Ultra-Compact Cryptographic Engineering for the Internet of Things: Enhancing Security in Highly Constrained Environments

  • Ahmed Nashaat Shakir Department of Information Technology, College of Computer Science and Information Technology, Kirkuk University, Kirkuk, Iraq
Keywords: Lightweight Cryptography, Internet of Things, Energy Efficient Security Frame Work, FPGA and ARM Cortex-M Evaluation, Digital Transformation in Iraq

Abstract

This paper will design a cryptography framework intended to work within extremely lightweight and resource-constrained IoT implementation environments. Its goal is to design a secure and computationally efficient system that will be able to protect the large-scale IoT systems that support the critical infrastructure like healthcare systems, industrial sensors, and smart cities applications. The suggested architecture is a combination of algorithmic design, simulation, and hardware evaluation with the platform that has FPGA and ARM Cortex-M microcontrollers to evaluate the performance of the proposed architecture in real-world conditions. The model has been largely tested, showing substantial energy use (up to 40% of original power usage), increased throughput (up to 30% more), and lower latency (reduced by 20-50%) than more traditional cryptographic standards like AES and PRESENT. These findings establish lightweight encryption as viable with respect to protecting the IoT ecosystems without compromising the cryptographic strength. The area of this study puts its contribution in the context of the current digital transformation of Iraq, drawing on the framework of information-system compatibility of organizational readiness model. It is through such regional inferences that the paper suggests a framework of cryptography, which is engineering-oriented, enabling safe, energy-conscious, and scalable information exchange among national e-management systems. The results support the notion that ultra-lightweight cryptographic engineering can be used as a foundation to developing economies in order to support the development of secure, sustainable, and interoperable digital infrastructures.

References

I. Radhakrishnan, S. Jadon, and P. B. Honnavalli, “Efficiency and Security Evaluation of Lightweight Cryptographic Algorithms for Resource-Constrained IoT Devices,” Sensors, vol. 24, no. 12, p. 4008, 2024, [Online]. Available: https://www.mdpi.com/1424-8220/24/12/4008

S. Khan, P. A. Ferreira Lopes Martins, B. Sousa, and V. Pereira, “A Comprehensive Review on Lightweight Cryptographic Mechanisms for Industrial Internet of Things Systems,” ACM Comput. Surv., vol. 58, no. 1, pp. 1–37, 2025, doi: 10.1145/3757734.

S. Mathur, S. Sankaran, S. MacAulay, and I. Tsang, “Minimum Viable Governance for Data Science Initiatives: A Transport for NSW Case Study,” in Value Co-Creation in the Project Society, 2022, pp. 65–76. doi: 10.56889/vjtu9918.

M. Mirigaldi, V. Piscopo, M. Martina, and G. Masera, “The Quest for Efficient ASCON Implementations: A Comprehensive Review of Implementation Strategies and Challenges,” Chips, vol. 4, no. 2, p. 15, 2025, [Online]. Available: https://www.mdpi.com/2674-0729/4/2/15

K. Shibutani, T. Isobe, H. Hiwatari, A. Mitsuda, T. Akishita, and T. Shirai, “Piccolo: An Ultra-Lightweight Blockcipher,” in Lecture Notes in Computer Science, 2011, pp. 342–357. doi: 10.1007/978-3-642-23951-9_23.

M. Syafrudin, G. Alfian, N. L. Fitriyani, and J. Rhee, “Performance Analysis of IoT-Based Sensor, Big Data Processing, and Machine Learning Model for Real-Time Monitoring System in Automotive Manufacturing,” Sensors, vol. 18, no. 9, p. 2946, 2018, doi: 10.3390/s18092946.

A. S. Al-Jubory, M. M. Al-Jubory, and B. M. Yaseen, “Evaluate the Reality of the Requirements for the Application of Electronic Management and Its Role in Enhancing Performance,” in 2020 2nd Annual International Conference on Information and Sciences (AiCIS), 2020, pp. 172–177. doi: 10.1109/aicis51645.2020.00036.

A. Kariznovi and K. Mandal, “Priv-IoT: Privacy-Preserving Machine Learning in IoT Utilizing TEE and Lightweight Ciphers,” in Foundations and Practice of Security (FPS 2024), 2024. [Online]. Available: https://link.springer.com/chapter/10.1007/978-3-031-87496-3_4

M. Rahmati and N. Rahmati, “Lightweight Post-Quantum Cryptographic Frameworks for Real-Time Secure Communications in IoT Edge Networks,” Telecommun. Syst., 2025, [Online]. Available: https://link.springer.com/article/10.1007/s11235-025-01372-1

K. Razikin and B. Soewito, “Cybersecurity Decision Support Model to Designing Information Technology Security System Based on Risk Analysis and Cybersecurity Framework,” Egypt. Informatics J., vol. 23, no. 3, pp. 383–404, 2022, doi: 10.1016/j.eij.2022.03.001.

