Advanced Cryptographic Techniques for Securing AI-Driven IoT Systems
DOI:
https://doi.org/10.32628/CSEIT25111686Keywords:
Artificial Intelligence (AI), Internet of Things (IoT), Artificial Intelligence of Things (AIoT), Cryptographic techniques, AIoT architecturesAbstract
The convergence of Artificial Intelligence (AI) and Internet of Things (IOT) has inspired the emergence of artificial intelligence (AIOT) of things, a paradigm that integrates intelligent algorithms with interconnected equipment. While AIOT provides significant progress in automation and data processing, it introduces adequate safety challenges due to the transmission and processing of vast amounts of sensitive data. This research paper examines various cryptographic techniques that can be employed to increase security in the AIOT system. We analyze the weaknesses contained in AIOT architecture, discuss the role of cryptography in reducing these risks, and propose a framework to apply a strong cryptographic solution to the AIOT environment.
📊 Article Downloads
References
F. Thabit, O. Can, A. O. Aljahdali, G. H. Al-Gaphari, and H. A. Alkhzaimi, "Cryptography Algorithms for Enhancing IoT Security," Internet of Things, vol. 22, p. 100759, 2023, doi: 10.1016/j.iot.2023.100759. DOI: https://doi.org/10.1016/j.iot.2023.100759
Dritsas, E., & Trigka, M. (2025). A Survey on Cybersecurity in IoT. Future Internet, 17(1), 30. https://doi.org/10.3390/fi17010030 DOI: https://doi.org/10.3390/fi17010030
Silva, C., Cunha, V.A., Barraca, J.P. et al. Analysis of the Cryptographic Algorithms in IoT Communications. Inf Syst Front 26, 1243–1260 (2024). https://doi.org/10.1007/s10796-023-10383-9 DOI: https://doi.org/10.1007/s10796-023-10383-9
El-Sofany, H., El-Seoud, S.A., Karam, O.H. et al. Using machine learning algorithms to enhance IoT system security. Sci Rep 14, 12077 (2024). https://doi.org/10.1038/s41598-024-62861-y. DOI: https://doi.org/10.1038/s41598-024-62861-y
A. J. Akinboboye, A. S. Oluwole, O. Akinsanmi, and A. E. Amoran, "Cryptographic Algorithms for IoT Privacy: A Technical Review," International Journal of Engineering Trends and Technology, vol. 70, no. 8, pp. 185–193, Aug. 2022, doi: 10.14445/22315381/IJETT-V70I8P219. DOI: https://doi.org/10.14445/22315381/IJETT-V70I8P219
J. Durand, "Securing IoT communications with advanced cryptographic solutions," Forbes Technology Council, Forbes, [Online]. Available: https://www.forbes.com/sites/forbestechcouncil/2023/ (accessed Aug. 18, 2025).
Zhang, Y., & Wang, X. (2023). Lightweight Cryptography for IoT Devices: A Survey. Journal of Information Security and Applications, 68, 103-115.
Liu, J., & Chen, Y. (2023). Homomorphic Encryption for Privacy-Preserving Machine Learning in IoT. IEEE Transactions on Information Forensics and Security, 18, 234-245.
