ISSN: 2245-4578 (Online Version) ISSN:2245-1439 (Print Version)
Research on a Lightweight SM4 Algorithm-Driven Secure Communication Mechanism for Communication Links
PDF
HTML

Keywords

lightweight encryption
communication security mechanism
SM4 optimization
embedded system
link adaptation

How to Cite

[1]
X. . Tang, “Research on a Lightweight SM4 Algorithm-Driven Secure Communication Mechanism for Communication Links”, JCSANDM, vol. 15, no. 02, pp. 415–442, Apr. 2026.

Abstract

Secure communication for resource-constrained embedded devices must simultaneously satisfy cryptographic compliance, low-latency transmission, and robustness against link disturbances, which makes lightweight deployment of national cryptographic algorithms a critical issue in edge and industrial communication systems. To address this problem, a lightweight SM4-based communication security mechanism is developed for heterogeneous embedded links. The proposed method integrates S-box structure compression, round-function optimization, key-scheduling reconstruction, module trimming, and interface adaptation to construct an efficient encryption/decryption framework that supports UART, CAN, and BLE communication environments. The significance of this study lies not only in reducing the computational and storage burden of SM4, but also in enabling practical deployment of a national-standard encryption mechanism in low-power, real-time, multi-interface embedded platforms. Experimental results on the STM32L432KC platform show that, under the BLE link, the proposed scheme achieves an average encryption latency of 165.8 μs and a throughput of 8.42 KB/s. Compared with existing SM4 and AES implementations, the method provides better delay-throughput performance while maintaining strong anti-interference capability and state-recovery resilience under multiple attack and error-injection scenarios. These results indicate that the proposed mechanism is suitable for secure communication tasks requiring both lightweight implementation and link-level adaptability in embedded systems.

https://doi.org/10.13052/jcsm2245-1439.1526
PDF
HTML

References

Chen X, Li B, Zhou Q. Lightweight and High-Performance Data Protection for Edge Network Security[J]. Wireless Communications and Mobile Computing, 2022, 2022(1): 8458314.

Goulart A, Chennamaneni A, Torre D, et al. On wide-area IoT networks, lightweight security and their applications—a practical review[J]. Electronics, 2022, 11(11): 1762.

Justindhas Y, Jeyanthi P. Secured model for internet of things (IoT) to monitor smart field data with integrated real-time cloud using lightweight cryptography[J]. IETE Journal of Research, 2023, 69(8): 5134–5147.

Wang J. Identification of SQL Injection Security Vulnerabilities in Web applications Based on Binary Code Similarity. Journal of Cyber Security and Mobility, 2024, 13(6): 1239–1262. DOI: 10.13052/jcsm2245-1439.1361.

Zhang H, Meng F, Wang Q. Computer Network Security System Optimization Based on Improved Neural Network Algorithm and Data Search. Journal of Cyber Security and Mobility, 2025, 14(1): 75–100. DOI: 10.13052/jcsm2245-1439.1414.

Kumar S, Kumar D, Dangi R, et al. A review of lightweight security and privacy for resource-constrained IoT devices[J]. Computers, Materials and Continua, 2024, 78(1): 31–63.

El Hanine M, El-Yahyaoui A, Es-Sadaoui R. Design and assessment of lightweight cryptographic algorithms on ESP32 and STM32 for IoD security[J]. Egyptian Informatics Journal, 2025, 32: 100818.

Le X, Li J, Zhao Y, et al. A Security-Enhanced Scheme for ModBus TCP Protocol Based on Lightweight Cryptographic Algorithm[J]. Electronics, 2025, 14(18): 3674.

Wang Y, Xu Y, Liu Z, et al. Research on Lightweight Dynamic Security Protocol for Intelligent In-Vehicle CAN Bus[J]. Sensors, 2025, 25(11): 3380.

Li X, Li M, Xu L, et al. Lightweight identity authentication and key agreement scheme for VANETs based on SSL-PUF[J]. Scientific Reports, 2025, 15(1): 21469.

Chen Y, Ou W, Pang M, et al. A cross-chain model for warehouse receipts in port supply chain based on notary mechanism and ShangMi cryptographic algorithms[J]. Scientific Reports, 2025, 15(1): 14390.

Sevin A, Mohammed A A O. A survey on software implementation of lightweight block ciphers for IoT devices[J]. Journal of Ambient Intelligence and Humanized Computing, 2023, 14(3): 1801–1815.

Islam N, Rahman M S, Mahmud I, et al. A blockchain-enabled distributed advanced metering infrastructure secure communication (BC-AMI)[J]. Applied Sciences, 2022, 12(14): 7274.

Samanth S, KV P, Balachandra M. Security in internet of drones: A comprehensive review[J]. Cogent Engineering, 2022, 9(1): 2029080.

Sutar S, Mekala P, Kameswari U S. Secured IoT node design through protected ITULES family group-II (ULWC) implementation against physical attacks for ubiquitous computing[J]. International Journal of Embedded Systems, 2023, 16(4): 288–311.

Zakaria A A, Ab Halim A H, Ridzuan F, et al. LAO-3D: A symmetric lightweight block cipher based on 3d permutation for mobile encryption application[J]. Symmetry, 2022, 14(10): 2042.

Sim M, Eum S, Kwon H, et al. Optimized Implementation of Simpira on Microcontrollers for Secure Massive Learning[J]. Symmetry, 2022, 14(11): 2377.

Papaioannou C, Dimara A, Papaioannou A, et al. Hierarchical Resources Management System for Internet of Things-Enabled Smart Cities[J]. Sensors, 2025, 25(3): 616.

Khan N A, Jhanjhi N Z, Brohi S N, et al. A secure communication protocol for unmanned aerial vehicles[J]. CMC-Computers Materials & Continua, 2022, 70(1): 601–618.

Sun Q, Lin K, Si C, et al. A secure and anonymous communicate scheme over the internet of things[J]. ACM Transactions on Sensor Networks (TOSN), 2022, 18(3): 1–21.

Du H, Wang J, Niyato D, et al. Rethinking wireless communication security in semantic Internet of Things[J]. IEEE Wireless Communications, 2023, 30(3): 36–43.

Bondada P, Samanta D, Kaur M, et al. Data security-based routing in MANETs using key management mechanism[J]. Applied Sciences, 2022, 12(3): 1041.

Illi E, Qaraqe M, Althunibat S, et al. Physical layer security for authentication, confidentiality, and malicious node detection: A paradigm shift in securing IoT networks[J]. IEEE Communications Surveys & Tutorials, 2023, 26(1): 347–388.

Ying Z, Wang K, Xiong J, et al. A literature review on V2X communications security: Foundation, solutions, status, and future[J]. IET Communications, 2024, 18(20): 1683–1715.

Cheng T, Wu Z, Wang C, et al. Research on vehicle-to-cloud communication based on lightweight authentication and extended quantum key distribution[J]. IEEE Transactions on Vehicular Technology, 2024, 73(8): 12082–12095.

Chai S, Yin H, Xing B, et al. Provably secure and lightweight authentication key agreement scheme for smart meters[J]. IEEE Transactions on Smart Grid, 2023, 14(5): 3816–3827.

Creative Commons License

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.

Copyright (c) 2026 Journal of Cyber Security and Mobility

Downloads

Download data is not yet available.