B. Al-Shargabi, O. Sabri, O. Albahbouh Aldabbas, and A. Abuarqoub, “A Survey on Lightweight Encryption Methods for IoT-Enabled Healthcare Applications,” in Proceedings of the 7th International Conference on Future Networks and Distributed Systems, 2023, pp. 753–757. doi: 10.1145/3644713.3644839.

V. Thakor, “Lightweight Cryptography for Resource-Constrained IoT Devices,” Teesside University, 2022. [Online]. Available: https://research.tees.ac.uk/ws/portalfiles/portal/49903399/Lightweight_Cryptography_for_Resource.pdf

S. Kundu, A. Ghosh, A. Karmakar, and S. Sen, “Rudraksh: A Compact and Lightweight Post-Quantum Key-Encapsulation Mechanism,” 2025. [Online]. Available: https://arxiv.org/abs/2501.13799

F. Capra, S. Virtanen, and I. Hasanov, “Performance Analysis of MAC Algorithms: Benchmarking for Automotive Embedded Systems,” 2025. [Online]. Available: https://www.utupub.fi/bitstream/handle/10024/194263/Capra_Francesca_Thesis.pdf

M. Rushad, A. Nambiar, and B. R. Chandavarkar, “Resource-Aware Cryptography: An Analysis of Lightweight Cryptographic Primitives,” SN Comput. Sci., vol. 3, p. 89, 2022, [Online]. Available: https://link.springer.com/article/10.1007/s42979-021-00984-z

T. K. Goyal, V. Sahula, and D. Kumawat, “Energy Efficient Lightweight Cryptography Algorithms for IoT Devices,” IETE J. Res., vol. 68, no. 3, pp. 1722–1735, 2019, doi: 10.1080/03772063.2019.1670103.

S. Khan et al., “Securing the IoT Ecosystem: ASIC-Based Hardware Realization of ASCON Lightweight Cipher,” Int. J. Inf. Secur., vol. 23, no. 6, pp. 3653–3664, 2024, doi: 10.1007/s10207-024-00904-1.

A. Jindal, R. Arora, and A. Rajawat, “Comparative Study of Energy-Efficient Lightweight Block Ciphers in IoT Devices,” Int. J. Comput. Appl., vol. 183, no. 20, pp. 24–29, 2021, doi: 10.5120/ijca2021921545.

M. Nooruddin and D. Valles, “An Advanced IoT Framework for Long Range Connectivity and Secure Data Transmission Leveraging LoRa and ASCON Encryption,” in 2023 IEEE World AI IoT Congress (AIIoT), 2023, pp. 583–589. doi: 10.1109/aiiot58121.2023.10174401.

A. G. Zaman and H. Zia, “Lightweight Cryptography for IoT Platforms: Enhancing Security in Embedded Devices,” in 2024 International Conference on Engineering and Emerging Technologies (ICEET), 2024, pp. 1–6. doi: 10.1109/iceet65156.2024.10913623.

A. Alshahrani and A. Alzahrani, “Evaluating Lightweight Cryptographic Algorithms under Fog-Edge-IoT Architectures,” Futur. Gener. Comput. Syst., vol. 141, pp. 213–226, 2023, doi: 10.1016/j.future.2022.12.005.

A. Aydeger, E. Zeydan, A. K. Yadav, K. T. Hemachandra, and M. Liyanage, “Towards a Quantum-Resilient Future: Strategies for Transitioning to Post-Quantum Cryptography,” in 2024 15th International Conference on Network of the Future (NoF), 2024, pp. 195–203. doi: 10.1109/nof62948.2024.10741441.

Published
2025-11-30
How to Cite
Shakir, A. N. (2025). Ultra-Compact Cryptographic Engineering for the Internet of Things: Enhancing Security in Highly Constrained Environments. CENTRAL ASIAN JOURNAL OF MATHEMATICAL THEORY AND COMPUTER SCIENCES, 7(1), 61-73. Retrieved from https://cajmtcs.casjournal.org/index.php/CAJMTCS/article/view/843
Section
Articles