Systematic Review of Lightweight Cryptographic Algorithms for IoT Security: Advances and Trends

Authors

  • Shilpa Shetty A NMAM Institute of Technology
  • Sudeepa K B NMAM Institute of Technology
  • Chaithra K M Visvesvaraya Technological University
  • Ananth Prabhu G Sahyadri College of Engineering and Management

DOI:

https://doi.org/10.12928/biste.v7i4.14440

Keywords:

NIST LWC Standard, Side-channel Resistance, Resource-constrained Devices, Lightweight Cryptography, Post-Quantum

Abstract

The proliferation of the Internet of Things (IoT) has fundamentally transformed modern infrastructure, but has also intensified security risks due to device resource constraints and interconnected environments. This systematic review synthesizes research on lightweight cryptographic algorithms for IoT security, focusing on studies published from 2019 to 2025. Relevant articles were identified through comprehensive searches of IEEE Xplore, ScienceDirect, Springer, and ACM Digital Library using Boolean strings that targeted terms including “lightweight cryptography,” “IoT security,” “side-channel resistance,” and “NIST LWC Standard.” Only peer-reviewed works in English addressing cryptographic primitives suitable for constrained IoT platforms were included; gray literature and studies without benchmarking on IoT-class hardware were excluded. Selection adhered to PRISMA guidelines to reduce selection bias. This review maps algorithmic taxonomies, highlights advances such as ASCON (NIST LWC 2025), side-channel and post-quantum resistance, and discusses real-world hardware-software trade-offs. Limitations arise from database scope, language constraints, and potential exclusion of emerging industry preprints. The analysis identifies persistent gaps—side-channel mitigations, context-aware security, and privacy—with guidance for future research. Overall, the findings clarify current capabilities and boundaries, supporting the development of scalable, energy-efficient, and robust cryptographic frameworks for secure IoT deployments within documented methodological limits.

References

C. P. Ekwueme, I. H. Adam, and A. Dwivedi, “Lightweight Cryptography for Internet of Things: A Review,” 6 EAI Endorsed Transactions on Internet of Things, vol. 10, 2024, https://doi.org/10.4108/eetiot.5565.

J. Kaur, A. Cintas Canto, M. Mozaffari Kermani, and R. Azarderakhsh, “A Survey on the Implementations, Attacks, and Countermeasures of the NIST Lightweight Cryptography Standard: ASCON,” ACM Computing Surveys, 2025, https://doi.org/10.1145/3744640.

G. M. C. De Miranda et al., “Lightweight Cryptographic Algorithms: A Position Paper,” Proceedings of the 21st International Conference on Security and Cryptography, pp. 764–70, 2024, https://doi.org/10.5220/0012792900003767.

N. F. Ibrahim and J. I. Agbinya. “A Review of Lightweight Cryptographic Schemes and Fundamental Cryptographic Characteristics of Boolean Functions,” Advances in Internet of Things, vol. 12, no. 1, pp. 9–17, 2022, https://doi.org/10.4236/ait.2022.121002.

Y. Desai, “A Comprehensive Survey on Lightweight Cryptographic Algorithms for IoT Security: Challenges and Future Directions,” Vidhyayana-An International Multidisciplinary Peer-Reviewed E-Journal-ISSN 2454-8596, vol. 10, no. si4, 2025, https://doi.org/10.58213/7ds7mv61.

P. S. Suryateja and K. V. Rao. “A Survey on Lightweight Cryptographic Algorithms in IoT.” Cybernetics and Information Technologies, vol. 24, no. 1, pp. 21–34, 2024, https://doi.org/10.2478/cait-2024-0002.

A. Hassan, “State-of-the-Art Lightweight Cryptographic Protocols for IoT Networks,” In Arai, K. (eds) Proceedings of the Future Technologies Conference (FTC) 2022, vol. 2, 2022, https://doi.org/10.1007/978-3-031-18458-1_21.

