The proliferation of IoT-enabled devices has revolutionized various sectors by enabling real-time data collection, analysis, and automation. However, this interconnectivity raises significant security concerns, especially regarding data transmission. This study aims to develop and evaluate cryptographic algorithms tailored for secure data transmission in IoT networks to address these concerns. IoT networks face unique security challenges due to their limited computational resources and diverse communication protocols. Existing cryptographic algorithms are often too resource-intensive for IoT devices, leading to vulnerabilities. The lack of customized cryptographic solutions, integration of trustworthy communication standards, and lightweight encryption techniques tailored for IoT networks exacerbates these issues. The study will identify key security challenges and requirements for data transmission in IoT networks through comprehensive literature reviews and empirical analysis. Novel cryptographic algorithms will be developed, focusing on lightweight and resource-efficient techniques. These algorithms will be evaluated using simulated IoT environments to assess their performance and effectiveness in real-world scenarios. Key management and distribution mechanisms will be explored, and secure firmware update protocols will be implemented to ensure end-to-end security. The research is expected to yield several significant contributions: the development of lightweight cryptographic algorithms optimized for IoT devices, enhanced security protocols for data integrity and authenticity, and scalable key management solutions. The study will also provide practical guidelines for integrating these cryptographic solutions into IoT networks, ensuring robust protection against various cyber threats. Ultimately, the findings will contribute to a more secure and trustworthy IoT ecosystem, promoting wider adoption and enhancing user confidence in IoT technologies.
Alshaikhli, M., Elfouly, T., Elharrouss, O., Mohamed, A., & Ottakath, N. (2021). Evolution of Internet of Things from blockchain to IOTA: A survey. IEEE access, 10, 844-866.
Anand, P., Singh, Y., Selwal, A., Alazab, M., Tanwar, S., & Kumar, N. (2020). IoT vulnerability assessment for sustainable computing: threats, current solutions, and open challenges. IEEE access, 8, 168825-168853.
Bowlin, E., Khan, M. S., Bajracharya, B., Appasani, B., & Bizon, N. (2023). Challenges and Solutions for Vehicular Ad-Hoc Networks Based on Lightweight Blockchains. Vehicles, 5(3), 994-1012.
Bravo-Arrabal, J., Fernandez-Lozano, J., Serón, J., Gomez-Ruiz, J. A., & García-Cerezo, A. (2021). Development and implementation of a hybrid wireless sensor network of low power and long range for urban environments. Sensors, 21(2), 567.
Busenbark, J. R., Yoon, H., Gamache, D. L., & Withers, M. C. (2022). Omitted variable bias: Examining management research with the impact threshold of a confounding variable (ITCV). Journal of Management, 48(1), 17-48.
Ezzat, S. K., Saleh, Y. N., & Abdel-Hamid, A. A. (2022). Blockchain oracles: State-of-the-art and research directions. IEEE Access, 10, 67551-67572.
Feng, X., Zhu, X., Han, Q.-L., Zhou, W., Wen, S., & Xiang, Y. (2022). Detecting vulnerability on IoT device firmware: A survey. IEEE/CAA Journal of Automatica Sinica, 10(1), 25-41.
Garagad, V. G., Iyer, N. C., & Wali, H. G. (2020). Data integrity: a security threat for internet of things and cyber-physical systems. 2020 International Conference on Computational Performance Evaluation (ComPE),
Garrido, G. M., Sedlmeir, J., Uluda?, Ö., Alaoui, I. S., Luckow, A., & Matthes, F. (2022). Revealing the landscape of privacy-enhancing technologies in the context of data markets for the IoT: A systematic literature review. Journal of Network and Computer Applications, 207, 103465.
Gupta, A., Yadav, S., & Kumar, A. (2023). Social and psychological Security of Employee in Association of Internet of things (IoT) and its Privacy and Security Challenges. Journal for ReAttach Therapy and Developmental Diversities, 6(2s), 145-149.
HaddadPajouh, H., Dehghantanha, A., Parizi, R. M., Aledhari, M., & Karimipour, H. (2021). A survey on internet of things security: Requirements, challenges, and solutions. Internet of Things, 14, 100129.
