Lightweight Secure and Scalable Scheme for Data Transmission in the Internet of Things

Ibraheem Al-Hejri, Farag Azzedin*, Sultan Almuhammadi, Mohamed Eltoweissy

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

2 Scopus citations

Abstract

The Internet of Things (IoT) is rapidly permeating critical domains, enabling the interconnection and utilization of diverse devices on a large scale while streaming vast volumes of data. In domains like telehealth, intelligent transportation, and autonomous agriculture, ensuring the confidentiality, integrity, and authenticity of collected and exchanged data is paramount. However, the resource limitations and heterogeneous nature of IoT devices often render traditional cryptography-based techniques ineffective or even infeasible for secure data transmission. Consequently, there is an urgent need to develop and implement lightweight, secure, and scalable schemes for data transmission. In this paper, we propose a novel Lightweight Secure and Scalable Scheme (LS3) for data transmission in IoT environments. LS3 is comprised of three phases and utilizes an efficient combination of symmetric keys and Elliptic Curve Menezes–Qu–Vanstone asymmetric key agreement protocol. Through a comprehensive analysis, we demonstrate that LS3 excels in terms of security and scalability and outperforms other existing schemes in terms of computation and communication costs.

Original languageEnglish
Pages (from-to)12919-12934
Number of pages16
JournalArabian Journal for Science and Engineering
Volume49
Issue number9
DOIs
StatePublished - Sep 2024

Bibliographical note

Publisher Copyright:
© King Fahd University of Petroleum & Minerals 2024.

Keywords

  • Elliptic curve cryptography
  • Internet of Things
  • Lightweight schemes
  • Scalability
  • Secure data transmission

ASJC Scopus subject areas

  • General

Fingerprint

Dive into the research topics of 'Lightweight Secure and Scalable Scheme for Data Transmission in the Internet of Things'. Together they form a unique fingerprint.

Cite this