P. B. Abhi et al., “A Novel Lightweight Cryptographic Protocol for Securing IoT Devices.” International Journal of Computer Engineering in Research Trends, vol. 10, no. 10, pp. 24–30, 2023, https://doi.org/10.22362/ijcert/2023/v10/i10/v10i104.

C. Sohrabi et al., “PRISMA 2020 statement: What's new and the importance of reporting guidelines,” International Journal of Surgery, vol. 88, p. 105918, 2021, https://doi.org/10.1016/j.ijsu.2021.105918.

S. Khan et al., “A Comprehensive Review on Lightweight Cryptographic Mechanisms for Industrial Internet of Things Systems.” ACM Computing Surveys, p. 3757734, 2025, https://doi.org/10.1145/3757734.

C. J. Ramakrishna, et al., “Analysis of Lightweight Cryptographic Algorithms for IoT Gateways.” Procedia Computer Science, vol. 233, pp. 235–42, 2024, https://doi.org/10.1016/j.procs.2024.03.213.

A. S. Jafer, K. A. Hussein, and J. R. Naif, “Review on lightweight encryption algorithms for IoT devices,” In AIP Conference Proceedings, vol. 2885, no. 1, p. 060001, 2024, https://doi.org/10.1063/5.0181700.

A. M. Rasheed and R. M. S. Kumar. “Efficient Lightweight Cryptographic Solutions for Enhancing Data Security in Healthcare Systems Based on IoT.” Frontiers in Computer Science, vol. 7, 2025, https://doi.org/10.3389/fcomp.2025.1522184.

S. Kumar et al., “A Review of Lightweight Security and Privacy for Resource-Constrained IoT Devices.” Computers, Materials & Continua, vol. 78, no. 1, pp. 31–63, 2024, https://doi.org/10.32604/cmc.2023.047084.

Y. Zhong and J. Gu. “Lightweight Block Ciphers for Resource-Constrained Environments: A Comprehensive Survey.” Future Generation Computer Systems, vol. 157, pp. 288–302, 2024, https://doi.org/10.1016/j.future.2024.03.054.

P. Singh et al., “Lightweight Cryptographic Algorithms for Resource-Constrained IoT Devices and Sensor Networks.” Security and Privacy Issues in IoT Devices and Sensor Networks, pp. 153–85, 2021, https://doi.org/10.1016/B978-0-12-821255-4.00008-0.

S. Puckett, J. Liu, S. -M. Yoo and T. H. Morris, "A Secure and Efficient Protocol for LoRa Using Cryptographic Hardware Accelerators," in IEEE Internet of Things Journal, vol. 10, no. 24, pp. 22143-22152, 2023, https://doi.org/10.1109/JIOT.2023.3304175.

M. Dangana, S. Hussain, S. Ansari, M. Imran, and A. Zoha, “A Digital Twin (DT) approach to Narrow-Band Internet of Things (NB-IoT) wireless communication optimization in an industrial scenario,” Internet of Things, vol. 25, p. 101113, 2024, https://doi.org/10.1016/j.iot.2024.101113.

F. F. Ashrif, E. A. Sundararajan, R. Ahmad, M. K. Hasan, and E. Yadegaridehkordi, “Survey on the authentication and key agreement of 6LoWPAN: Open issues and future direction,” Journal of Network and Computer Applications, vol. 221, p. 103759, 2024, https://doi.org/10.1016/j.jnca.2023.103759.

A. A- Jimenez, J. G- Madrid, J. S- Gomez, and R. M- Perez, “Lightweight authenticated key exchange for low-power IoT networks using EDHOC,” Internet of Things, vol. 31, p. 101539, 2025, https://doi.org/10.1016/j.iot.2025.101539.

I. Aribilola et al., “SuPOR: A Lightweight Stream Cipher for Confidentiality and Attack-Resilient Visual Data Security in IoT.” International Journal of Critical Infrastructure Protection, vol. 50, p. 100786, 2025, https://doi.org/10.1016/j.ijcip.2025.100786.

