Abstract
In the face of increasingly complex IoT environments and increasing data volumes, existing encryption algorithms still need to be further optimized in terms of the balance between efficiency and security. For embedded systems, their hardware resources are limited, and the current optimization strategies still have shortcomings in improving system performance, reducing power consumption and enhancing system stability. In this study, the optimization strategy of encryption algorithm and embedded system based on IoT security is studied. Designed for lightweight encryption algorithms and deployed in embedded systems, it aims to balance the security and performance of IoT devices and provide users with a seamless and reliable service experience. In this study, three encryption algorithms, AES-Light, SPECK and SIMON, were selected and compared on ARM Cortex-M series microcontrollers. Experiments show that the SPECK algorithm leads with its excellent encryption and decryption rate, which is 15% faster than AES-Light, while the power consumption of SIMON is reduced by 20%. Based on this, preferred encryption schemes suitable for different IoT scenarios are established. In addition, in order to overcome the limitation of fixed encryption settings in a dynamic network environment, this project proposes an adaptive encryption strength adjustment strategy. By monitoring the risk level of the equipment in real-time and automatically optimizing the encryption parameters, the security guarantee is improved by 30% in high-risk situations while avoiding unnecessary computing overhead in low-risk scenarios, improving the overall efficiency by more than 15%, and significantly enhancing the intelligence and adaptability of IoT systems.
References
C. P. Shirley et al., “IoT device type identification using training deep quantum neural networks optimized with a chimp optimization algorithm for enhancing IoT security,” Journal of High Speed Networks, vol. 30, no. 2, pp. 191–201, 2024.
Y. Ahn, M. Kim, J. Lee, Y. Shen, and J. Jeong, “IoT Edge-Cloud: An Internet-of-Things Edge-Empowered Cloud System for Device Management in Smart Spaces,” Ieee Network, vol. 38, no. 3, pp. 109–117, 2024.
R. R. Singh et al., “IoT embedded cloud-based intelligent power quality monitoring system for industrial drive application,” Future Generation Computer Systems-the International Journal of Escience, vol. 112, pp. 884–898, 2020.
B. S. Balaji, W. Paja, M. Antonijevic, C. Stoean, N. Bacanin, and M. Zivkovic, “IoT Integrated Edge Platform for Secure Industrial Application with Deep Learning,” Human-Centric Computing and Information Sciences, vol. 13, 2023.
Z. Huang, F. Qin, and Z. Li, “IoT integration of securable optical transmission using Paillier assisted advanced encryption standard,” Optical and Quantum Electronics, vol. 55, no. 13, 2023.
G. Zhao, C. Ren, J. Wang, Y. Huang, and H. Chen, “IoT intrusion detection model based on gated recurrent unit and residual network,” Peer-to-Peer Networking and Applications, vol. 16, no. 4, pp. 1887–1899, 2023.
S. M. Ali, A. S. Elameer, and M. M. Jaber, “IoT network security using autoencoder deep neural network and channel access algorithm,” Journal of Intelligent Systems, vol. 31, no. 1, pp. 95–103, 2021.
R. Jindal, N. Kumar, and S. Patidar, “IoT streamed data handling model using delta encoding,” International Journal of Communication Systems, vol. 35, no. 13, 2022.
A. Mpatziakas, A. Drosou, S. Papadopoulos, and D. Tzovaras, “IoT threat mitigation engine empowered by artificial intelligence multi-objective optimization,” Journal of Network and Computer Applications, vol. 203, 2022.
L. Tong, J. Zhou, and J. Li, “IoT-Based Low-Voltage Power Distribution System Management and Control Platform,” Frontiers in Energy Research, vol. 9, 2022.
B. Ahuja, R. Doriya, S. Salunke, M. F. Hashmi, and A. Gupta, “IoT-Based Multi-Dimensional Chaos Mapping System for Secure and Fast Transmission of Visual Data in Smart Cities,” Ieee Access, vol. 11, pp. 104930–104945, 2023.
B. Prasath and M. Akila, “IoT-based pest detection and classification using deep features with enhanced deep learning strategies,” Engineering Applications of Artificial Intelligence, vol. 121, 2023.
