2024 International Conference on Advancement in Computation & Computer Technologies (InCACCT)
IOT CRYPTOGRAPHY: A SECURE COMMUNICATION FRAMEWORK FOR THE
INTERNET OF THINGS
Midhvana Rishi Vaibhav Dubey Mukesh Kumar Bhardwaj
Department of Computer Science Department of Computer Science Department of Computer Science
Engineering, Dronacharya Group of Engineering, Dronacharya Group of Engineering, Dronacharya Group of
Institutions Institutions Institutions
Greater Noida Gautam Budhh Nagar, Greater Noida Gautam Budhh Nagar, Greater Noida Gautam Budhh Nagar,
India India India
midhvana.16307@[Link].i dubeyvaibhav482@[Link] mukeshbhardwaj85@[Link]
nfo
Mahesh Kumar Singh
Department of Computer Science
Engineering, Dronacharya Group of
Institutions
Greater Noida Gautam Budhh Nagar,
2024 International Conference on Intelligent Systems for Cybersecurity (ISCS) | 979-8-3503-7523-7/24/$31.00 ©2024 IEEE | DOI: 10.1109/ISCS61804.2024.10581329
India
maheshkrsg@[Link]
Abstract— IoT is a lightning-fast technology that uses clever I. INTRODUCTION
objects or stuff that speak uncomplicatedly to the work of our Consistently, an outstanding development in the number of
daily lives. Smart homes, wearables, connected automobiles, associated gadgets is seen. These outcomes in the Internet of
vibrant urban communities; savvy retail, agribusiness, Things (IoT) another internet communication standard the
healthcare, and other areas are some of the most well-known customary IoT idea integrates shrewd articles with sensors and
applications of IoT. This document provides an overview of IoT Radio Recurrence Recognizable proof (RFID) labels [1], for
Crypto a safe platform Internet of Things communication. example, fridges, streetlamps, clothes washers, climate control
Typically, they have elements from Internet of Things (IoT), such systems, vehicles, and others. The IoT and shrewd contraptions are
as the device functionality they need, the requirement to restrict conveyed through state-of-the-art communication strategies
the amount of information sent, and the ability to connect to the including distributed computing, Wi-Fi, and WiMAX.
Internet. With real business relationships in mind, Innovative IoT is the incorporation of a wide scope of brilliant gadgets that
lightweight authentication setup and trust concepts are provided influence day-to-day exercises, for example, e-learning, well-
by IoT-Crypto. Include a secure communication protocol that being, and remote checking and observation. IoT likewise has a
only makes use of one DTLS connection that is encrypted. This huge impact in various regions, including mechanization and wise
article discusses and presents the unique components and modern creation, shrewd strategies, and savvy transportation [2].
nuanced execution details of IoT crypto in terms of essentially The government, businesses, and the public are key IoT
equivalent arrangements. Post-implementation testing and stakeholders. IoT now needs promotional policies to create new
analysis of the IoT encrypted network have proven its accuracy network models. 'Value Up' data and 'Cost Down' models are the
and safety. Additionally, a test network was conducted to goals of IoT.
determine if the BLE IPSP profile and coding standards are
suitable for IoT. Based on these results, the significance of future A. Communication Models in IoT
research was discussed. The IoT paradigm and communication The IoT communication methods are included in an
protocols are introduced at the outset of this work and then architectural paper that the Internet Architecture Board (IAB)
compare countermeasures for a few security vulnerabilities at produced [16]. The section below presents the main features of the
each tier of the IoT model to protect such a large and diverse communication models in depth.
company.
a. Device-to-Device Communications
This architecture fig-1 does not use an intermediary application
Keywords— Internet of Things, IoT Model, Communication
Technology, Security, Attacks server for communication between two or more smart devices;
instead, communication occurs directly between the devices.
XXX-X-XXXX-XXXX-X/XX/$XX.00 ©20XX IEEE
Authorized licensed use limited to: Somaiya University. Downloaded on April 04,2025 at [Link] UTC from IEEE Xplore. Restrictions apply.
Bluetooth, Z Wave, or Zigbee are the communication mediums discusses the IoT device restrictions, while the second one
used in this style of communication [3]. categorizes assaults. The third section provides insight into
authentication designs, and the fourth discusses the problems with
the security of different tiers. IoT applications provide a lot of
benefits to people. The prices are also quite high. Customers are
willing to spend a lot, yet security is lacking. IoT manufacturers
pay less attention to the security system that customers are given.
