Smart City Gnosys

Smart city article details

Title End-To-End Encryption Enabled Lightweight Mutual Authentication Scheme For Resource Constrained Iot Network
ID_Doc 23109
Authors Ullah S.; Nasir H.M.; Kadir K.; Khan A.; Memon A.; Azhar S.; Khan I.; Ashraf M.
Year 2025
Published Computers, Materials and Continua, 82, 2
DOI http://dx.doi.org/10.32604/cmc.2024.054676
Abstract Machine-to-machine (M2M) communication networks consist of resource-constrained autonomous devices, also known as autonomous Internet of things (IoTs) or machine-type communication devices (MTCDs) which act as a backbone for Industrial IoT, smart cities, and other autonomous systems. Due to the limited computing and memory capacity, these devices cannot maintain strong security if conventional security methods are applied such as heavy encryption. This article proposed a novel lightweight mutual authentication scheme including elliptic curve cryptography (ECC) driven end-to-end encryption through curve25519 such as (i): efficient end-to-end encrypted communication with pre-calculation strategy using curve25519; and (ii): elliptic curve Diffie-Hellman (ECDH) based mutual authentication technique through a novel lightweight hash function. The proposed scheme attempts to efficiently counter all known perception layer security threats. Moreover, the pre-calculated key generation strategy resulted in cost-effective encryption with 192-bit curve security. It showed comparative efficiency in key strength, and curve strength compared with similar authentication schemes in terms of computational and memory cost, communication performance and encryption robustness. Copyright © 2025 The Authors.
Author Keywords curve25519; elliptic curve cryptography; industrial internet of things; lightweight end-to-end encryption; machine-to-machine communication; Mutual authentication


Similar Articles


Id Similarity Authors Title Published
35254 View0.904Rajesh S.M.; Prabha R.Lightweight Cryptographic Approach To Address The Security Issues In Intelligent Applications: A SurveyIDCIoT 2023 - International Conference on Intelligent Data Communication Technologies and Internet of Things, Proceedings (2023)
35248 View0.89Mishra S.; Mondal B.; Jha R.K.Lightweight Authentication Scheme Based On Ecc For IotSN Computer Science, 5, 7 (2024)
35244 View0.887Khalique A.; Siddiqui F.; Ahad M.A.; Hussain I.Lightweight Authentication For Iot Devices (Laid) In Sustainable Smart CitiesScientific Reports, 15, 1 (2025)
4458 View0.884Abi-Char P.E.; Nader P.; Mahfouz S.A Secure And Lightweight Authenticated Key Agreement Protocol For Distributed Iot Applications2020 43rd International Conference on Telecommunications and Signal Processing, TSP 2020 (2020)
35246 View0.874Deng X.; Qin Z.; Wu J.; Ma Q.Lightweight Authentication For Resource-Constrained Devices In Smart Grid2023 8th International Conference on Signal and Image Processing, ICSIP 2023 (2023)
12571 View0.867Reddy D.J.; Sreshta G.; Vaishnavi J.V.; Sumasri V.Blockchain With Lightweight Encryption Model For Identity Management In Remote Health CareCognitive Science and Technology, 2025 (2025)
44576 View0.867Pandey S.; Bhushan B.Recent Lightweight Cryptography (Lwc) Based Security Advances For Resource-Constrained Iot NetworksWireless Networks, 30, 4 (2024)
2343 View0.861Saqib M.; Jasra B.; Moon A.H.A Lightweight Three Factor Authentication Framework For Iot Based Critical ApplicationsJournal of King Saud University - Computer and Information Sciences, 34, 9 (2022)
47662 View0.861Prakash M.; Ramesh K.Secure Multimodal Biometric Authentication Framework With Perceptual Hashing And Lightweight CryptographyJournal of Electronic Imaging, 33, 5 (2024)
29755 View0.856Mathews R.; Jose D.V.Hybrid Homomorphic-Asymmetric Lightweight Cryptosystem For Securing Smart Devices: A ReviewTransactions on Emerging Telecommunications Technologies, 35, 1 (2024)