D. Commey, B. Mai, S. G. Hounsinou, and G. V. Crosby, "Securing Blockchain-Based IoT Systems: A Review," IEEE Access, vol. 12, pp. 87012–87035, Jul. 2024, doi: 10.1109/ACCESS.2024.3428490. DOI: https://doi.org/10.1109/ACCESS.2024.3428490
Yang, Y., & Li, Z. (2023). Secure Multi-Party Computation for Collaborative AI in IoT. ACM Transactions on Internet Technology, 23(2), 1-20. DOI: https://doi.org/10.1145/3594538
Mohit Sewak, Ph.D. (2025). Homomorphic Encryption for AI: The Ultimate Guide to Confidential ... https://medium.com/google-cloud/homomorphic-encryption-47c353aed635
Jeremy Bradley-Silverio Donato. (2024). Why the Generative AI boom is driving Fully Homomorphic Encryption. https://aibusiness.com/cybersecurity/why-the-generative-ai-boom-is-driving-fully-homomorphic-encryption
RocketMe Up Cybersecurity. (2024). Secure Multi-Party Computation (SMPC) — How Cryptography is https://medium.com/@RocketMeUpCybersecurity/secure-multi-party-computation-how-cryptography-is-changing-data-sharing-164e09b9e642
Thapliyal, S.; Wazid, M.; Singh, D.P.; Chauhan, R.; Mishra, A.K.; Das, A.K. Secure Artificial Intelligence of Things (AIoT)-enabled authenticated key agreement technique for smart living environment. Comput. Electr. Eng. 2024, 118, https://doi.org/10.1016/j.compeleceng.2024.109353. DOI: https://doi.org/10.1016/j.compeleceng.2024.109353
Nozari, H., Szmelter-Jarosz, A., & Ghahremani-Nahr, J. (2022). Analysis of the Challenges of Artificial Intelligence of Things (AIoT) for the Smart Supply Chain (Case Study: FMCG Industries). Sensors (Basel, Switzerland), 22(8), 2931. https://doi.org/10.3390/s22082931 DOI: https://doi.org/10.3390/s22082931
Mary K. Pratt. (2021). Learn the basics of cryptography in IoT - TechTarget. https://www.techtarget.com/iotagenda/tip/Learn-the-basics-of-cryptography-in-IoT
Terry Olaes. (2025). Top IoT Security Challenges and Best Practices | Balbix. https://www.balbix.com/insights/addressing-iot-security-challenges/
Hadas Spektor. (2024). Top 10 IoT Vulnerabilities and How to Mitigate Them. https://sternumiot.com/iot-blog/top-10-iot-vulnerabilities-and-how-to-mitigate-them/
Sneka. (2024). Strengthening AIoT: Key Cybersecurity Considerations - GBHackers. https://gbhackers.com/strengthening-aiot-key-cybersecurity-considerations/
B. M. Sai and M. Bhatia, "A Survey on IoT Security Using Cryptographic Algorithms," in E3S Web of Conferences, vol. 453, Art. no. 01048, 2023, doi: 10.1051/e3sconf/202345301048. DOI: https://doi.org/10.1051/e3sconf/202345301048
Mary K. Pratt. (2021). Learn the basics of cryptography in IoT - TechTarget. https://www.techtarget.com/iotagenda/tip/Learn-the-basics-of-cryptography-in-IoT
K. Reaz and G. Wunder, "A Comprehensive Framework for Building Highly Secure, Network-Connected Devices: Chip to App," arXiv preprint, arXiv:2501.13716 [cs.NI], Jan. 2025, doi: 10.48550/arXiv.2501.13716.
Andrii Stanko, Oleksii Duda, Andrii Mykytyshyn, Oleg Totosko, and Rostyslav Koroliuk, "Artificial Intelligence of Things (AIoT): Integration Challenges, and Security Issues," in Proceedings of the BAIT 2024: The 1st International Workshop on Bioinformatics and Applied Information Technologies (BAIT’2024), Zboriv, Ukraine, 2024, pp. 92–105. CEUR-WSDBLPhttps://ceur-ws.org/Vol-3842/paper6.pdf
Romi Minin Digital Marketing Manager. (2024). Man in the Middle Attack Tools - Comprehensive Guide - Sepio. https://sepiocyber.com/blog/man-in-the-middle-attack/
What Is a Man-in-the Middle (MITM) Attack? Types & Examples. (2024). https://www.fortinet.com/resources/cyberglossary/man-in-the-middle-attack
Louise José. (2024). Mitigating IoT Denial of Service Attacks: Essential Strategies for ... https://deviceauthority.com/mitigating-iot-denial-of-service-attacks-essential-strategies-for-protection/
Synchronizing real-time and high-precision LDoS defense of ... (n.d.). https://www.sciencedirect.com/science/article/abs/pii/S1084804524000936
Alessandro Mascellino. (2025). Exclusive: Massive IoT Data Breach Exposes 2.7 Billion Records. https://www.infosecurity-magazine.com/news/iot-data-breach-exposes-27-billion/
el Gaabouri, Ismail & Senhadji, Mohamed & Belkasmi, Mostafa. (2022). A Survey on Lightweight Cryptography Approach For IoT Devices Security. 1-8. 10.1109/NISS55057.2022.10085144. DOI: https://doi.org/10.1109/NISS55057.2022.10085144
Downloads
Published
Issue
Section
License
Copyright (c) 2025 International Journal of Scientific Research in Computer Science, Engineering and Information Technology

This work is licensed under a Creative Commons Attribution 4.0 International License.