Figure 1: Model for Device-to-Device Communication Implementing hash and cryptographic methods at the physical
layer and network layer authentication mechanisms are two
b. Device-to-Cloud Communication examples of preventative measures [5]. Only authorized users are
By associating straightforwardly with the cloud, IoT smart allowed to complete the transaction, which may be secured by the
devices share information and direct traffic streams in this application layer using authentication, encryption, and integrity
communication worldview. Fig. 2 illustrates the thought hidden in verification.
the gadget-to-cloud communication approach.
III. PROPOSED METHODOLOGY
A. Basic Architecture of the Proposed Model
An example of an IoT system is IoT-Crypto. It has a variety of
uniquely designed features and systems. They are designed to
address many of the IoT network operational issues that have
already been identified (see fig. 4).
Figure 2: Model for Device-to-Cloud Communication
c. Model for Device to Gateway
The Gadget to-Application-Layer Entryway idea is another name
for the Gadget to-Passage idea. As per this idea, a nearby passage
serves as a go-between for smart devices and is pre-stacked with
the application software.
In this plan, the nearby passage gadget serves as a scaffold
between the smart gadget and cloud service by running application
software. Security and information/protocol translation are features
Figure 4: IoT Crypto-Network Architecture
offered by the nearby passage gadget. This idea is used in smart
homes, cities, and other applications. Figure 3 provides further IoT subnets conduct IoT tasks. IoT devices may execute
information on the gadget-to-entryway model. operations, gather data (typically sensor readings), and provide
alarms. Both final functions are similar. Data collection might be
synchronous, but alert generation is always asynchronous.
A gateway connects IoT devices in a subnet to cloud servers.
Network gates are vital [6]. They are communication proxies. This
position translates protocols and supports communication utilizing
different standards. Gateway devices handle most encryption and
cryptographic trust checks. It implies that IoT devices execute
business-critical functions and a minimum technological workload
Figure 3: Device-to-Gateway Model involving networks and crypto.
II. LITERATURE REVIEW The cloud layer manages the organization and collects, processes,
Numerous studies have been conducted to lessen the risks and stores information. It includes server applications. Outer users
associated with the capabilities of the Physical IoT [4]. There are and systems just see the cloud layer — The programming interface
four parts, according to the poll that was done. The first one and GUI offered by those apps.
Authorized licensed use limited to: Somaiya University. Downloaded on April 04,2025 at [Link] UTC from IEEE Xplore. Restrictions apply.
One business maintains the IoT-Crypto organization. It might work The C programming language was majorly used to develop IoT-
with network managers. IoT-Crypto lets such firms work together. Crypto. Many justifications have been made for this choice. One
They might share the organization [7]. Network layers might can make use of the C code to write and run or simply execute on
collaborate. Gateways might interface with business accomplice any hardware system being used comprising potent servers, limited
cloud servers and IoT devices. Cloud servers might share ARM and x86 devices, and microcontrollers [10]. The use of
information, sensor readings, and organization structure under language-specific libraries and maintaining portions of code
business agreements. Adjusting or dropping the Participation connected with cryptographic methods written in many
Scope is easy. All these systems are wholly dependent on programming languages would be a significant drawback. The
cryptographic identities and operations, or the cryptographic software's basis is the MBED TLS open-source C library as shown
association of business transactions. in figure-5. It is effectively kept up with and moved along. Its
IoT subnets conduct IoT tasks. IoT devices may execute absence of significant outer reliance is its key separating factor. If
operations, gather data (typically sensor readings), and provide they are not offered on a specific platform, supplanting them is
alarms. Both final functions are similar. Data collection might be possible and simple. Software fabricated using the MBED TLS
synchronous, but alert generation is always asynchronous. library will thus chip away at any platform, satisfying the
A gateway connects IoT devices in a subnet to cloud servers. presentation's standards.
Network gates are vital. They are communication proxies. This
position translates protocols and supports communication utilizing
different standards. Gateway devices handle most encryption and
cryptographic trust checks. It implies IoT devices execute
business-critical functions and a minimum volume of high-tech
network and cryptographic—workload.
The cloud layer manages the organization and collects, processes,
and stores information. It includes server applications. Outer users
and systems just see the cloud layer — The programming interface
and GUI offered by those apps.
B. Distinctive Security Features
The IoT-Crypto system uses security by design, unlike other IoT Figure 5: IoT-Crypto authentication using C structures.
systems [8]. It cannot be deployed without encryption and security The following are the steps for the declaration check:
since they are integrated into the network. Devices have distinct • Verification of the expiration date.
cryptographic identities. Identity design sets it apart. It has a • Validity verification of self-signatures.
framework for building trust relationships and an IoT-specific
• Looking for a trusted party's signature that was attached
cryptographic certificate. Contrary to similar options, to the certificate.
cryptographic identities are used for encryption, authentication,
and authorization. Many solely utilize identity for authentication B. IoT- Crypto Device Software
The IoT-Crypto network's devices' cryptographic identities are
Devices sit tight for door initialization messages after turning on.
based on bespoke cryptographic certificate formats. Certificate
This message includes passage ID and organization address [12].
design affects various network operations and device connectivity.
