IoT Edge Computing Security Framework Powered by LSA, MLKEM and GLSKM
IoT Edge Computing Security Framework Powered by LSA, MLKEM and GLSKM |
||
![]() |
![]() |
|
© 2025 by IJETT Journal | ||
Volume-73 Issue-3 |
||
Year of Publication : 2025 | ||
Author : A. Anandhavalli, A. Bhuvaneswari |
||
DOI : 10.14445/22315381/IJETT-V73I3P115 |
How to Cite?
A. Anandhavalli, A. Bhuvaneswari, "IoT Edge Computing Security Framework Powered by LSA, MLKEM and GLSKM," International Journal of Engineering Trends and Technology, vol. 73, no. 3, pp. 198-211, 2025. Crossref, https://doi.org/10.14445/22315381/IJETT-V73I3P115
Abstract
The Internet of Things (IoT) Edge computing represents a paradigm shift in data processing and analytics, where data processing occurs closer to the source of data generation rather than being transmitted to centralized cloud servers. This approach addresses several critical challenges in traditional IoT architectures, including latency, bandwidth consumption, security, and reliability. By leveraging edge devices-such as sensors, gateways, and local servers-IoT Edge enables real-time data analysis, rapid decision-making, and localized actions essential for applications requiring immediate responses. IoT Edge faces challenges such as the need for robust edge device management, scalability issues, and the requirement for sophisticated security measures to protect distributed data. A multi-security scheme-based framework titled “IoT Edge Computing Security Framework powered by LSA, MLKEM and GLSKM (IECSF)” is submitted here to address the current challenges in IoT wireless sensor network edge computing environments. Lightweight Security Algorithm, Masked Location-based Key Exchange Mechanism, and Game of Life-based Security Key Mechanism are the background works behind the IECSF method. The proposed IECSF method has three novel functional modules, namely Least Hop Cluster Manager, Intra Cluster Data Distributor, and Inter-Cluster Data Aggregator. Performance metrics such as Throughput, Latency, End-to-End Delay, Packet Delivery Rate, Security and Energy consumption of the proposed method are compared with the performance of the most recent existing works.
Keywords
Edge computing, Game-of-life based Security key exchange, Lightweight security, Masked location key, IoT, WSN.
References
[1] Marc Schmitt, “Securing the Digital World: Protecting Smart Infrastructures and Digital Industries with Artificial Intelligence (AI)-Enabled Malware and Intrusion Detection,” Journal of Industrial Information Integration, vol. 36, pp. 1-12, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[2] Ajibike Eunice Akin-Ponnle et al., “Home Chimney Pinwheels (HCP) as Steh and Remote Monitoring for Smart Building IoT and WSN Applications,” Sensors, vol. 23, no. 5, pp. 1-26, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[3] Divya Upadhyay et al., “A Linear Quadratic Regression-Based Synchronised Health Monitoring System (SHMS) for IoT Applications,” Electronics, vol. 12, no. 2, pp. 1-16, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[4] Kamalrulnizam Bin Abu Bakar et al., “A Review on the Immediate Advancement of the Internet of Things in Wireless Telecommunications,” IEEE Access, vol. 11, pp. 21020-21048, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[5] Jiu Li Chong et al., “Internet of Things (IoT)-Based Environmental Monitoring and Control System for Home-Based Mushroom Cultivation,” Biosensors, vol. 13, no. 1, pp. 1-24, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[6] Tayyaba Anees et al., “The Integration of WoT and Edge Computing: Issues and Challenges,” Sustainability, vol. 15, no. 7, pp. 1-27, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[7] Panagiotis Gkonis et al., “A Survey on IoT-Edge-Cloud Continuum Systems: Status, Challenges, Use Cases, and Open Issues,” Future Internet, vol. 15, no. 12, pp. 1-27, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[8] Arif Ullah, Saman Yasin, Tanweer Alam, “RETRACTED ARTICLE: Latency Aware Smart Health Care System Using Edge and Fog Computing,” Multimedia Tools and Applications, vol. 83, no. 11, pp. 34055-34081, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[9] Lukman Adewale Ajao, and Simon Tooswem Apeh, “Secure Edge Computing Vulnerabilities in Smart Cities Sustainability using Petri Net and Genetic Algorithm-Based Reinforcement Learning,” Intelligent Systems with Applications, vol. 18, pp. 1-21, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[10] Chintan Patel et al., “EBAKE-SE: A Novel ECC-Based Authenticated Key Exchange between Industrial IoT Devices using Secure Element,” Digital Communications and Networks, vol. 9, no. 2, pp. 358-366, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[11] Abdulrahman K. Alnaim, and Ahmed M. Alwakeel, “Machine-Learning-Based IoT-Edge Computing Healthcare Solutions,” Electronics, vol. 12, no. 4, pp. 1-16, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[12] Kim-Hung Le, Khanh-Hoi Le-Minh, and Huy-Tan Thai, “BrainyEdge: An AI-enabled Framework for IoT Edge Computing,” ICT Express, vol. 9, no. 2, pp. 211-221, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[13] Haowen Tan, “An efficient IoT Group Association and Data Sharing Mechanism in Edge Computing Paradigm,” Cyber Security and Applications, vol. 1, pp. 1-6, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[14] Shuai Yan et al., “Node Selection Algorithm for Federated Learning Based on Deep Reinforcement Learning for Edge Computing in IoT,” Electronics, vol. 12, no. 11, pp. 1-14, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[15] Zhihai Zhuo et al., “Research on Communication Stability of Inter-Cannonball Network Based on OPNET,” Applied Sciences, vol. 13, no. 7, pp. 1-16, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[16] Cppreference.com, 2019. [Online]. Available: https://en.cppreference.com/w/ [17] Darko Hercog et al., “Design and Implementation of ESP32-Based IoT Devices,” Sensors, vol. 23, no. 15, pp. 1-20, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[18] Nabil Litayem, and Ahmed Al-Sa’di, “Exploring the Programming Model, Security Vulnerabilities, and Usability of ESP8266 and ESP32 Platforms for IoT Development,” IEEE 3rd International Conference on Computer Systems, Qingdao, China, pp. 150-157, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[19] NodeMcu - An Open-Source Firmware Based on ESP8266 Wifi-Soc, Nodemcu.com, 2018. [Online]. Available: https://www.nodemcu.com/index_en.html
[20] Aikaterini I. Griva et al., “LoRa-Based IoT Network Assessment in Rural and Urban Scenarios,” Sensors, vol. 23, no. 3, pp. 1-24, 2023.
[CrossRef] [Google Scholar] [Publisher Link]