J. H. Chen, J. Reitz, R. Richstein, K. U. Schröder, and J. Rossmann, “IoT-Based SHM Using Digital Twins for Interoperable and Scalable Decentralized Smart Sensing Systems,” Information, vol. 15, no. 3, 2024.
B. A. Sassani, M. Alkorbi, N. Jamil, M. A. Naeem, and F. Mirza, “Evaluating Encryption Algorithms for Sensitive Data Using Different Storage Devices,” Scientific Programming, vol. 2020, 2020.
H.-C. Lin, F.-Y. Chou, Y.-X. Hong, and Y.-W. Wang, “Fast Elevator Vibration Signal Cloud Collection System Using Data Compression and Encryption Algorithms,” Sensors and Materials, vol. 34, no. 6, pp. 2311–2324, 2022.
Y. Yang, X. Xiong, Z. Liu, S. Jin, and J. Wang, “High-Performance Encryption Algorithms for Dynamic Images Transmission,” Electronics, vol. 13, no. 1, 2024.
M. Alanzy, R. Alomrani, B. Alqarni, and S. Almutairi, “Image Steganography Using LSB and Hybrid Encryption Algorithms,” Applied Sciences-Basel, vol. 13, no. 21, 2023.
N. Gupta, R. Vijay, and H. K. Gupta, “Performance Evaluation of Symmetrical Encryption Algorithms with Wavelet Based Compression Technique,” Eai Endorsed Transactions on Scalable Information Systems, vol. 7, no. 28, 2020.
L. Li, “Secure encryption algorithms for wireless sensor networks based on node trust value,” International Journal of Internet Protocol Technology, vol. 13, no. 3, pp. 117–123, 2020.
P. Fang, H. Liu, C. Wu, and M. Liu, “A survey of image encryption algorithms based on chaotic system,” Visual Computer, vol. 39, no. 5, pp. 1975–2003, 2023.
P. Li and K.-T. Lo, “Survey on JPEG compatible joint image compression and encryption algorithms,” Iet Signal Processing, vol. 14, no. 8, pp. 475–488, 2020.
R. Hamza et al., “Towards Secure Big Data Analysis via Fully Homomorphic Encryption Algorithms,” Entropy, vol. 24, no. 4, 2022.
Y. R. Musunuri, C. Kim, O. S. Kwon, and S. Y. Kung, “Object Detection Using ESRGAN With a Sequential Transfer Learning on Remote Sensing Embedded Systems,” Ieee Access, vol. 12, pp. 102313–102327, 2024.
T. S. Ajani, A. L. Imoize, and A. A. Atayero, “An Overview of Machine Learning within Embedded and Mobile Devices-Optimizations and Applications,” Sensors, vol. 21, no. 13, 2021.
R. Guo et al., “Physics Embedded Deep Neural Network for Solving Volume Integral Equation: 2-D Case,” Ieee Transactions on Antennas and Propagation, vol. 70, no. 8, pp. 6135–6147, 2022.
M. Ansari, S. Safari, N. Rohbani, A. Ejlali, and B. M. Al-Hashimi, “Power-Efficient and Aging-Aware Primary/Backup Technique for Heterogeneous Embedded Systems,” Ieee Transactions on Sustainable Computing, vol. 8, no. 4, pp. 715–726, 2023.
Y. Jung, H. Kim, Y. Choi, and L.-S. Kim, “Quantization-Error-Robust Deep Neural Network for Embedded Accelerators,” Ieee Transactions on Circuits and Systems Ii-Express Briefs, vol. 69, no. 2, pp. 609–613, 2022.
S. S. Nassar, O. S. Faragallah, and M. A. M. El-Bendary, “Reliable Mark-Embedded Algorithm for Verifying Archived/Encrypted Image Contents in Presence Different Attacks with FEC Utilizing Consideration,” Wireless Personal Communications, vol. 119, no. 1, pp. 37–61, 2021.
X. Zhang, Y. Liu, T. Qu, and P. Tang, “Research on Remote Online Firmware Upgrade System for Embedded Devices,” Journal of Internet Technology, vol. 23, no. 7, pp. 1587–1596, 2022.
P. Chaudhary, B. B. Gupta, and A. K. Singh, “Securing heterogeneous embedded devices against XSS attack in intelligent IoT system,” Computers & Security, vol. 118, 2022.

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
Copyright (c) 2025 Journal of Cyber Security and Mobility