IoT gadgets might be associated with doors and arrange keys (see
An IoT-specific format gave tremendous flexibility to customize
Fig 6). After key exchange, the gadget enters occasion handling
and optimize network operations. IoT networks may employ
mode and handles synchronous (request/response) entryway sensor
popular formats like X.509. However, they are unsuitable.
understanding requests and instructions. Asynchronous
However, the IoT-Crypto certificate format borrowed from those
(spontaneous) signals from the IoT gadget to the door might
formats.
incorporate sensor understanding warnings. These two threads are
IV. IMPLEMENTATION DETAILS
running simultaneously. Gadget Software is composed using the
IoT-Crypto library [13].
A. Cryptographic Details and Certificate Format
Authorized licensed use limited to: Somaiya University. Downloaded on April 04,2025 at [Link] UTC from IEEE Xplore. Restrictions apply.
Figure 6: Operation of IoT device software in the IoT-Crypto system
C. IoT-Crypto Cloud Server Software Fig 8: Operation of IoT gateway software in the IoT-Crypto system
IoT devices reside across a network of IoT encryption cloud V. EXPERIMENTS AND TESTS
servers (see Fig. 7). A. Test Network Structure
In his program, he does two things. IoT encryption solutions were evaluated using simulated scenarios
• A regular business operation provides an HTTP programming from certified IoT organizations. One Raspberry Pi 4B device acts
interface and is responsible for recycling requests entered as an IoT input, two Jeer Pi 4B bias act as IoT devices, a Wi-Fi
from consumer and surface networks to enable interaction switch for internet spell, and an IoT encrypted cloud server acts as
accompanied by the IoT cryptographic organization. a virtual cloud machine function. Form a test network. Design
• Cryptographic applications verify certificates and signatures tested as needed.
while securely communicating with other devices in your The IoT network architecture described is the same as the test
organization. network [15]. It enables performance evaluations and testing of all
the IoT-Crypto solution's functionalities. The network may also be
changed, and other wireless communication protocols can be
tested.
B. Protocol Costs Associated with Cryptographic
Methods
IoT network security requires processing and transmission
overhead. First and foremost is a handshake for a secure
communication channel. 1639 bytes sent over the IoT encrypted
network. This amount is small given that X.509 certificates can
Figure 7: Structure of the IoT-crypto server software exceed 2000 bytes.
D. IoT-Crypto Gateway Software
The gateway is needed by the IoT-Crypto network. It supports
many IoT devices. Each gateway connects restricted IoT devices to
one cloud server. The gateway creates a network of IoT devices.
The IoT subnet supports many wireless and communication
technologies. The gateway must handle them and translate
protocols as required. IPv4 and IPv6 IPoT-Crypto network
gateways use Wireless-Fidelity, BLE, and Ethernet at the network Figure 9: Packet sizes for the IoT-Crypto transfer protocol.
access layer [14]. Wire shark observed device communication. Modified IoT-Crypto
software determined protocol message and data structure sizes
using several encoding techniques. Support for non-CBOR
encoding was added in Figure 9.
Running IoT-Crypto software with and without cryptographic
methods has no discernible impact on CPU or power usage [17]. C
profiler measurements were more accurate. Their results are shown
Authorized licensed use limited to: Somaiya University. Downloaded on April 04,2025 at [Link] UTC from IEEE Xplore. Restrictions apply.
in Figure 10. Peer certificate verification, they discovered,
accounted for 50% of computational overhead.
Figure 12: 6LowPAN BLE test network average connection
Figure 10: Types of IoT-crypto computation overhead performance observed with iperf3. Each arrangement included 50
measurements. Results were repeated. The graphic shows average.
C. Comparison of Encoding
Internet and Wi-Fi round-trip times are substantially less than the
CBOR encodes IoT-Crypto network data and device data. JSON-
measured ones. Results ranged widely. Figure 13 shows the
like binary format CBOR offers stricter type control than JSON.
average results from 200 configurations. The devices’ default
CoAP recommends CBOR encoding. HTTP utilizes JSON
configurations were tested. The default BLE connection interval is
encoding, while CoAP is lighter. IoT-Crypto communication
30–60 ms. Data packets are only sent during data transfer events at
protocol is not dependent on CoAP or HTTP [18]. Constrained
a defined interval. Measurements match connection settings.
systems selected CBOR encoding. It outperforms JSON along with
Connection intervals may delay one-to-one connections by 120 ms
raw binary format in this application (Figure 11).
and 180 ms for intermediate device connection. Results match the
comprehensive IPv6-based BLE connectivity investigation [20].