J. Kuang et al., “DRcipher: A Pseudo-Random Dynamic Round Lightweight Block Cipher.” Journal of King Saud University - Computer and Information Sciences, vol. 36, no. 1, p. 101928, 2024, https://doi.org/10.1016/j.jksuci.2024.101928.

Q. Song et al., “LELBC: A Low Energy Lightweight Block Cipher for Smart Agriculture,” Internet of Things, vol. 25, p. 101022, 2024, https://doi.org/10.1016/j.iot.2023.101022.

X. Huang et al., “IoVCipher: A Low-Latency Lightweight Block Cipher for Internet of Vehicles.” Ad Hoc Networks, vol. 160, p. 103524, 2024, https://doi.org/10.1016/j.adhoc.2024.103524.

A. A. Zakaria et al., “Systematic Literature Review: Trend Analysis on the Design of Lightweight Block Cipher,” Journal of King Saud University - Computer and Information Sciences, vol. 35, no. 5, p. 101550, 2023, https://doi.org/10.1016/j.jksuci.2023.04.003.

S. Aziz, I. A. Shoukat, M. Iftikhar, M. Murtaza, A. M. Alenezi, C.-C. Lee, and I. Taj, “Next-Generation Block Ciphers: Achieving Superior Memory Efficiency and Cryptographic Robustness for IoT Devices,” Cryptography, vol. 8, no. 4, p. 47, 2024, https://doi.org/10.3390/cryptography8040047.

S. M. Al-Nofaie, S. Sharaf, and R. Molla, “Design Trends and Comparative Analysis of Lightweight Block Ciphers for IoTs,” Applied Sciences, vol. 15, no. 14, p. 7740, 2025, https://doi.org/10.3390/app15147740.

L. Pyrgas and P. Kitsos, “Compact Hardware Architectures of Enocoro-128v2 Stream Cipher for Constrained Embedded Devices,” Electronics, vol. 9, no. 9, p. 1505, 2020, https://doi.org/10.3390/electronics9091505.

C. Paar, J. Pelzl, T. Güneysu, “Message Authentication Codes (MACs),” In Understanding Cryptography, 2024, https://doi.org/10.1007/978-3-662-69007-9_13.

C. Nan and L. Shengli. “Message Authentication Codes Against Related‐Key Attacks Under LPN and LWE,” Chinese Journal of Electronics, vol. 30, no. 4, pp. 697–703, 2021, https://doi.org/10.1049/cje.2021.05.011.

M. El-Hajj and P. Beune, “Lightweight Public Key Infrastructure for the Internet of Things: A Systematic Literature Review,” Journal of Industrial Information Integration, vol. 41, p. 100670, 2024, https://doi.org/10.1016/j.jii.2024.100670.

I. Radhakrishnan, S. Jadon, and P. B. Honnavalli, “Efficiency and Security Evaluation of Lightweight Cryptographic Algorithms for Resource-Constrained IoT Devices,” Sensors, vol. 24, no. 12, p. 4008, 2024, https://doi.org/10.3390/s24124008.

V. A. Thakor et al., “Lightweight Cryptography Algorithms for Resource-Constrained IoT Devices: A Review, Comparison and Research Opportunities,” IEEE Access, vol. 9, pp. 28177–93, 2021, https://doi.org/10.1109/ACCESS.2021.3052867.

A. A. Laghari et al., “Internet of Things (IoT) applications security trends and challenges,” Discov Internet Things, vol. 4, p. 36, 2024, https://doi.org/10.1007/s43926-024-00090-5.

M. Almutairi and F. T. Sheldon, “IoT–Cloud Integration Security: A Survey of Challenges, Solutions, and Directions,” Electronics, vol. 14, no. 7, p. 1394, 2025, https://doi.org/10.3390/electronics14071394.

T. Sutikno and D. Thalmann, “Insights on the Internet of Things: Past, Present, and Future Directions,” TELKOMNIKA (Telecommunication Computing Electronics and Control), vol. 20, no. 6, pp. 1399–420, 2022, https://doi.org/10.12928/telkomnika.v20i6.22028.

