Lightweight Authentication Protocols in Internet of Things - A Review

Lightweight Authentication Protocols in Internet of Things - A Review

  IJETT-book-cover           
  
© 2025 by IJETT Journal
Volume-73 Issue-3
Year of Publication : 2025
Author : Nusrat Hamid Shah, Saiful Adli Ismail, Azizul Azizan, Anne Anoop, Durdana Taranum Khan, Saahira banu Ahamed
DOI : 10.14445/22315381/IJETT-V73I3P108

How to Cite?
Nusrat Hamid Shah, Saiful Adli Ismail, Azizul Azizan, Anne Anoop, Durdana Taranum Khan, Saahira banu Ahamed, "Lightweight Authentication Protocols in Internet of Things - A Review," International Journal of Engineering Trends and Technology, vol. 73, no. 3, pp. 104-119, 2025. Crossref, https://doi.org/10.14445/22315381/IJETT-V73I3P108

Abstract
One possible explanation for the increasing fascination with the Internet of Things (IoT) is the breadth of its possible applications in smart homes, healthcare, transportation, and industrial automation. Data is collected from physical environments and sent across connected networks. From coordinating the usage of small sensors to maintaining server infrastructure, various obstacles exist to overcome when putting IoT into effect. However, a secure and safe data transmission strategy must be implemented due to the enormous volume of data generated and sent by the IoT. Traditional cryptographic methods are often inefficient for such applications. Addressing security issues in the IoT Lightweight Cryptography (LWC) schemes is essential. This study reviews Elliptic Curve Cryptography (ECC), a security method well-matched for IoT environments. The ECC model employs the procedure for creating Private Keys (PRIKs) to encode the elliptic curve. The research found that ECC is often used in IoT-based systems or has gotten more attention than other cryptographic algorithms. With its short key sizes and high degree of security, elliptic curve Encryption (ENC) has become one of the best prominent asymmetric ENC algorithms today. A more robust ECC-based algorithm is required to address the IoT’s secrecy and security concerns and ensure efficient operation. The review highlights the growing use of ECC in IoT systems and its advantages, focusing on the security and efficiency of modern IoT applications.

Keywords
Lightweight Cryptography, ECC, IoT, Data security, Network security.