That research focused on Contiki OS protocol stack
implementation and did not account for device distance
discrepancies.
Figure 11: Sizes of the encoded IoT-Crypto data structures
D. Suitability of the Wireless Standards
Several wireless methods of communication are used in IoT
networks. This task did not involve any testing or comparisons.
IoT Encrypted Network Standard enables TCP/IP protocol stack
and IP packet transmission. Ethernet and Wi-Fi were used in the
Figure 13: Measured test network by the 6Ping utility low transmission
test network in Section 5.1. Both have undergone performance and
delays for PAN BLE. There were 200 measurements in each configuration.
feature testing and are well-known. The graph displays typical performance.
IPv6 is presently supported by a program called IoT-Crypto. In our
VI. CONCLUSIONS AND FUTURE WORK
test network, a Raspberry Pi acted as his IPv6 router and gateway
for his 6LowPAN BLE device [19]. The IoT encrypted network This post introduced IoT-Crypto, a purpose-erected IoT result that
worked well with this configuration. Further analysis was done on can be worn to make highly practical and assured IoT networks.
connection performance. In our tests, we recorded 239.2 kbps at IoT-Crypto was developed by considering key architectural
1m between devices (Figure 12). Throughput increases when elements, information flow, hardware limitations, security
throughput decreases due to interference, as opposed to proximity. requirements, and the details and hierarchy of IoT systems. The
BLE throughput is impacted by radio interference, transmission proposed treatment was developed from scratch. This approach
interval, and application layer protocol overhead. The findings of allowed for extensive optimizations and circumvented problems
the BLE performance evaluation fall within the predicted range. that can arise from using legacy Internet protocols that were not
designed for IoT applications. IoT Encryption uses a lightweight
Authorized licensed use limited to: Somaiya University. Downloaded on April 04,2025 at [Link] UTC from IEEE Xplore. Restrictions apply.
version of X.509 authorization and a proprietary application layer 9. Mohammed, Husamuddin & Qayyum, Mohammed.
(2017). Internet of Things :A Study on Security and
protocol instead of a generic Hypertext transfer protocol and
Privacy Threats. s10.1109/Anti-
Constrained Application Protocol. Additionally, it makes use of Cybercrime.2017.7905270.
10. Hassija, Vikas & Chamola, Vinay & Saxena, Vikas &
well-established also tested protocols like CBOR, a highly
Jain, Divyansh & Goyal, Pranav & Sikdar, Biplab.
effective standard for data serialization, and DTLS, the cornerstone (2019). A Survey on IoT Security: Application Areas,
Security Threats, and Solution Architectures. IEEE
of encryption and connection security. Encrypted trusted
Access. PP. 1-1. 10.1109/ACCESS.2019.2924045.
connections based on observable business interactions between 11. Ud Din, Ikram & Guizani, Mohsen & Kim, Byung-Seo
& Hassan, Suhaidi & Khan, Khurram. (2018). Trust
companies operating IoT networks are the most novel and exciting
Management Techniques for the Internet of Things: A
part of IoT encryption solutions. It has incredible furnishing Survey. IEEE Access. PP. 1-1.
10.1109/ACCESS.2018.2880838.
possibilities and versatility. This trust model is made possible by a
12. Abid, Muhammad Aneeq, Naokhaiz Afaqui, Muazzam
new authorization format that loosely replaces X.509 and A. Khan, Muhammad Waseem Akhtar, Asad Waqar
Malik, Arslan Munir, Jawad Ahmad, and Balawal
OpenPGP. His second great feature of IoT encryption is its close
Shabir. 2022. "Evolution towards Smart and Software-
relationship with automatic configuration tools and encryption. Defined Internet of Things" AI 3, no. 1: 100-123.