James, E., & Rabbi, F. (2023). Fortifying the IoT Landscape: Strategies to Counter Security Risks in Connected Systems. Tensorgate Journal of Sustainable Technology and Infrastructure for Developing Countries, 6(1), 32-46.
Kaaniche, N., Laurent, M., & Belguith, S. (2020). Privacy enhancing technologies for solving the privacy-personalization paradox: Taxonomy and survey. Journal of Network and Computer Applications, 171, 102807.
Knapp, E. D. (2024). Industrial Network Security: Securing critical infrastructure networks for smart grid, SCADA, and other Industrial Control Systems. Elsevier.
Mahalingam, H., Velupillai Meikandan, P., Thenmozhi, K., Moria, K. M., Lakshmi, C., Chidambaram, N., & Amirtharajan, R. (2023). Neural Attractor-Based Adaptive Key Generator with DNA-Coded Security and Privacy Framework for Multimedia Data in Cloud Environments. Mathematics, 11(8), 1769.
Malhotra, P., Singh, Y., Anand, P., Bangotra, D. K., Singh, P. K., & Hong, W.-C. (2021). Internet of things: Evolution, concerns and security challenges. Sensors, 21(5), 1809.
Mao, W., Zhao, Z., Chang, Z., Min, G., & Gao, W. (2021). Energy-efficient industrial internet of things: Overview and open issues. IEEE Transactions on Industrial Informatics, 17(11), 7225-7237.
Mishra, N., & Pandya, S. (2021). Internet of things applications, security challenges, attacks, intrusion detection, and future visions: A systematic review. IEEE Access, 9, 59353-59377.
Muñoz, A., & Fernandez, E. B. (2020). TPM, a pattern for an architecture for trusted computing. Proceedings of the European Conference on Pattern Languages of Programs 2020,
Mutlu, O., Ghose, S., Gómez-Luna, J., & Ausavarungnirun, R. (2022). A modern primer on processing in memory. In Emerging Computing: From Devices to Systems: Looking Beyond Moore and Von Neumann (pp. 171-243). Springer.
Permana, I. S., Hidayat, T., & Mahardiko, R. (2021). Raw Data Security By Using Elgamal And Sha 256 Public Key Algorithm. Teknokom, 4(1), 1-6.
Samaila, M. G., Sequeiros, J. B., Simoes, T., Freire, M. M., & Inacio, P. R. (2020). IoT-HarPSecA: a framework and roadmap for secure design and development of devices and applications in the IoT space. IEEE Access, 8, 16462-16494.
Saqib, M., & Moon, A. H. (2022). A systematic security assessment and review of Internet of things in the context of authentication. Computers & Security, 103053.
Sarker, I. H., Khan, A. I., Abushark, Y. B., & Alsolami, F. (2023). Internet of things (iot) security intelligence: a comprehensive overview, machine learning solutions and research directions. Mobile Networks and Applications, 28(1), 296-312.
Sen, E. R. K., & Dash, E. A. (2023). Unveiling the Shadows: Exploring the Security Challenges of the Internet of Things (IoT).
Sharma, A., Pilli, E. S., Mazumdar, A. P., & Gera, P. (2020). Towards trustworthy Internet of Things: A survey on Trust Management applications and schemes. Computer Communications, 160, 475-493.
Sicari, S., Rizzardi, A., & Coen-Porisini, A. (2020). 5G In the internet of things era: An overview on security and privacy challenges. Computer Networks, 179, 107345.
Trivedi, S., & Patel, N. (2021). Virtual employee monitoring: A review on tools, opportunities, challenges, and decision factors. Empirical Quests for Management Essences, 1(1), 86-99.
Wenjie, Z., & Ariffin, S. A. Bin. (2024). Design and Evaluation of Cryptographic Algorithms for Secure Data Transmission in Iot Networks. International Journal of Academic Research in Business and Social Sciences, 14(10), 1473–1484.
Copyright: © 2024 The Author(s)
Published by Knowledge Words Publications (www.kwpublications.com)
This article is published under the Creative Commons Attribution (CC BY 4.0) license. Anyone may reproduce, distribute, translate and create derivative works of this article (for both commercial and non-commercial purposes), subject to full attribution to the original publication and authors. The full terms of this license may be seen at: http://creativecommons.org/licences/by/4.0/legalcode