Home > Other Scientific Research Area > Other > Special Issue > Recent Advances in Computer Applications and Information Technology > A Secure Communication Model for Low Power IOT Networks

A Secure Communication Model for Low Power IOT Networks

Call for Papers

Volume-10 | Issue-3

Last date : 26-Jun-2026

Best International Journal
Open Access | Peer Reviewed | Best International Journal | Indexing & IF | 24*7 Support | Dedicated Qualified Team | Rapid Publication Process | International Editor, Reviewer Board | Attractive User Interface with Easy Navigation

Journal Type : Open Access

First Update : Within 7 Days after submittion

Submit Paper Online

For Author

Research Area


A Secure Communication Model for Low Power IOT Networks


Srushti Wanjari | Himani Kubade



Srushti Wanjari | Himani Kubade "A Secure Communication Model for Low Power IOT Networks" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Special Issue | Recent Advances in Computer Applications and Information Technology, March 2026, pp.426-432, URL: https://www.ijtsrd.com/papers/ijtsrd101373.pdf

The Internet of Things' (IoT) explosive expansion has led to the deployment of a large number of low-power, resource-constrained devices in smart cities, smart healthcare, and industrial automation. Because of their low energy, computing power, and memory, these devices still face substantial challenges in guaranteeing secure connection. For such contexts, traditional security measures are frequently excessively complicated and energy-intensive. The secure communication paradigm proposed in this paper is especially made for ultra-low power Internet of Things networks. To guarantee the secrecy, integrity, and authenticity of data, the technique uses mutual authentication, elliptic curve cryptography-based key distribution, and lightweight symmetric encryption. In order to balance security and energy efficiency, an adaptive security system also dynamically modifies protection levels according to device capability and data sensitivity. According to simulation results, the suggested approach preserves scalability and reliability for low-cost IoT installations while lowering energy consumption, communication overhead, and latency when compared to traditional protocols like TLS and DTLS. Low Power Internet of Things (IoT) networks are being used more and more in vital areas like environmental sensing, industrial automation, smart cities, and healthcare monitoring. However, the application of traditional security methods is difficult due to their limited resources, including memory, computing power, and energy. With an emphasis on scalable key management, energy-efficient authentication, and lightweight cryptographic operations, this study suggests a secure communication architecture especially made for low power Internet of Things networks. The suggested paradigm incorporates a hierarchical trust-based key distribution method to minimize computational complexity, lightweight hash-based message authentication for integrity, and symmetric key encryption for data confidentiality. The architecture uses mutual authentication and dynamic session key generation to reduce communication costs and improve resilience against typical threats such replay attacks, node impersonation, eavesdropping, and denial-of-service assaults. The lifespan of the network is also increased by energy-aware security scheduling, which makes sure that security processes adjust to node power levels. In comparison to conventional security frameworks, performance evaluation shows that the suggested model achieves high security guarantees with less computing complexity and energy consumption. The model may be deployed in wireless sensor and IoT networks with little resources and is scalable and flexible enough to adapt to diverse IoT contexts. A useful and effective framework for secure communication in next-generation low power Internet of Things systems is contributed by this work.

Internet of Things (IoT), Low-Power IoT Networks, Secure Communication, Lightweight Cryptography, Elliptic Curve Cryptography (ECC)


IJTSRD101373
Special Issue | Recent Advances in Computer Applications and Information Technology, March 2026
426-432
IJTSRD | www.ijtsrd.com | E-ISSN 2456-6470
Copyright © 2019 by author(s) and International Journal of Trend in Scientific Research and Development Journal. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (CC BY 4.0) (http://creativecommons.org/licenses/by/4.0)

International Journal of Trend in Scientific Research and Development - IJTSRD having online ISSN 2456-6470. IJTSRD is a leading Open Access, Peer-Reviewed International Journal which provides rapid publication of your research articles and aims to promote the theory and practice along with knowledge sharing between researchers, developers, engineers, students, and practitioners working in and around the world in many areas like Sciences, Technology, Innovation, Engineering, Agriculture, Management and many more and it is recommended by all Universities, review articles and short communications in all subjects. IJTSRD running an International Journal who are proving quality publication of peer reviewed and refereed international journals from diverse fields that emphasizes new research, development and their applications. IJTSRD provides an online access to exchange your research work, technical notes & surveying results among professionals throughout the world in e-journals. IJTSRD is a fastest growing and dynamic professional organization. The aim of this organization is to provide access not only to world class research resources, but through its professionals aim to bring in a significant transformation in the real of open access journals and online publishing.

Thomson Reuters
Google Scholer
Academia.edu

ResearchBib
Scribd.com
archive

PdfSR
issuu
Slideshare

WorldJournalAlerts
Twitter
Linkedin