Innovative resource-saving security strategies for IoT devices
Main Article Content
Abstract
The astounding trend of increasing the number of connected IoT devices reflects the growing importance of this technology in industry, healthcare, the domestic sphere, and other sectors. However, with the expansion of IoT capabilities, the number of challenges also rises, particularly regarding the security of these devices, many of which are characterised by limited resources such as memory, power consumption, computational power, and network bandwidth. This article examines the key challenges associated with ensuring the security of IoT devices and proposes potential solutions and optimisation strategies that consider these limitations. The primary focus is developing and analysing lightweight cryptographic algorithms capable of providing robust data protection with minimal resource usage. The article also discusses efficient energy management strategies and optimising memory usage in IoT devices. Emphasis is placed on developing adaptive security mechanisms that can effectively respond to dynamic operational conditions and resource constraints. It is noted that further research and development should focus on creating integrated solutions that combine hardware, software, and managerial aspects to optimise the overall efficiency and security of IoT systems.
Downloads
Article Details

This work is licensed under a Creative Commons Attribution 4.0 International License.
How to Cite
Accepted 2024-11-28
Published 2025-05-21
References
Aboelmaged, M., Shisha, A. and Ghany, M.A.A.E., 2021. High-Performance Data Compression-Based Design for Dynamic IoT Security Systems. Electronics, 10(16), p.1989. Available from: https://doi.org/10.3390/electronics10161989. DOI: https://doi.org/10.3390/electronics10161989
Afzal, B., Umair, M., Shah, G.A. and Ahmed, E., 2019. Enabling IoT platforms for social IoT applications: Vision, feature mapping, and challenges. Future Generation Computer Systems, 92, pp.718–731. Available from: https://doi.org/10.1016/j.future.2017.12.002. DOI: https://doi.org/10.1016/j.future.2017.12.002
Ahmed, S.F., Islam, M.R., Nath, T.D., Ferdosi, B.J. and Hasan, A.S.M.T., 2019. GTBSA: A Generalized Lightweight Security Algorithm for IoT. 2019 4th International Conference on Electrical Information and Communication Technology, EICT 2019. Institute of Electrical and Electronics Engineers Inc. Available from: https://doi.org/10.1109/EICT48899.2019.9068848. DOI: https://doi.org/10.1109/EICT48899.2019.9068848
Al-Sharekh, S.I. and Al-Shqeerat, K.H., 2019. Security Challenges and Limitations in IoT Environments. IJCSNS International Journal of Computer Science and Network Security, 19, pp.193–199. Available from: http://paper.ijcsns.org/07_book/201902/20190224.pdf.
Ammar, M., Russello, G. and Crispo, B., 2018. Internet of Things: A survey on the security of IoT frameworks. Journal of Information Security and Applications, 38, pp.8–27. Available from: https://doi.org/10.1016/j.jisa.2017.11.002. DOI: https://doi.org/10.1016/j.jisa.2017.11.002
Balyk, N., Leshchuk, S. and Yatsenyak, D., 2023. Design and implementation of an IoT-based educational model for smart homes: a STEM approach. Journal of Edge Computing, 2, pp.148–162. Available from: https://doi.org/10.55056/jec.632. DOI: https://doi.org/10.55056/jec.632
Bokhari, A.H., Inoue, Y., Kato, S., Yoshioka, K. and Matsumoto, T., 2021. Empirical Analysis of Security and Power-Saving Features of Port Knocking Technique Applied to an IoT Device. Journal of Information Processing, 29, pp.572–580. Available from: https://doi.org/10.2197/ipsjjip.29.572. DOI: https://doi.org/10.2197/ipsjjip.29.572
Chanal, P.M. and Kakkasageri, M.S., 2020. Security and Privacy in IoT: A Survey. Wireless Personal Communications, 115, pp.1667–1693. Available from: https://doi.org/10.1007/s11277-020-07649-9. DOI: https://doi.org/10.1007/s11277-020-07649-9
