

Fortified Data Transmission for IoT: Leveraging Trustless Networks with Adaptive Security and Energy Efficiency
Abstract
With the rapid adoption of IoT devices in various sectors, ensuring secure and efficient data transmission in untrusted environments has become increasingly critical. This study introduces an innovative, adaptive security protocol designed specifically for IoT devices operating in trustless networks. The proposed system enhances data integrity and confidentiality by integrating lightweight encryption algorithms alongside dynamic key management and anomaly-based intrusion detection. Performance evaluation demonstrates that our approach reduces energy consumption by 28%, enhances data throughput by 34%, and decreases latency by 20% compared to existing methods. Additionally, the protocol achieves a 97% accuracy rate in detecting potential intrusions, significantly bolstering device resilience in untrusted environments. These improvements contribute to more secure, efficient IoT operations across various applications, including healthcare, smart cities, and industrial automation.
References
Li, F., Zheng, Z., & Jin, C. (2016). Secure and efficient data transmission in the Internet of Things. Telecommunication Systems, 62, 111-122.
Li, X., Wang, M., Wang, H., Yu, Y., & Qian, C. (2019). Toward secure and efficient communication for the internet of things. IEEE/ACM Transactions on Networking, 27(2), 621-634.
Luo, X., Yin, L., Li, C., Wang, C., Fang, F., Zhu, C., & Tian, Z. (2020). A lightweight privacy-preserving communication protocol for heterogeneous IoT environment. IEEE Access, 8, 67192-67204.
Chen, D., Yang, W., Hu, J., Cai, Y., & Tang, X. (2018). Energy-efficient secure transmission design for the Internet of Things with an untrusted relay. IEEE Access, 6, 11862-11870.
Hiller, J., Pennekamp, J., Dahlmanns, M., Henze, M., Panchenko, A., & Wehrle, K. (2019, October). Tailoring onion routing to the internet of things: Security and privacy in untrusted environments. In 2019 IEEE 27th International Conference on Network Protocols (ICNP) (pp. 1-12). IEEE.
Tchernykh, A., Babenko, M., Chervyakov, N., Miranda-López, V., Avetisyan, A., Drozdov, A. Y., ... & Du, Z. (2020). Scalable data storage design for nonstationary IoT environment with adaptive security and reliability. IEEE Internet of Things Journal, 7(10), 10171-10188.
Siddiqui, F., Beley, J., Zeadally, S., & Braught, G. (2021). Secure and lightweight communication in heterogeneous IoT environments. Internet of Things, 14, 100093.
Rui, H., Huan, L., Yang, H., & YunHao, Z. (2020). Research on secure transmission and storage of energy IoT information based on Blockchain. Peer-to-Peer Networking and Applications, 13(4), 1225-1235.
Wang, T., Wang, P., Cai, S., Ma, Y., Liu, A., & Xie, M. (2019). A unified trustworthy environment establishment based on edge computing in industrial IoT. IEEE Transactions on Industrial Informatics, 16(9), 6083-6091.
Hu, C., Pu, Y., Yang, F., Zhao, R., Alrawais, A., & Xiang, T. (2020). Secure and efficient data collection and storage of IoT in smart ocean. IEEE Internet of Things Journal, 7(10), 9980-9994.
Refbacks
- There are currently no refbacks.