References
[1] Sunil Kumar et al., “A Review of Lightweight Security and Privacy for Resource-Constrained IoT Devices,” Computers, Materials and Continua, vol. 78, no. 1, pp. 31-63, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[2] Archana D. Wankhade, and Kishor P. Wagh, “Implementation of Secure Cloud Based IoT Communication Using Lightweight Cryptography,” International Journal of Intelligent Systems and Applications in Engineering, vol. 12, no. 1, pp. 310-316, 2024.
[Publisher Link]
[3] Raed Ahmed Alhamarneh, and Manmeet Mahinderjit Singh, “Strengthening Internet of Things Security: Surveying Physical Unclonable Functions for Authentication, Communication Protocols, Challenges, and Applications,” Applied Sciences, vol. 14, no. 5, pp. 1-29, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[4] Sunil Cheruvu et al., Demystifying Internet of Things Security: Successful IoT Device/Edge and Platform Security Deployment, Springer Nature, pp. 1-488, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[5] Kinza Yasar, and Alexander S. Gillis, “What Is the Internet of Things (IoT)?, TechTarget, 2024. [Online]. Available: https://www.techtarget.com/iotagenda/definition/Internet-of-Things-IoT#:~:text=The%20internet%20of%20things%2C%20or,digital%20machines%20and%20consumer%20objects.
[6] Mohammad Nuruzzaman Bhuiyan et al., “Internet of Things (IoT): A Review of its Enabling Technologies in Healthcare Applications, Standards Protocols, Security, and Market Opportunities,” IEEE Internet of Things Journal, vol. 8, no. 13, pp. 10474-10498, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[7] Shashvi Mishra, and Amit Kumar Tyagi, The Role of Machine Learning Techniques in the Internet of Things-Based Cloud Applications, Artificial Intelligence-Based Internet of Things Systems, Springer International Publishing, pp. 105-135, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[8] Rose Adee, and Haralambos Mouratidis, “A Dynamic Four-Step Data Security Model for Data in Cloud Computing Based on Cryptography and Steganography,” Sensors, vol. 22, no. 3, pp. 1-23, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[9] Christian Rechberger, and Roman Walch, Privacy-Preserving Machine Learning using Cryptography, Security and Artificial Intelligence, Springer, pp. 109-129, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[10] Muhammad Rana, Quazi Mamun, and Rafiqul Islam, “Lightweight Cryptography in IoT Networks: A Survey,” Future Generation Computer Systems, vol. 129, pp. 77-89, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[11] Paul C. Van Oorschot, “Public Key Cryptography’s Impact on Society: How Diffie and Hellman Changed the World,” Democratizing Cryptography: The Work of Whitfield Diffie and Martin Hellman, pp. 19-56, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[12] L. Mary Shamala et al., “Lightweight Cryptography Algorithms for Internet of Things Enabled Networks: An Overview,” AICTE Sponsored National E-Conference on Recent Advances in Smart System Automation, Computing and Communication, vol. 1717, pp. 1-14, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[13] Basel Halak, Yildiran Yilmaz, and Daniel Shiu, “Comparative Analysis of Energy Costs of Asymmetric vs Symmetric Encryption-Based Security Applications,” IEEE Access, vol. 10, pp. 76707-76719, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[14] Jarosław Duda, and Marcin Niemiec, “Lightweight Compression with Encryption Based on Asymmetric Numeral Systems,” International Journal of Applied Mathematics and Computer Science, vol. 33, no. 1, pp. 45-55, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[15] Ahmad Mansour, Khalid M. Malik, and Niko Kaso, “AMOUN: Asymmetric Lightweight Cryptographic Scheme for Wireless Group Communication,” Computer Communications, vol. 169, pp. 154-167, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[16] Y. Justindhas, and P. Jeyanthi, “Secured Model for Internet of Things (IOT) to Monitor Smart Field Data With Integrated Real-Time Cloud Using Lightweight Cryptography,” IETE Journal of Research, vol. 69, no. 8, pp. 5134-5147, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[17] Mehdi Gheisari et al., “OBPP: An Ontology-Based Framework for Privacy-Preserving In IOT-Based Smart City,” Future Generation Computer Systems, vol. 123, pp. 1-13, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[18] Sudip Maitra et al., “Proof-of-Authentication Consensus Algorithm: Blockchain-Based IOT Implementation,” IEEE 6th World Forum on Internet of Things (WF-IoT), New Orleans, LA, USA, pp. 1-2, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[19] Abidemi Emmanuel Adeniyi, Rasheed Gbenga Jimoh, and Joseph Awotunde, “A Review on Elliptic Curve Cryptography Algorithm for Internet of Things: Categorization, Application Areas, and Security,” Application Areas, and Security, pp. 1-41, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[20] Meilin Liu, Kirill Kultinov, and Chongjun Wang, “The Implementations and Applications of Elliptic Curve Cryptography,” Proceedings of 39th International Conference on Computers and Their Applications, vol. 98, pp. 89-102, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[21] Junjie Wang et al., “A Lightweight Combined Physical Layer Encryption and Authentication Scheme for Industrial Internet of Things,” IEEE Access, vol. 12, pp. 6961-6970, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[22] Souhir Gabsi et al., “Proposal of a Lightweight Differential Power Analysis Countermeasure Method on Elliptic Curves for Low-Cost Devices,” Multimedia Tools and Applications, vol. 83, no. 30, pp. 1-27, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[23] Sondes Baccouri et al., “Lightweight Authentication Scheme Based on Elliptic Curve El Gamal,” Journal of Information and Telecommunication, vol. 8, no. 2, pp. 231-261, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[24] Nagaratna P. Hegde, and P. Deepthi, “Elliptic Curve Cryptography Using Authenticated Encryption,” International Journal of Engineering Research and Applications, vol. 12, no. 4, pp. 35-40, 2022.
[Google Scholar] [Publisher Link]