Chifor, B.C., Bica, I., Patriciu, V.V. and Pop, F., 2018. A security authorization scheme for smart home internet of things devices. Future Generation Computer Systems, 86, pp.740–749. Available from: https://doi.org/10.1016/j.future.2017.05.048. DOI: https://doi.org/10.1016/j.future.2017.05.048
Davis, B.D., Mason, J.C. and Anwar, M., 2020. Vulnerability Studies and Security Postures of IoT Devices: A Smart Home Case Study. IEEE Internet of Things Journal, 7, pp.10102–10110. Available from: https://doi.org/10.1109/JIOT.2020.2983983. DOI: https://doi.org/10.1109/JIOT.2020.2983983
Deep, S., Zheng, X., Jolfaei, A., Yu, D., Ostovari, P. and Bashir, A.K., 2022. A survey of security and privacy issues in the Internet of Things from the layered context. Transactions on Emerging Telecommunications Technologies, 33, p.e3935. Available from: https://doi.org/10.1002/ett.3935. DOI: https://doi.org/10.1002/ett.3935
Didi, Z. and El Azami, I., 2022. IoT, Comparative Study Between the Use of Arduino Uno, Esp32, and Raspberry Pi in Greenhouses. Digital Technologies and Applications, ICDTA 2022. Springer International Publishing, Lecture Notes in Networks and Systems, vol. 455, pp.718–726. Available from: https://doi.org/10.1007/978-3-031-02447-4_74. DOI: https://doi.org/10.1007/978-3-031-02447-4_74
Ghazi Sami, T.M., Zeebaree, S.R.M. and Ahmed, S.H., 2024. Designing a New Hashing Algorithm for Enhancing IoT Devices Security and Energy Management. International Journal of Intelligent Systems and Applications in Engineering, 12(4s), pp.202–215. Available from: https://ijisae.org/index.php/IJISAE/article/view/3783.
Gupta, P. and Chhabra, J., 2016. IoT based Smart Home design using power and security management. In: B. Kumar, P.K. Kapur, J.S. Jassi and G. Singh, eds. 2016 1st International Conference on Innovation and Challenges in Cyber Security, ICICCS 2016. Institute of Electrical and Electronics Engineers Inc., pp.6–10. Available from: https://doi.org/10.1109/ICICCS.2016.7542317. DOI: https://doi.org/10.1109/ICICCS.2016.7542317
Jabraeil Jamali, M.A., Bahrami, B., Heidari, A., Allahverdizadeh, P. and Norouzi, F., 2020. IoT Architecture. Springer International Publishing, pp.9–31. Available from: https://doi.org/10.1007/978-3-030-18468-1_2. DOI: https://doi.org/10.1007/978-3-030-18468-1_2
Jain, A., Singh, T. and Sharma, S.K., 2021. Security as a solution: An intrusion detection system using a neural network for IoT enabled healthcare ecosystem. Interdisciplinary Journal of Information, Knowledge, and Management, 16, pp.331–369. Available from: https://doi.org/10.28945/4838. DOI: https://doi.org/10.28945/4838
Jiang, X., Lora, M. and Chattopadhyay, S., 2020. An experimental analysis of security vulnerabilities in industrial IoT devices. ACM Transactions on Internet Technology, 20, pp.1–24. Available from: https://doi.org/10.1145/3379542. DOI: https://doi.org/10.1145/3379542
Jony, A.I. and Arnob, A.K.B., 2024. A long short-term memory based approach for detecting cyber attacks in IoT using CIC-IoT2023 dataset. Journal of Edge Computing, 3(1), pp.28–42. Available from: https://doi.org/10.55056/jec.648. DOI: https://doi.org/10.55056/jec.648
Klochko, O.V., Fedorets, V.M., Mazur, M.V. and Liulko, Y.P., 2023. An IoT system based on open APIs and geolocation for human health data analysis. CTE Workshop Proceedings, 10, pp.399–413. Available from: https://doi.org/10.55056/cte.567. DOI: https://doi.org/10.55056/cte.567
Korenivska, O.L., Benedytskyi, V.B., Andreiev, O.V. and Medvediev, M.G., 2023. A system for monitoring the microclimate parameters of premises based on the Internet of Things and edge devices. Journal of edge computing, 2(2), pp.125–147. Available from: https://doi.org/10.55056/jec.614. DOI: https://doi.org/10.55056/jec.614
