Comparative Analysis of Lightweight Cryptography and Blockchain-Based Security Protocols for Mitigating Threats and Vulnerabilities in the Internet of things

Authors

Chimenka Goodluck

Department of Mathematics and Computer Science, Clifford University (Nigeria)

Obioma D.C.

Department of Mathematics and Computer Science, Clifford University (Nigeria)

Article Information

DOI: 10.51584/IJRIAS.2026.110100130

Subject Category: cyber secuirity

Volume/Issue: 11/1 | Page No: 1543-1555

Publication Timeline

Submitted: 2026-02-04

Accepted: 2026-02-09

Published: 2026-02-19

Abstract

The uncontrolled growth of the Internet of Things, especially in securing limited-resource IoT, has created unprecedented potential that raises issues tremendously. The key intention of the study is to comparatively examine the security measures and defenses against the cyber-attacks that take place in the IoT security protocols. The study provides a combination of secure communication protocols, blockchain technology, and lightweight cryptography using Bevywise IoT simulator, MQTT Route, and Wireshark for the network. The results of the study confirm the effectiveness of the security measures provided by the blockchain technology for the integrity and immutability of the data. The results also emphasize the significance of the study to solve the IoT security issues better. By creating a security framework, the study significantly contributes to the development of IoT technology, especially in the fields where the security has to be given more priority. Cyber security and maintaining the privacy and trust of the systems play a very significant role.

Keywords

Vulnerabilities, Threats, Protocols, Devices, IoT, Cryptography

Downloads

References

1. Arjunsinh, T. V. (2023). Lightweight cryptography for resource-constrained IoT devices. International Journal of IoT and Security, 15(4), pp.567–585. [Google Scholar] [Crossref]

2. Chen, X., Zhang, Y., & Zhao, L. (2022). A comparative analysis of blockchain protocols for IoT security. Journal of Cybersecurity Research, 14(3), pp.221–239. [Google Scholar] [Crossref]

3. Goudarzi, S., Anisi, M. H., Soleymani, S. A., Ayob, M., & Zeadally, S. (2021). An IoT-based prediction technique for efficient energy consumption in buildings. IEEE Transactions on Green Communications and Networking, 5, 2076–2088. https://doi.org/10.1109/TGCN.2021.3091388 [Google Scholar] [Crossref]

4. Hamza, A., Gharakheili, H. H., & Sivaraman, V. (2023). IoT network security: Requirements, threats, and countermeasures (arXiv:2008.09339). arXiv. https://doi.org/10.48550/arXiv.2008.09339 [Google Scholar] [Crossref]

5. Kashani, M. H., Madanipour, M., Nikravan, M., Asghari, P., & Mahdipour, E. (2021). A systematic review of IoT in healthcare: Applications, techniques, and trends. Journal of Network and Computer Applications, 192, pp.103164. [Google Scholar] [Crossref]

6. Kolias, C., Kambourakis, G., Stavrou, A., & Voas, J. (2017). DDoS in the IoT: Mirai and other botnets. Computer, 50(7), 80–84. https://doi.org/10.1109/MC.2017.201 [Google Scholar] [Crossref]

7. Parmar, M., & Kaur, H. J. (2023). Comparative analysis of secure hash algorithms and IoT security protocols. International Journal of Advanced Computing and Security Studies, 15(2), 101–120. https://thesai.org/Downloads/Volume12No3/Paper_35Comparative_Analysis_of_Secured_Hash_Algorithms.pdf [Google Scholar] [Crossref]

8. Khan, M. U. (2020). Blockchain technology for the security of Internet of Things: Challenges, solutions, and future trends. [Google Scholar] [Crossref]

9. Li, Y., Zhang, J., & Wang, M. (2021). Security challenges in IoT: A systematic review of existing countermeasures and protocols. Journal of Network and Computer Applications, 172, 102983. [Google Scholar] [Crossref]

10. Mukherjee, S., & Bose, A. (2022). Security in the Internet of Things: Current challenges and emerging solutions. IEE. Internet of Things Journal, 9(5), pp.3350.https://doi.org/10.1109/JIOT.2021.3094623 [Google Scholar] [Crossref]

11. Rahman, T., & Ali, M. (2021). Evaluation of lightweight cryptographic algorithms for IoT environments. Journal of Computer Science and Engineering, 19(2), 145–160. https://doi.org/10.23919/JCS.2021.9213416 [Google Scholar] [Crossref]

12. Sahu, S. K., & Mazumdar, K. (2024). Exploring security threats and solutions techniques for Internet of Things (IoT): From vulnerabilities to vigilance. Frontiers in Artificial Intelligence, 1397480. https://doi.org/10.3389/frai.2024.1397480 [Google Scholar] [Crossref]

13. Sharma, P., & Gupta, K. (2023). Mitigating cyber threats in IoT through blockchain and decentralized security frameworks. Advances in Cybersecurity, 7(1), 101–118. [Google Scholar] [Crossref]

14. Singh, R., & Thakur, V. A. (2022). Exploring lightweight encryption techniques for IoT security: A comparative review. Journal of Information Security and Privacy, 12(3), 245–263. [Google Scholar] [Crossref]

15. Thakor, P. (2023). Lightweight cryptography for resource-constrained IoT devices: A study on AUM algorithm. International Journal of IoT Security, 12(4), 45–61. [Google Scholar] [Crossref]

16. Wang, R., & Li, Q. (2021). A performance evaluation of cryptographic protocols in resource-limited IoT applications. IEEE Transactions on Information Forensics and Security, 16, 1500–1512. https://doi.org/10.1109/TIFS.2021.3064793 [Google Scholar] [Crossref]

17. Zhang, H., Li, P., & Chen, G. (2023). Secure data transmission protocols in IoT: An evaluation of hashing algorithms for cryptographic security. Journal of Cryptographic Research, 18(6), 678–695. [Google Scholar] [Crossref]

Metrics

Views & Downloads

Similar Articles