Evolving Trends in Lightweight Cryptography for Secure IoT: Overcoming Challenges and Delivering Solutions

Authors

  • T P Sreedevi Assistant professor, Computer Applications, Aurora’s PG College (MBA), Panjagutta, Hyderabad, Telangana, India. Author
  • Dr V Harsha Shastri Associate Professor, Computer Science, Dean of Informatics, Aurora Deemed to be University, Hyderabad, Telangana, India. Author

DOI:

https://doi.org/10.47392/IRJAEM.2025.0232

Keywords:

signcryption, cryptographic algorithms, constrained devices, lightweight cryptography, IoT security

Abstract

The Internet of Things (IoT) reshapes global technology through unproblematic interoperability between different systems, but protecting these networks is a huge problem for low-end devices. The majority of conventional encryption methods involve massive computation and communication overhead, which disallows real-time protection of data and efficient functioning of the system. This paper summarily discusses dedicated cryptographic protocols used in IoT environments and how they influence communication reliability and processing efficiency. It puts this new lightweight crypto technology to the test, in this case targeting signcryption techniques. These combine digital signatures and encryption into a single operation, reducing the overhead yet ensuring high security. Stringent performance analysis attests to the fact that these new methods admirably meet the special requirements of IoT devices with enhanced security without sacrificing speed or resource usage. The research also touches on the latest developments in cryptographic research and provides a blueprint for creating cost-effective, secure communication protocols in the future. Through a study of real-world applications and theoretical models, this paper provides strategic advice on designing future-proof secure IoT platforms. The results provide an overall view of balancing security needs with limited computational resources, providing strong security to interconnected systems in fast-changing technological environments. The paper also takes into account real-world implementation practical concerns and provides industry adoption and standardization recommendations in real-world applications.

Downloads

Download data is not yet available.

Downloads

Published

2025-04-23