Indian Journal of Engineering

  • Home

Volume 22, Issue 58, July - December, 2025

Enhance the Internet of Things Light Weight Communication System Protocol Authentication

Sriram S1, Sridhar S2, Usha S3, Peddinti Neeraja4, Sasikala R5, Priya RL6

1Department of ECE, Amrita Vishwa Vidyapeetham, Chennai, India 2Associate Professor, Dept. of EEE, Ramaiah Institute of Technology, Bangalore, India
3Assistant Professor, SriSaiRam Institute of Management Studies, SriSairam Engineering college, Chennai, India
4Assistant professor, Department of Computer Applications, School of computing, Mohan Babuuniversity, Tirupati, India
5Professor & HoD, Department of MBA, Prathyusha Engineering College, Poonamallee -Tiruvallur High Road, Aranvoyal kuppam, Thiruvallur, Chennai, India
6Assistant professor, Department of Computer Engineering, Vivekanand Education Society’s Institute of Technology, Chembur, Mumbai, India

ABSTRACT

Currently, Internet of Things (IoT) technology based on smart homes has been created and used extensively. Applications include remote or automated control of electrical appliances and electronics, where users can utilize smart devices to transmit commands to an IoT device or device gateway. Security and authentication procedures for Internet of Things devices have been the subject of innumerable research papers in recent years. The power limitations of IoT devices are still not taken into account, though. A security and authentication system that uses fewer hash functions and encryption techniques is presented in their study. The result is that it uses less power when communicating and so conforms with IoT and mobile device power limitations. The secure and compact communication protocol for the Internet of Things is still challenging to guarantee secure connections for Internet of Things (IoT) technologies. Deploying communication strategies based on asymmetric cryptographic systems might be challenging in IoT environments because of the strict resource restrictions of computing, memory, and communication. Using symmetric encryption techniques based on pre-shared keys is an alternative. The lightweight key synchronization update mechanism that is presented in the paper serves as a foundation for our suggested lightweight secure communication protocol. Analysis of the protocol's Security demonstrates that it is resilient to common attacks like replay and man-in-themiddle attacks. For formal verification, we next employ a commonly used Security protocol verification tool. Furthermore, consider the lightweight key synchronization update algorithm's computational efficiency and unpredictability and show that it performs better than alternative systems. To prove usefulness, they additionally consider the protocol's performance in terms of communication and computation expenses.

Keywords: Application, Communication, Security, IoT, Wireless, Privacy

Indian Journal of Engineering, 2025, 22(58), e11ije1700
PDF
DOI: https://doi.org/10.54905/disssi.v22i58.e11ije1700

Published: 03 August 2025

Creative Commons License

© The Author(s) 2025. Open Access. This article is licensed under a Creative Commons Attribution License 4.0 (CC BY 4.0).