Open Access iconOpen Access



A Review of Lightweight Security and Privacy for Resource-Constrained IoT Devices

Sunil Kumar1, Dilip Kumar1, Ramraj Dangi2, Gaurav Choudhary3, Nicola Dragoni4, Ilsun You5,*

1 Department of Computer Science and Engineering, National Institute of Technology Jamshedpur, Jamshedpur, India
2 School of Computing Science and Engineering, VIT University Bhopal, Bhopal, 466114, India
3 Center for Industrial Software, The Maersk Mc-Kinney Moller Institute, University of Southern Denmark, Sonderborg, Odense, Denmark
4 Department of Applied Mathematics and Computer Science, Technical University of Denmark, Lyngby, 2800, Denmark
5 Department of Information Security, Cryptology, and Mathematics, Kookmin University, Seoul, South Korea

* Corresponding Author: Ilsun You. Email: email

Computers, Materials & Continua 2024, 78(1), 31-63.


The widespread and growing interest in the Internet of Things (IoT) may be attributed to its usefulness in many different fields. Physical settings are probed for data, which is then transferred via linked networks. There are several hurdles to overcome when putting IoT into practice, from managing server infrastructure to coordinating the use of tiny sensors. When it comes to deploying IoT, everyone agrees that security is the biggest issue. This is due to the fact that a large number of IoT devices exist in the physical world and that many of them have constrained resources such as electricity, memory, processing power, and square footage. This research intends to analyse resource-constrained IoT devices, including RFID tags, sensors, and smart cards, and the issues involved with protecting them in such restricted circumstances. Using lightweight cryptography, the information sent between these gadgets may be secured. In order to provide a holistic picture, this research evaluates and contrasts well-known algorithms based on their implementation cost, hardware/software efficiency, and attack resistance features. We also emphasised how essential lightweight encryption is for striking a good cost-to-performance-to-security ratio.


Cite This Article

APA Style
Kumar, S., Kumar, D., Dangi, R., Choudhary, G., Dragoni, N. et al. (2024). A review of lightweight security and privacy for resource-constrained iot devices. Computers, Materials & Continua, 78(1), 31-63.
Vancouver Style
Kumar S, Kumar D, Dangi R, Choudhary G, Dragoni N, You I. A review of lightweight security and privacy for resource-constrained iot devices. Comput Mater Contin. 2024;78(1):31-63
IEEE Style
S. Kumar, D. Kumar, R. Dangi, G. Choudhary, N. Dragoni, and I. You "A Review of Lightweight Security and Privacy for Resource-Constrained IoT Devices," Comput. Mater. Contin., vol. 78, no. 1, pp. 31-63. 2024.

cc This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 960


  • 477


  • 0


Share Link