K. Shaukat et al., “A Review on Security Challenges in Internet of Things (IoT),” 2021 26th International Conference on Automation and Computing (ICAC), pp. 1–6, 2021, https://doi.org/10.23919/ICAC50006.2021.9594183.

M. Conti, E. Losiouk, R. Poovendran, and R. Spolaor, “Side-channel attacks on mobile and IoT devices for Cyber–Physical systems,” Computer Networks, vol. 207, p. 108858, 2022, https://doi.org/10.1016/j.comnet.2022.108858.

A. T. Mozipo and J. M. Acken, “Residual vulnerabilities to power side channel attacks of lightweight ciphers cryptography competition finalists,” IET Comput. Digit. Tech, vol. 17, no. (3-4), pp. 75–88, 2023, https://doi.org/10.1049/cdt2.12057.

K. Mohajerani, L. Beckwith, A. Abdulgadir, J- P. Kaps, and K. Gaj, “Lightweight Champions of the World: Side-Channel Resistant Open Hardware for Finalists in the NIST Lightweight Cryptography Standardization Process,” ACM Trans. Embed. Comput. Syst., vol. 24, no. 5, p. 25, 2025, https://doi.org/10.1145/3677320.

G. P. Pinto, P. K. Donta, S. Dustdar, and C. Prazeres, “A Systematic Review on Privacy-Aware IoT Personal Data Stores,” Sensors (Basel, Switzerland), vol. 24, no. 7, p. 2197, 2024, https://doi.org/10.3390/s24072197.

H. M. Rai, K. K. Shukla, L. Tightiz, and S. Padmanaban, “Enhancing data security and privacy in energy applications: Integrating IoT and blockchain technologies,” Heliyon, vol. 10, no. 19, p. e38917, 2024, https://doi.org/10.1016/j.heliyon.2024.e38917.

T. Magara and Y. Zhou, “Internet of Things (IoT) of Smart Homes: Privacy and Security,” Journal of Electrical and Computer Engineering, vol. 2024, no. 1, p. 7716956, 2024. https://doi.org/10.1155/2024/7716956.

M. Barari and R. Saifan, “Energy–Aware security protocol for IoT devices,” Pervasive and Mobile Computing, vol. 96, p. 101847, 2023, https://doi.org/10.1016/j.pmcj.2023.101847.

M. Qasim Alazzawi, J.-C., Sánchez-Aarnoutse, A. S. Martínez-Sala, and M.-D. Cano, “Green IoT: Energy Efficiency, Renewable Integration, and Security Implications,” IET Netw, vol. 14, p. e70003, 2025, https://doi.org/10.1049/ntw2.70003.

M. El-hajj, H. Mousawi, and A. Fadlallah, “Analysis of Lightweight Cryptographic Algorithms on IoT Hardware Platform,” Future Internet, vol. 15, no. 2, p. 54, 2023, https://doi.org/10.3390/fi15020054.

R. Mohanapriya and V. Nithish Kumar, "Modified SPECK (M-SPECK) Lightweight Cipher Architecture for Resource-Constrained Applications," in IEEE Access, vol. 13, pp. 88993-89002, 2025, https://doi.org/10.1109/ACCESS.2025.3570727.

R. Saifan and M. Barari, “Energy – Aware Security Protocol for Iot Devices.” Pervasive and Mobile Computing, vol. 96, p. 101847, 2023, https://doi.org/10.2139/ssrn.4357627.

L. Sleem and R. Couturier, “Speck-R: An ultra light-weight cryptographic scheme for Internet of Things,” Multimed Tools Appl, vol. 80, pp. 17067–17102, 2021, https://doi.org/10.1007/s11042-020-09625-8.

