data sharing in IoT requires
more than just encryption. It involves a coordinated system of data confidentiality, mutual
authentication, secure key exchange, access control, and tamper resistance. Lightweight
cryptography supports these needs by offering modularity and flexibility, allowing
developers to tailor security mechanisms according to device capabilities and application-
specific requirements. As IoT continues to expand into critical sectors like healthcare,
defense, agriculture, and smart infrastructure, the importance of robust and efficient
security frameworks increases. In such domains, the consequences of data breaches or
device compromise are not limited to information loss — they can lead to physical
damage, system failures, or even threats to human safety. Despite the advantages,
challenges remain. Many lightweight algorithms still lack formal verification or
widespread standardization. Key management and secure onboarding of devices in large,
heterogeneous networks remain complex. Furthermore, most IoT devices are deployed in
unsecured physical environments, making them susceptible to side-channel attacks,
firmware tampering, and reverse engineering. Solutions such as hardware-assisted security,
post-quantum lightweight cryptography, and AI-integrated anomaly detection offer
promising future directions. Addressing these challenges will require collaborative efforts
among researchers, hardware designers, protocol developers, and standardization bodies. It

DEPT. Of CSE, NIEIT 2024-25 16


SECURE DATA SHARING TECHNIQUES IN IOT USING LIGHTWEIGHT CRYPTOGRAPHY
2024-25

is essential to design cross-platform compatible, resource-aware, and adaptive security


frameworks that not only protect against known threats but also evolve to counter
emerging risks.

CHAPTER 7: REFERENCES

[1] Kexian Liu, Jianfeng Guan, Xiaolong Hu, Jianli Liu, Hongke Zhang,
Efficient and Secure Cross-Domain Data-Sharing for Resource-Constrained IoT,
arXiv preprint, November 2024.

[2] Iqra Naz, Rehmat Illahi, Neelam Shahzadi, Hafiz Gulfam Umer Ahmad,
Lightweight Encryption Model for IoT Security and Privacy Protection,
Advances in Wireless Communications and Networks, September 2024.

[3] Shreyas Srinath, G. S. Nagaraja, RLCA: Robust Lightweight Cryptographic Paradigm


for Secure Data Transfer Between IoT Devices, SN Computer Science, June 2024.

[4] K. B. Sarmila, S. V. Manisekaran, A Structured Lightweight Encryption Architecture


for Data Protection in IoT, International Journal of Electronics, August 2024.

[5] P. S. Suryateja, G. V. Subrahmanyam, V. Pradeep, A Survey on Lightweight


Cryptographic Algorithms in IoT, Computer Applications: An International Journal
(CAIJ), March 2024.

[7] Chen, L., et al., Hybrid Cryptography Scheme for Secure Data Transmission in Smart
Grid IoT, IEEE Internet of Things Journal, 2024.

[8] Zhang, F., et al., Blockchain-Based Lightweight Data Sharing Framework for
Healthcare IoT, Future Generation Computer Systems, 2024.

[9] Ahmed, M., Sultana, R., An Efficient Lightweight Access Control Scheme for
Industrial IoT, Journal of Information Security and Applications, 2025.

[10] Kumar, A., et al., Performance Analysis of Lightweight Encryption Algorithms in IoT
Devices, International Journal of Embedded Systems and IoT, 2025.

DEPT. Of CSE, NIEIT 2024-25 17

You might also like