Proceedings of International Conference on Applied Innovation in IT
2025/08/29, Volume 13, Issue 4, pp.33-39
Hybrid Lightweight Encryption Algorithms for Internet of Things (IoT)
Rusul H. Altaie, Rihab Habeeb Sahib, Aseel Hamoud Hamza and Ghadeer Abbas Hussein Abstract: IoT security has become increasingly critical in this situation, along with the widespread usage. Therefore, a method must be created to protect these devices and data in buildings and institutions from hackers. In this article, we mentioned hybrid algorithms to solve this problem. To guarantee that the data it transmits and receives is secure and unaltered in any manner, Arduino and Raspberry Pi, as IoT hardware platforms, also need security advancements. For embedded systems like Arduino with limited memory and processing capacity, employing a standard block cipher to secure transmission is computationally expensive. This paper offers a safety system to protect IoT devices in a set of rooms inside a building and enterprises. This study offers a safe approach to protect the hardware equipment from intruders and accidents in buildings. In this article, a various group of sensors are associated with Arduino to collect data. PRESENT and SPECK algorithms are the basic encryption algorithms used for encrypting data collected by sensors in several rooms within the building. In this study, PRESENT and SPECK are used in the Interleaved method and a smaller number of rounds. The data of encrypted data is again encoded in Raspberry Pi by the SPECK algorithm in a nested manner and then encrypted by PRESENT and sent to the computer through Message Queuing Telemetry Transport protocol to distribute data, and then sent to the cloud to increase security.
Keywords: Present Encryption (PRES.), Internet of Things (IoTs), Sensor Devices, Arduino UNO, Security Mechanism.
DOI: 10.25673/121718
Download: PDF
References:
- L. P. Rondon, L. Babun, A. Aris, K. Akkaya, and A. S. Uluagac, "Survey on enterprise Internet-of-Things systems (E-IoT): A security perspective," Ad Hoc Netw., vol. 12, pp. 102-111, 2022.
- P. S. Velmurugan, S. Sridhar, and E. Gotham, "An advanced and effective encryption methodology used for modern IoT security," Mater. Today: Proc., vol. 81, pp. 389-394, 2023.
- I. Lee, "Internet of Things (IoT) cybersecurity: literature review and IoT cyber risk management," Future Internet, vol. 12, no. 9, p. 157, 2020, doi: 10.3390/fi12090157.
- L. Tawalbeh, F. Muheidat, M. Tawalbeh, and M. Quwaider, "IoT privacy and security: challenges and solutions," Appl. Sci., vol. 10, no. 12, p. 4102, 2020, doi: 10.3390/app10124102.
- S. B. Sadkhan and Z. Salam, "Security and privacy in Internet of Things—status, challenges," in Proc. 4th Int. Iraqi Conf. Eng. Technol. Appl. (IICETA), 2021, doi: 10.1109/IICETA51758.2021.9717785.
- A. N. Lone, S. Mustajab, and M. Alam, "A comprehensive study on cybersecurity challenges and opportunities in the IoT world," Secur. Privacy, vol. 6, no. 6, 2023.
- S. Sadek and A. Rowayda, "Hybrid energy aware clustered protocol for IoT heterogeneous network," Future Comput. Informatics J., vol. 3, no. 2, pp. 166-177, 2018.
- R. H. Altaie and H. K. Hoomod, "Artificial intelligent management for Internet of Things: a review," in Proc. 4th Int. Conf. Current Res. Eng. Sci. Appl. (ICCRESA), pp. 179-184, 2022, doi: 10.1109/ICCRESA.2022.00035.
- M. Sruthi and R. Rajasekaran, "Hybrid lightweight signcryption scheme for IoT," Open Comput. Sci., vol. 11, no. 1, pp. 391-398, 2021.
- H. K. Hoomod and H. Haider, "Hybrid SPECK encryption algorithm for Internet of Things (IoT)," in Lecture Notes on Data Engineering and Communications Technologies, pp. 317-326, 2024, doi: 10.1007/978-3-031-59711-4_27.
- A. Heidari and M. A. J. Jamali, "Internet of Things intrusion detection systems: a comprehensive review and future directions," Cluster Comput., vol. 26, no. 6, pp. 3753-3780, 2023.
- I. Kuzminykh, M. Yevdokymenko, and V. Y. Sokolov, "Encryption algorithms in IoT: security vs lifetime," Soc. Sci. Res. Netw., pp. 1-21, 2023.
- M. Rana, Q. Mamun, and R. Islam, "Lightweight cryptography in IoT networks: a survey," Future Gener. Comput. Syst., vol. 129, pp. 77-89, 2022.
- A. Abdullah and A. Shapina, "IoT security: data encryption for Arduino-based IoT devices," J. Positive Sch. Psychol., vol. 6, no. 3, pp. 8508-8516, 2022.
- M. El-Hajj, H. Mousawi, and A. Fadlallah, "Analysis of lightweight cryptographic algorithms on IoT hardware platform," Future Internet, vol. 15, no. 2, 2023.
- R. H. Altaie and H. K. Hoomod, "An intrusion detection system using a hybrid lightweight deep learning algorithm," Eng., Technol. Appl. Sci. Res., vol. 14, no. 5, pp. 16740-16743, 2024.
- H. I. Mhaibes, M. H. Abood, and A. K. Farhan, "Simple lightweight cryptographic algorithm to secure embedded IoT devices," Int. J. Interact. Mobile Technol., vol. 16, no. 20, 2022.
- S. Singh, P. Sharma, S. Y. Moon, and J. H. Park, "Advanced lightweight encryption algorithms for IoT devices: survey, challenges and solutions," J. Ambient Intell. Humaniz. Comput., pp. 1-18, 2024.
|