B. M. Alshammari, R. Guesmi, T. Guesmi, H. Alsaif, and A. Alzamil, “Implementing a Symmetric Lightweight Cryptosystem in Highly Constrained IoT Devices by Using a Chaotic S-Box,” Symmetry, vol. 13, no. 1, p. 129, 2021, https://doi.org/10.3390/sym13010129.

H. Madushan, I. Salam, and J. Alawatugoda, “A Review of the NIST Lightweight Cryptography Finalists and Their Fault Analyses,” Electronics, vol. 11, no. 24, p. 4199, 2022, https://doi.org/10.3390/electronics11244199.

B. Ojetunde, T. Kurihara, K. Yano, T. Sakano, and H. Yokoyama, “A Practical Implementation of Post-Quantum Cryptography for Secure Wireless Communication,” Network, vol. 5, no. 2, p. 20, 2025, https://doi.org/10.3390/network5020020.

K. Cherkaoui Dekkaki, I. Tasic, and M.-D. Cano, “Exploring Post-Quantum Cryptography: Review and Directions for the Transition Process,” Technologies, vol. 12, no. 12, p. 241, 2024, https://doi.org/10.3390/technologies12120241.

Y-K. Liu, and D. Moody. “Post-Quantum Cryptography and the Quantum Future of Cybersecurity,” Physical Review Applied, vol. 21, no. 4, p. 040501, 2024, https://doi.org/10.1103/PhysRevApplied.21.040501.

S. Baimukhanov, et al., “Enhancing ML-Based Anomaly Detection in Data Management for Security through Integration of IoT, Cloud, and Edge Computing,” Expert Systems with Applications, vol. 293, p. 128700, 2025, https://doi.org/10.1016/j.eswa.2025.128700.

A. Boukerche and R. W. L. Coutinho, "Design Guidelines for Machine Learning-based Cybersecurity in Internet of Things," in IEEE Network, vol. 35, no. 1, pp. 393-399, 2021, https://doi.org/10.1109/MNET.011.2000396.

O. Akinola, et al., “Artificial Intelligence and Machine Learning Techniques for Anomaly Detection and Threat Mitigation in Cloud-Connected Medical Devices.” International Journal of Scientific Research and Modern Technology, vol. 3, no. 3, 2024, https://doi.org/10.38124/ijsrmt.v3i3.26.

L. Sleem, R. Couturier, “Speck-R: An ultra light-weight cryptographic scheme for Internet of Things,” Multimed Tools Appl, vol. 80, pp. 17067–17102, 2021, https://doi.org/10.1007/s11042-020-09625-8.

N. Yadav and M. D. Souza, “Integrating AI with Cybersecurity: A Review of Deep Learning for Anomaly Detection and Threat Mitigation,” Nanotechnology Perceptions, 1756-1785, 2024, https://doi.org/10.62441/nano-ntp.vi.3007.

N. Ibrahim and J. Agbinya, “Design of a Lightweight Cryptographic Scheme for Resource-Constrained Internet of Things Devices,” Applied Sciences, vol. 13, no. 7, p. 4398, 2023, https://doi.org/10.3390/app13074398.

M. Marwan, et al. “Leveraging Artificial Intelligence and Mutual Authentication to Optimize Content Caching in Edge Data Centers,” Journal of King Saud University - Computer and Information Sciences, vol. 35, no. 9, p. 101742, 2023, https://doi.org/10.1016/j.jksuci.2023.101742.

N. T. V and H. M Kalpana, "Smart Multipurpose Agricultural Robot," 2021 IEEE International Conference on Electronics, Computing and Communication Technologies (CONECCT), pp. 1-6, 2021, https://doi.org/10.1109/CONECCT52877.2021.9622632.

Downloads

Published

2025-11-12

How to Cite

[1]
S. S. A, S. K. B, C. K. M, and A. P. G, “Systematic Review of Lightweight Cryptographic Algorithms for IoT Security: Advances and Trends”, Buletin Ilmiah Sarjana Teknik Elektro, vol. 7, no. 4, pp. 789–806, Nov. 2025.

Issue

Section

Article