Lobanchykova, N.M., Pilkevych, I.A. and Korchenko, O., 2022. Analysis and protection of IoT systems: Edge computing and decentralized decision-making. Journal of Edge Computing, 1(1), pp.55–67. Available from: https://doi.org/10.55056/jec.573. DOI: https://doi.org/10.55056/jec.573
López Delgado, J.L. and López Ramos, J.A., 2024. A Comprehensive Survey on Generative AI Solutions in IoT Security. Electronics, 13(24), p.4965. Available from: https://doi.org/10.3390/electronics13244965. DOI: https://doi.org/10.3390/electronics13244965
Maitra, S. and Yelamarthi, K., 2019. Rapidly Deployable IoT Architecture with Data Security: Implementation and Experimental Evaluation. Sensors, 19, p.2484. Available from: https://doi.org/10.3390/s19112484. DOI: https://doi.org/10.3390/s19112484
Marton, A., 2023. State of IoT – Spring 2023, Report by IoT Analytics, Safepay Systems. Available from: https://iotac.eu/state-of-iot-spring-2023-by-iot-analytics/.
Marwedel, P., 2022. Embedded System Design: Embedded Systems Foundations of Cyber-Physical Systems, and the Internet of Things. 4th ed. Springer. Available from: https://doi.org/10.1007/978-3-030-60910-8. DOI: https://doi.org/10.1007/978-3-030-60910-8
Meneghello, F., Calore, M., Zucchetto, D., Polese, M. and Zanella, A., 2019. IoT: Internet of threats? A survey of practical security vulnerabilities in real IoT devices. IEEE Internet of Things Journal, 6, pp.8182–8201. Available from: https://doi.org/10.1109/JIOT.2019.2935189. DOI: https://doi.org/10.1109/JIOT.2019.2935189
Mohanty, S.N., Ramya, K.C., Rani, S.S., Gupta, D., Shankar, K., Lakshmanaprabu, S.K. and Khanna, A., 2020. An efficient Lightweight integrated Blockchain (ELIB) model for IoT security and privacy. Future Generation Computer Systems, 102, pp.1027–1037. Available from: https://doi.org/10.1016/j.future.2019.09.050. DOI: https://doi.org/10.1016/j.future.2019.09.050
Nikitchuk, T.M., Vakaliuk, T.A., Chernysh, O.A., Korenivska, O.L., Martseva, L.A. and Osadchyi, V.V., 2022. Non-contact photoplethysmographic sensors for monitoring students’ cardiovascular system functional state in an IoT system. Journal of Edge Computing, 1(1), pp.17–28. Available from: https://doi.org/10.55056/jec.570. DOI: https://doi.org/10.55056/jec.570
Rachit, Bhatt, S. and Ragiri, P.R., 2021. Security trends in Internet of Things: A survey. SN Applied Sciences, 3, p.121. Available from: https://doi.org/10.1007/s42452-021-04156-9. DOI: https://doi.org/10.1007/s42452-021-04156-9
Rajesh, S., Paul, V., Menon, V.G. and Khosravi, M.R., 2019. A Secure and Efficient Lightweight Symmetric Encryption Scheme for Transfer of Text Files between Embedded IoT Devices. Symmetry, 11, p.293. Available from: https://doi.org/10.3390/sym11020293. DOI: https://doi.org/10.3390/sym11020293
Rozlomii, I., Kosenyuk, H., Naumenko, S. and Mikhailovsky, P., 2023. Modeling a microcontroller-based sensor system in the game simulation “Smart-Home” using data encryption. Computer-Integrated technologies: education, science, production, 53, pp.292–299. Available from: https://doi.org/10.36910/6775-2524-0560-2023-53-43. DOI: https://doi.org/10.36910/6775-2524-0560-2023-53-43
Rozlomii, I., Symonyuk, V., Naumenko, S. and Mykhailovskyi, P., 2024. A security model of interconnected computing devices based on a lightweight encryption scheme for IoT. Computer-Integrated technologies: education, science, production, 55, pp.191–198. Available from: https://doi.org/10.36910/6775-2524-0560-2024-55-24. DOI: https://doi.org/10.36910/6775-2524-0560-2024-55-24
Rozlomii, I., Yarmilko, A. and Naumenko, S., 2024. Data security of IoT devices with limited resources: challenges and potential solutions. In: T.A. Vakaliuk and S.O. Semerikov, eds. Proceedings of the 4th Edge Computing Workshop (doors 2024), Zhytomyr, Ukraine, April 5, 2024. CEUR-WS.org, CEUR Workshop Proceedings, vol. 3666, pp.85–96. Available from: https://ceur-ws.org/Vol-3666/paper13.pdf.
