BOOK-CHAPTER

Cryptographic Protocols for Internet of Things (IoT) Security Lightweight Schemes and Practical Deployment

Abstract

The proliferation of Internet of Things (IoT) devices has revolutionized many industries and daily life, however these resource-constrained devices also present significant cybersecurity challenges. Traditional cryptographic protocols are often too resource intensive for IoT use cases. This chapter provides a comprehensive review of lightweight cryptographic schemes tailored for IoT security, including authentication, data integrity and confidentiality protocols leveraging lightweight hash functions and elliptic curve cryptography (ECC). Practical deployment considerations, threat modeling, and security analysis methodologies for IoT systems are also discussed. Finally, research gaps and future directions are highlighted to guide continued innovation of efficient and secure cryptographic solutions enabling the ongoing growth of the IoT ecosystem.

Keywords:
Internet of Things Software deployment Computer science Computer security Cryptographic protocol Cryptography Cryptographic primitive Internet privacy Computer network Operating system

Metrics

4
Cited By
6.54
FWCI (Field Weighted Citation Impact)
21
Refs
0.96
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Advanced Authentication Protocols Security
Physical Sciences →  Computer Science →  Computer Networks and Communications
User Authentication and Security Systems
Physical Sciences →  Computer Science →  Information Systems
Cryptographic Implementations and Security
Physical Sciences →  Computer Science →  Artificial Intelligence
© 2026 ScienceGate Book Chapters — All rights reserved.