[Link]
Many parts of the network make direct use of encryption, such as
13. G. Kumar, Pragya, L. P. Verma, S. S. Rawat and M. K.
identifying and removing devices and determining network Singh, "An Experimental Study of Concurrent Multipath
topology. The focus of IoT encryption is mainly to provide Transmission Protocol in Lossy and Asymmetric Network
Environment," 2023 International Conference on
[Link] was erected on cryptographic technology well than Sustainable Emerging Innovations in Engineering and
trying to secure communication channels. Technology (ICSEIET), Ghaziabad, India, 2023, pp. 745-
750, doi: 10.1109/ICSEIET58677.2023.10303388
REFERENCES
14. Resul Das, Muhammad Muhammad Inuwa, A review on
1. Banerjee, U.; Juvekar, C.; Fuller, S.H.; Chandrakasan, fog computing: Issues, characteristics, challenges, and
A.P. EeDTLS: Energy-efficient datagram transport layer potential applications, Telematics and Informatics
security for the internet of things. In Proceedings of the Reports,Volume 10,2023,100049,ISSN 2772-5030,
2017 IEEE Global Communications Conference, [Link]
GLOBECOM 2017, Singapore, 4–8 December 2017; pp. 15. .Raeisi-Varzaneh, Mostafa & Dakkak, Omar & Alaidaros,
1–6. Hashem & Avci, İsa. (2024). Internet of Things: Security,
2. Belattaf, S.; Mohammedi, M.; Omar, M.; Aoudjit, R. Issues, Threats, and Assessment of Different
Reliable and Adaptive Distributed Public-Key Cryptographic Technologies. Journal of
Management Infrastructure for the Internet of Things.
Communications. 19. 78. 10.12720/jcm.19.2.78-89.
Wirel. Pers. Commun. 2021, 120, 113–137.
16. Ahmad, Ijaz & Shahabuddin, Shahriar & Kumar, Tanesh
3. Pallavi Sethi, Smruti R. Sarangi, "Internet of Things:
Architectures, Protocols, and Applications", Journal of & Harjula, Erkki & Meisel, Marcus & Juntti, Markku &
Electrical and Computer Engineering, vol. 2017, Article Sauter, Thilo & Ylianttila, Mika. (2020). Challenges of AI
ID 9324035, 25 pages, 2017. in Wireless Networks for IoT. IEEE Industrial Electronics
[Link] Magazine. PP. 10.1109/MIE.2020.2979272.
4. Brockhaus, H.; Fries, S.; von Oheimb, D. Lightweight 17. Singh, M.K., Singh, A.K., Singh, P., Kalpana, Rishi,
Certificate Management Protocol (CMP) Profile; Internet O.P. (2023). Artificial Intelligence Enabled IOT System
Engineering Task Force: Fremont, CA, USA, 2021. for Football Identification in a Football Match. In: Garg,
5. Phillip Williams, Indira Kaylan Dutta, Hisham Daoud, D., Narayana, V.A., Suganthan, P.N., Anguera, J.,
Magdy Bayoumi,” A survey on security in internet of Koppula, V.K., Gupta, S.K. (eds) Advanced Computing.
things with a focus on the impact of emerging IACC 2022. Communications in Computer and
technologies”,Internet of ThingsVolume Information Science, vol 1782. Springer, Cham.
19,2022,100564, ISSN 2542-6605, [Link]
[Link] 5_37
6. Mohammed Ghazi Sami, Teba & Zeebaree, Subhi & 18. Asad, M.M., Naz, A., Shaikh, A. et al. Investigating the
Ahmed, Sarkar. (2023). A Comprehensive Review of impact of IoT-Based smart laboratories on students’
Hashing Algorithm Optimization for IoT Devices. academic performance in higher education. Univ Access
International Journal of Intelligent Systems and Inf Soc (2022). [Link]
Applications in Engineering. IJISAE, 2023, 11(6s. 205– 00944-1
231). 19. Taşkin, Deniz & Çetingöz, Mustafa. (2019). Designing a
7. Alam, Tanweer. 2023. "Blockchain-Based Internet of Gateway Device for Internet of Things Applications.
Things: Review, Current Trends, Applications, and Advances in Science and Technology Research Journal.
Future Challenges" Computers 12, no. 1: 6. 13. 79-87. 10.12913/22998624/103383.
[Link] 20. Apostolos Gerodimos, Leandros Maglaras, Mohamed
8. Arun Kumar Singh, Mahesh Kumar Singh, Pushpa Amine Ferrag, Nick Ayres, Ioanna Kantzavelou, IoT:
Choudhary, Pushpendra,(2023)” Future Technology Communication protocols and security threats, Internet
Internet of Things (IoT) in Smart Society 5.0” Intelligent of Things and Cyber-Physical Systems, Volume 3,2023,
Techniques for Cyber-Physical Systems (1st ed.) pp 245- Pages 1-13, ISSN 2667-3452,
266. CRC Press. [Link] [Link]
Authorized licensed use limited to: Somaiya University. Downloaded on April 04,2025 at [Link] UTC from IEEE Xplore. Restrictions apply.