HOME

- Conference
- Journal
- Paper Submission to Journal
- Paper Submission to Conference
- For Authors
- For Reviewers
- Important Dates
- Conference Committee
- Editorial Board
- Reviewers
- Last Proceedings

PROCEEDINGS
-
Volume 13, Issue 4 (ICAIIT 2025)
-
Volume 13, Issue 3 (ICAIIT 2025)
-
Volume 13, Issue 2 (ICAIIT 2025)
-
Volume 13, Issue 1 (ICAIIT 2025)
-
Volume 12, Issue 2 (ICAIIT 2024)
-
Volume 12, Issue 1 (ICAIIT 2024)
-
Volume 11, Issue 2 (ICAIIT 2023)
-
Volume 11, Issue 1 (ICAIIT 2023)
-
Volume 10, Issue 1 (ICAIIT 2022)
-
Volume 9, Issue 1 (ICAIIT 2021)
-
Volume 8, Issue 1 (ICAIIT 2020)
-
Volume 7, Issue 1 (ICAIIT 2019)
-
Volume 7, Issue 2 (ICAIIT 2019)
-
Volume 6, Issue 1 (ICAIIT 2018)
-
Volume 5, Issue 1 (ICAIIT 2017)
-
Volume 4, Issue 1 (ICAIIT 2016)
-
Volume 3, Issue 1 (ICAIIT 2015)
-
Volume 2, Issue 1 (ICAIIT 2014)
-
Volume 1, Issue 1 (ICAIIT 2013)

PAST CONFERENCES
ICAIIT 2025
-
Photos
-
Reports
ICAIIT 2024
-
Photos
-
Reports
ICAIIT 2023
-
Photos
-
Reports
ICAIIT 2021
-
Photos
-
Reports
ICAIIT 2020
-
Photos
-
Reports
ICAIIT 2019
-
Photos
-
Reports
ICAIIT 2018
-
Photos
-
Reports
ETHICS IN PUBLICATIONS
ACCOMODATION
CONTACT US
|
|