Open Access iconOpen Access

ARTICLE

crossmark

End-To-End Encryption Enabled Lightweight Mutual Authentication Scheme for Resource Constrained IoT Network

Shafi Ullah1,*, Haidawati Muhammad Nasir2, Kushsairy Kadir3,*, Akbar Khan1, Ahsanullah Memon4, Shanila Azhar1, Ilyas Khan5, Muhammad Ashraf1

1 Department of Computer Engineering, Balochistan University of Information Technology, Engineering and Management Sciences, Quetta, 87300, Pakistan
2 Computer Engineering Section Malaysian Institute of Technology, Universiti Kuala Lumpur, Kuala Lumpur, 50250, Malaysia
3 Electrical Engineering Section, Universiti Kuala Lumpur, British Malaysian Institute, Salengor, 53100, Malaysia
4 Electrical Engineering Department, Mehran University, Khairpur-Mirs, 76062, Pakistan
5 Department of Mathematics, College of Science Al-Zulfi, Majmaah University, Al-Majmaah, 11952, Saudi Arabia

* Corresponding Authors: Shafi Ullah. Email: email; Kushsairy Kadir. Email: email

Computers, Materials & Continua 2025, 82(2), 3223-3249. https://doi.org/10.32604/cmc.2024.054676

Abstract

Machine-to-machine (M2M) communication networks consist of resource-constrained autonomous devices, also known as autonomous Internet of things (IoTs) or machine-type communication devices (MTCDs) which act as a backbone for Industrial IoT, smart cities, and other autonomous systems. Due to the limited computing and memory capacity, these devices cannot maintain strong security if conventional security methods are applied such as heavy encryption. This article proposed a novel lightweight mutual authentication scheme including elliptic curve cryptography (ECC) driven end-to-end encryption through curve25519 such as (i): efficient end-to-end encrypted communication with pre-calculation strategy using curve25519; and (ii): elliptic curve Diffie-Hellman (ECDH) based mutual authentication technique through a novel lightweight hash function. The proposed scheme attempts to efficiently counter all known perception layer security threats. Moreover, the pre-calculated key generation strategy resulted in cost-effective encryption with 192-bit curve security. It showed comparative efficiency in key strength, and curve strength compared with similar authentication schemes in terms of computational and memory cost, communication performance and encryption robustness.

Keywords

Mutual authentication; lightweight end-to-end encryption; elliptic curve cryptography; industrial internet of things; curve25519; machine-to-machine communication

Cite This Article

APA Style
Ullah, S., Nasir, H.M., Kadir, K., Khan, A., Memon, A. et al. (2025). End-To-End Encryption Enabled Lightweight Mutual Authentication Scheme for Resource Constrained IoT Network. Computers, Materials & Continua, 82(2), 3223–3249. https://doi.org/10.32604/cmc.2024.054676
Vancouver Style
Ullah S, Nasir HM, Kadir K, Khan A, Memon A, Azhar S, et al. End-To-End Encryption Enabled Lightweight Mutual Authentication Scheme for Resource Constrained IoT Network. Comput Mater Contin. 2025;82(2):3223–3249. https://doi.org/10.32604/cmc.2024.054676
IEEE Style
S. Ullah et al., “End-To-End Encryption Enabled Lightweight Mutual Authentication Scheme for Resource Constrained IoT Network,” Comput. Mater. Contin., vol. 82, no. 2, pp. 3223–3249, 2025. https://doi.org/10.32604/cmc.2024.054676



cc Copyright © 2025 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 431

    View

  • 222

    Download

  • 0

    Like

Share Link