Rozlomii, I., Yarmilko, A., Naumenko, S. and Mykhailovskyi, P., 2023. IoT Smart Implants: Information Security and the Implementation of Lightweight Cryptography. In: N. Shakhovska, M. Kovác, I. Izonin and S. Chrétien, eds. Proceedings of the 6th International Conference on Informatics & Data-Driven Medicine, Bratislava, Slovakia, November 17-19, 2023. CEUR-WS.org, CEUR Workshop Proceedings, vol. 3609, pp.145–156. Available from: https://ceur-ws.org/Vol-3609/paper12.pdf.
Rozlomii, I., Yarmilko, A., Naumenko, S. and Mykhailovskyi, P., 2024. Hardware encryptors and cryptographic libraries for optimizing security in IoT. In: A. Pakstas, Y.P. Kondratenko, V. Vychuzhanin, H. Yin and N. Rudnichenko, eds. Proceedings of the 12th International Conference Information Control Systems & Technologies (ICST 2024), Odesa, Ukraine, September 23-25, 2024. CEURWS.org, CEUR Workshop Proceedings, vol. 3790, pp.99–109. Available from: https://ceur-ws.org/Vol-3790/paper09.pdf.
Rozlomii, I.O., Simonyuk, V.P., Naumenko, S.V. and Mykhaylovskyi, P.V., 2024. Adaptive Cryptography for Energy-Efficient Security of IoT Devices. Issues in Modeling and Design Automation, 1(19), pp.77–83. Available from: https://pmap.donntu.edu.ua/sites/upload/articles/pmap_2024-no119end-78-84.pdf. DOI: https://doi.org/10.31474/2074-7888-2024-1-19-77-83
Shammar, E.A. and Zahary, A.T., 2020. The Internet of Things (IoT): a survey of techniques, operating systems, and trends. Library Hi Tech, 38, pp.5–66. Available from: https://doi.org/10.1108/LHT-12-2018-0200. DOI: https://doi.org/10.1108/LHT-12-2018-0200
Shapovalov, Y.B., Bilyk, Z.I., Usenko, S.A., Shapovalov, V.B., Postova, K.H., Zhadan, S.O. and Antonenko, P.D., 2023. Harnessing personal smart tools for enhanced STEM education: exploring IoT integration. Educational Technology Quarterly, 2023(2), pp.210–232. Available from: https://doi.org/10.55056/etq.604. DOI: https://doi.org/10.55056/etq.604
Shayer, K.S., Medul, M.H., Badoruzzaman, M., Islam Shuvo, J., Rabbu, M. and Mahmudul Haque, F.M., 2024. An Integrated Framework for Enhanced Learning Environments: IoT-Driven Smart Classrooms with Multi-Layered Security Protocols and Adaptive Infrastructure. 2024 International Conference on Advances in Computing, Communication, Electrical, and Smart Systems: Innovation for Sustainability, iCACCESS 2024. Institute of Electrical and Electronics Engineers Inc. Available from: https://doi.org/10.1109/iCACCESS61735.2024.10499605. DOI: https://doi.org/10.1109/iCACCESS61735.2024.10499605
Shen, S., Zhang, K., Zhou, Y. and Ci, S., 2020. Security in edge-assisted Internet of Things: challenges and solutions. Science China Information Sciences, 63, p.220302. Available from: https://doi.org/10.1007/s11432-019-2906-y. DOI: https://doi.org/10.1007/s11432-019-2906-y
Sinha, S., 2024. State of IoT 2024: Number of connected IoT devices growing 13% to 18.8 billion globally. Available from: https://iot-analytics.com/number-connected-iot-devices/.
