Mohammad AlauthmanAmjad AldweeshAhmad Al–QeremAli Younis Al MaqousiAmmar AlmomaniMouhammd Alkasassbeh
The proliferation of Internet of Things (IoT) devices has revolutionized many industries and daily life, however these resource-constrained devices also present significant cybersecurity challenges. Traditional cryptographic protocols are often too resource intensive for IoT use cases. This chapter provides a comprehensive review of lightweight cryptographic schemes tailored for IoT security, including authentication, data integrity and confidentiality protocols leveraging lightweight hash functions and elliptic curve cryptography (ECC). Practical deployment considerations, threat modeling, and security analysis methodologies for IoT systems are also discussed. Finally, research gaps and future directions are highlighted to guide continued innovation of efficient and secure cryptographic solutions enabling the ongoing growth of the IoT ecosystem.
B. ManimekalaT. AravindT. SounderrajanV. RajakumareswaranK. KrishnaveniK Mohanambal
Xin-Wen WuEn‐hui YangJunhu Wang
Niteesh Kumar UpadhyaySudhakar PeriyasamyVinod Kumar