[25] T.M. Okediran et al., “Securing The Perceptual Layer of the Internet of Things (IOT) Devices Using Elliptic Curve Cryptography,” Research Square, pp. 1-26, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[26] Shunfang Hu et al., “Provably Secure ECC-Based Anonymous Authentication and Key Agreement for IOT,” Applied Sciences, vol. 14, no. 8, pp. 1-17, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[27] Jalawi Sulaiman Alshudukhi, Zeyad Ghaleb Al-Mekhlafi, and Badiea Abdulkarem Mohammed, “A Lightweight Authentication with Privacy-Preserving Scheme for Vehicular Ad Hoc Networks Based on Elliptic Curve Cryptography,” IEEE Access, vol. 9, pp. 15633-15642, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[28] Badis Hammi et al., “A Lightweight ECC-Based Authentication Scheme for Internet of Things (IOT),” IEEE Systems Journal, vol. 14, no. 3, pp. 3440-3450, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[29] George Routis, Panagiotis Dagas, and Ioanna Roussaki, “Enhancing Privacy in the Internet of Vehicles via Hyperelliptic Curve Cryptography,” Electronics, vol. 13, no. 4, pp. 1-29, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[30] Vidyotma Thakur et al., “Cryptographically Secure Privacy-Preserving Authenticated Key Agreement Protocol for An Iot Network: A Step Towards Critical Infrastructure Protection,” Peer-To-Peer Networking and Applications, vol. 15, no. 1, pp. 206-220, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[31] Suman Majumder et al., “ECC-CoAP: Elliptic Curve Cryptography Based Constraint Application Protocol for Internet of Things,” Wireless Personal Communications, vol. 116, no. 3, pp. 1867-1896, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[32] Samiulla Itoo et al., “A Secure and Privacy-Preserving Lightweight Authentication and Key Exchange Algorithm for Smart Agriculture Monitoring System,” IEEE Access, vol. 11, pp. 56875-56890, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[33] Adel A. Ahmed et al., “A Provable Secure Cybersecurity Mechanism Based on The Combination of Lightweight Cryptography and Authentication for The Internet of Things,” Mathematics, vol. 11, no. 1, pp. 1-24, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[34] Bin Hu, Wen Tang, and Qi Xie, “A Two-Factor Security Authentication Scheme for Wireless Sensor Networks in IOT Environments,” Neurocomputing, vol. 500, pp. 741-749, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[35] Mohammed Shakir Oudah, and Abeer Tariq Maolood, “Lightweight Authentication Model for IOT Environments Based on Enhanced Elliptic Curve Digital Signature and Shamir Secret Share,” International Journal of Intelligent Engineering and Systems, vol. 5, no. 5, pp. 81-90, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[36] J. Nithisha, and P. Jesu Jayarin, “A Secured Storage and Communication System for the Cloud Using ECC, Polynomial Congruence and DSA,” Wireless Personal Communications, vol. 126, no. 2, pp. 949-974, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[37] Hakjun Lee et al., “Secure Three-Factor Anonymous User Authentication Scheme for the Cloud Computing Environment,” Wireless Communications and Mobile Computing, vol. 2021, no. 1, pp. 1-20, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[38] Amrani Ayoub, Rafalia Najat, and Abouchabaka Jaafar, “A Lightweight Secure CoAP for IOT-Cloud Paradigm Using Elliptic-Curve Cryptography,” Indonesian Journal of Electrical Engineering and Computer Science, vol. 20, no. 3, pp. 1460-1470, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[39] L. Ashok Kumar et al., “Hybrid Visual and Optimal Elliptic Curve Cryptography for Medical Image Security in IOT,” ECTI Transactions on Computer and Information Technology, vol. 16, no. 3, pp. 324-337, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[40] J. Vimal Rosy, and S. Britto Ramesh Kumar, “Optimized Encryption-Based Elliptical Curve Diffiehellman Approach for Secure Heart Disease Prediction,” International Journal of Advanced Technology and Engineering Exploration, vol. 8, no. 83, pp. 1367-1382, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[41] A. Arkan Saffer, Soran A. Pasha, and Ammar M. Aliakbar, “Lightweight Cryptography Method in the Internet of Things Using Elliptic Curve and Crow Search Algorithm,” Science Journal of University of Zakho, vol. 11, no. 3, pp. 323-332, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[42] G. Dhamodharan, S. Thaddues, and T. Manivannan, “A New Secure Mapping Scheme on Elliptic Curve Cryptography for Internet of Things,” International Virtual Conference on Machine Learning Applications in Applied Sciences and Mathematics, Chennai, India, vol. 2802, no. 1, pp. 1-8, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[43] Amrita et al., “Lightweight Cryptography for Internet of Things: A Review,” EAI Endorsed Transactions on Internet of Things, vol. 10, pp. 1-9, 2024.
[CrossRef] [Publisher Link]
[44] Yashar Salami, Vahid Khajevand, and Esmaeil Zeinali, “Cryptographic Algorithms: A Review of the Literature, Weaknesses and Open Challenges,” Journal of Computer & Robotics, vol. 16, no. 2, pp. 63-115, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[45] Balasubramanian Prabhu Kavin, and Sannasi Ganapathy, “A New Digital Signature Algorithm for Ensuring the Data Integrity in Cloud Using Elliptic Curves,” The International Arab Journal of Information Technology, vol. 18, no. 2, pp. 180-190, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[46] Syed Sajid Ullah et al., “A Lightweight Identity-Based Signature Scheme for Mitigation of Content Poisoning Attack in Named Data Networking with Internet of Things,” IEEE Access, vol. 8, pp. 98910-98928, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[47] Ikram Ali, Tandoh Lawrence, and Fagen Li, “An Efficient Identity-Based Signature Scheme without Bilinear Pairing for Vehicle-To-Vehicle Communication in VANETs,” Journal of Systems Architecture, vol. 103, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[48] Farid Lalem et al., “A Novel Digital Signature Scheme for Advanced Asymmetric Encryption Techniques,” Applied Sciences, vol. 13, no. 8, pp. 1-15, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[49] P. Pranav Teja et al., “Secure Cloud Communication-A Comparative Study of Cryptographic Protocols,” International Journal of Modern Developments in Engineering and Science, vol. 2, no. 9, pp. 14-19, 2023.
[Publisher Link]
[50] Vishal et al., “Comparative Analysis of Cryptographic Algorithms in Computer Network,” Proceedings of the KILBY 100 7th International Conference on Computing Sciences, pp. 1-6, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[51] Saurabh Singh et al., “Advanced Lightweight Encryption Algorithms for Iot Devices: Survey, Challenges and Solutions,” Journal of Ambient Intelligence and Humanized Computing, vol. 15, no. 2, pp. 1625-1642, 2024.
[CrossRef] [Google Scholar] [Publisher Link]