Sonoli, S. and Keerthi, C., 2023. IoT Based Lineman Security System Using Controlled Switchover With Transmission Line Fault Identification. IEEE 1st International Conference on Ambient Intelligence, Knowledge Informatics and Industrial Electronics, AIKIIE 2023. Institute of Electrical and Electronics Engineers Inc. Available from: https://doi.org/10.1109/AIKIIE60097.2023.10389864. DOI: https://doi.org/10.1109/AIKIIE60097.2023.10389864
Spina, M.G. and De Rango, F., 2023. Lightweight, Dynamic and Energy Efficient Security Mechanism for constrained IoT devices using CoAP. Proceedings - IEEE Consumer Communications and Networking Conference, CCNC. Institute of Electrical and Electronics Engineers Inc., vol. 2023-January, pp.1123–1128. Available from: https://doi.org/10.1109/CCNC51644.2023.10059854. DOI: https://doi.org/10.1109/CCNC51644.2023.10059854
Tiburski, R.T., Moratelli, C.R., Johann, S.F., Neves, M.V., Matos, E. de, Amaral, L.A. and Hessel, F., 2019. Lightweight Security Architecture Based on Embedded Virtualization and Trust Mechanisms for IoT Edge Devices. IEEE Communications Magazine, 57, pp.67–73. Available from: https://doi.org/10.1109/MCOM.2018.1701047. DOI: https://doi.org/10.1109/MCOM.2018.1701047
Yang, K., Blaauw, D. and Sylvester, D., 2017. Hardware Designs for Security in Ultra-Low-Power IoT Systems: An Overview and Survey. IEEE Micro, 37, pp.72–89. Available from: https://doi.org/10.1109/MM.2017.4241357. DOI: https://doi.org/10.1109/MM.2017.4241357
Yar, H., Imran, A.S., Khan, Z.A., Sajjad, M. and Kastrati, Z., 2021. Towards smart home automation using IoT-enabled edge-computing paradigm. Sensors, 21(14), p.4932. Available from: https://doi.org/10.3390/s21144932. DOI: https://doi.org/10.3390/s21144932
Yarmilko, A., Rozlomii, I. and Naumenko, S., 2024. Dependability of Embedded Systems in the Industrial Internet of Things: Information Security and Reliability of the Communication Cluster. International Scientific-Practical Conference “Information Technology for Education, Science and Technics”. Springer Nature Switzerland, Cham, pp.235–249. Available from: https://doi.org/10.1007/978-3-031-71804-5_16. DOI: https://doi.org/10.1007/978-3-031-71804-5_16
Yu, M., Zhuge, J., Cao, M., Shi, Z. and Jiang, L., 2020. A Survey of Security Vulnerability Analysis, Discovery, Detection, and Mitigation on IoT Devices. Future Internet, 12(27). Available from: https://doi.org/10.3390/fi12020027. DOI: https://doi.org/10.3390/fi12020027
Zhydka, O., Riabyi, M., Fesenko, A., Kydyralina, L. and Okhrimenko, T., 2024. Research on data transmission technologies and information security in IoT networks. In: P. Zhezhnych, O. Markovets, A. Petrushka and S. Gnatyuk, eds. Proceedings of the 3rd International Workshop on Social Communication and Information Activity in Digital Humanities (SCIA 2024), Lviv, Ukraine, October 31, 2024. CEUR-WS.org, CEUR Workshop Proceedings, vol. 3851. Available from: https://ceur-ws.org/Vol-3851/paper15.pdf.