Currently, Internet of Things (IoT) technology based on smart homes has been
created and used extensively. Applications include remote or automated control
of electrical appliances and electronics, where users can utilize smart devices to
transmit commands to an IoT device or device gateway. Security and
authentication procedures for Internet of Things devices have been the subject of
innumerable research papers in recent years. The power limitations of IoT devices
are still not taken into account, though. A security and authentication system that
uses fewer hash functions and encryption techniques is presented in their study.
The result is that it uses less power when communicating and so conforms with
IoT and mobile device power limitations. The secure and compact communication
protocol for the Internet of Things is still challenging to guarantee secure
connections for Internet of Things (IoT) technologies. Deploying communication
strategies based on asymmetric cryptographic systems might be challenging in
IoT environments because of the strict resource restrictions of computing,
memory, and communication. Using symmetric encryption techniques based on
pre-shared keys is an alternative. The lightweight key synchronization update
mechanism that is presented in the paper serves as a foundation for our suggested
lightweight secure communication protocol. Analysis of the protocol's Security
demonstrates that it is resilient to common attacks like replay and man-in-themiddle
attacks. For formal verification, we next employ a commonly used
Security protocol verification tool. Furthermore, consider the lightweight key
synchronization update algorithm's computational efficiency and unpredictability
and show that it performs better than alternative systems. To prove usefulness,
they additionally consider the protocol's performance in terms of communication
and computation expenses.
Keywords: Application, Communication, Security, IoT, Wireless, Privacy