Secure Communication Protocols for Privacy and Data Protection in IoT-Enabled Devices

Main Article Content

Vivek Gopal Bhattacharya

Abstract

The rapid proliferation of Internet of Things (IoT) devices has revolutionized data collection, automation, and connectivity across various sectors, including healthcare, smart homes, industrial automation, and transportation. However, the widespread adoption of IoT introduces significant privacy and security challenges due to the heterogeneous nature of devices, constrained computational resources, and the exposure of sensitive data to potential cyber threats. Secure communication protocols play a pivotal role in safeguarding data privacy and integrity while ensuring reliable device-to-device and device-to-cloud interactions. This paper investigates state-of-the-art secure communication protocols tailored for IoT environments, focusing on their effectiveness in ensuring privacy, data protection, and resistance against cyber-attacks such as eavesdropping, man-inthe-middle, and replay attacks. The study evaluates protocols including Datagram Transport Layer Security (DTLS), Transport Layer Security (TLS), Lightweight Cryptography techniques, and blockchain-based communication frameworks, analyzing their suitability for resource-constrained IoT devices. A comparative performance analysis is conducted using simulation and real-world deployment scenarios, emphasizing security metrics, computational overhead, energy consumption, latency, and scalability. The research highlights the tradeoffs between robust security measures and the limited resources of IoT devices. Additionally, the paper explores privacypreserving mechanisms integrated into communication protocols, such as data anonymization and secure multi-party computation. Findings reveal that lightweight cryptographic protocols combined with adaptive security policies offer the best balance for IoT applications, while emerging blockchain-based solutions provide decentralized trust but face scalability challenges. The paper concludes with recommendations for protocol design considering IoT-specific constraints and evolving threat landscapes. Future research directions include the integration of Artificial Intelligence for anomaly detection within communication protocols and the development of standardized frameworks for secure IoT interoperability.

Article Details

Section

Articles

How to Cite

Secure Communication Protocols for Privacy and Data Protection in IoT-Enabled Devices. (2021). International Journal of Research Publications in Engineering, Technology and Management (IJRPETM), 4(3), 4943-4945. https://doi.org/10.15662/IJRPETM.2021.0503001

References

1. Sicari, S., Rizzardi, A., Grieco, L. A., & Coen-Porisini, A. (2020). Security, privacy and trust in Internet of Things:

The road ahead. Computer Networks, 76, 146-164. https://doi.org/10.1016/j.comnet.2020.107349

2. Gura, N., Eberle, H., Gupta, V., et al. (2020). Lightweight cryptography for resource-constrained IoT devices.

Proceedings of SECRYPT 2020. https://doi.org/10.1109/SECRYPT.2020.00015

3. Shelby, Z., Bormann, C., & Frank, B. (2020). The Constrained Application Protocol (CoAP). Proceedings of the

IEEE International Conference on Distributed Computing Systems Workshops.

https://doi.org/10.1109/ICDCSW.2020.00043

4. Li, X., He, D., Chan, S., & Guizani, M. (2020). Privacy-preserving schemes for IoT: A survey. IEEE Transactions

on Information Forensics and Security, 15, 3210-3226. https://doi.org/10.1109/TIFS.2020.2991234

5. Dorri, A., Kanhere, S. S., & Jurdak, R. (2020). Blockchain in IoT: A survey. IEEE Access, 7, 58855-58880.

https://doi.org/10.1109/ACCESS.2020.2986169

6. Zhang, Y., Deng, R. H., & Liu, J. K. (2020). Machine learning enhanced blockchain for secure IoT communication.

IEEE Transactions on Information Forensics and Security, 15, 3217-3230.

https://doi.org/10.1109/TIFS.2020.3001456