Advanced Cryptographic Techniques for Securing AI-Driven IoT Systems

Authors

  • Dr. Falguni Suthar Acharya Motibhai Patel Institute of Computer Studies, Ganpat University, Mehsana, Gujarat, India Author
  • Ms. Hiralben Patel Acharya Motibhai Patel Institute of Computer Studies, Ganpat University, Mehsana, Gujarat, India Author
  • Dr. Bhavesh Patel Acharya Motibhai Patel Institute of Computer Studies, Ganpat University, Mehsana, Gujarat, India Author

DOI:

https://doi.org/10.32628/CSEIT25111686

Keywords:

Artificial Intelligence (AI), Internet of Things (IoT), Artificial Intelligence of Things (AIoT), Cryptographic techniques, AIoT architectures

Abstract

The convergence of Artificial Intelligence (AI) and Internet of Things (IOT) has inspired the emergence of artificial intelligence (AIOT) of things, a paradigm that integrates intelligent algorithms with interconnected equipment. While AIOT provides significant progress in automation and data processing, it introduces adequate safety challenges due to the transmission and processing of vast amounts of sensitive data. This research paper examines various cryptographic techniques that can be employed to increase security in the AIOT system. We analyze the weaknesses contained in AIOT architecture, discuss the role of cryptography in reducing these risks, and propose a framework to apply a strong cryptographic solution to the AIOT environment.

📊 Article Downloads

References

F. Thabit, O. Can, A. O. Aljahdali, G. H. Al-Gaphari, and H. A. Alkhzaimi, "Cryptography Algorithms for Enhancing IoT Security," Internet of Things, vol. 22, p. 100759, 2023, doi: 10.1016/j.iot.2023.100759. DOI: https://doi.org/10.1016/j.iot.2023.100759

Dritsas, E., & Trigka, M. (2025). A Survey on Cybersecurity in IoT. Future Internet, 17(1), 30. https://doi.org/10.3390/fi17010030 DOI: https://doi.org/10.3390/fi17010030

Silva, C., Cunha, V.A., Barraca, J.P. et al. Analysis of the Cryptographic Algorithms in IoT Communications. Inf Syst Front 26, 1243–1260 (2024). https://doi.org/10.1007/s10796-023-10383-9 DOI: https://doi.org/10.1007/s10796-023-10383-9

El-Sofany, H., El-Seoud, S.A., Karam, O.H. et al. Using machine learning algorithms to enhance IoT system security. Sci Rep 14, 12077 (2024). https://doi.org/10.1038/s41598-024-62861-y. DOI: https://doi.org/10.1038/s41598-024-62861-y

A. J. Akinboboye, A. S. Oluwole, O. Akinsanmi, and A. E. Amoran, "Cryptographic Algorithms for IoT Privacy: A Technical Review," International Journal of Engineering Trends and Technology, vol. 70, no. 8, pp. 185–193, Aug. 2022, doi: 10.14445/22315381/IJETT-V70I8P219. DOI: https://doi.org/10.14445/22315381/IJETT-V70I8P219

J. Durand, "Securing IoT communications with advanced cryptographic solutions," Forbes Technology Council, Forbes, [Online]. Available: https://www.forbes.com/sites/forbestechcouncil/2023/ (accessed Aug. 18, 2025).

Zhang, Y., & Wang, X. (2023). Lightweight Cryptography for IoT Devices: A Survey. Journal of Information Security and Applications, 68, 103-115.

Liu, J., & Chen, Y. (2023). Homomorphic Encryption for Privacy-Preserving Machine Learning in IoT. IEEE Transactions on Information Forensics and Security, 18, 234-245.

D. Commey, B. Mai, S. G. Hounsinou, and G. V. Crosby, "Securing Blockchain-Based IoT Systems: A Review," IEEE Access, vol. 12, pp. 87012–87035, Jul. 2024, doi: 10.1109/ACCESS.2024.3428490. DOI: https://doi.org/10.1109/ACCESS.2024.3428490

Yang, Y., & Li, Z. (2023). Secure Multi-Party Computation for Collaborative AI in IoT. ACM Transactions on Internet Technology, 23(2), 1-20. DOI: https://doi.org/10.1145/3594538

Mohit Sewak, Ph.D. (2025). Homomorphic Encryption for AI: The Ultimate Guide to Confidential ... https://medium.com/google-cloud/homomorphic-encryption-47c353aed635

Jeremy Bradley-Silverio Donato. (2024). Why the Generative AI boom is driving Fully Homomorphic Encryption. https://aibusiness.com/cybersecurity/why-the-generative-ai-boom-is-driving-fully-homomorphic-encryption

RocketMe Up Cybersecurity. (2024). Secure Multi-Party Computation (SMPC) — How Cryptography is https://medium.com/@RocketMeUpCybersecurity/secure-multi-party-computation-how-cryptography-is-changing-data-sharing-164e09b9e642

Thapliyal, S.; Wazid, M.; Singh, D.P.; Chauhan, R.; Mishra, A.K.; Das, A.K. Secure Artificial Intelligence of Things (AIoT)-enabled authenticated key agreement technique for smart living environment. Comput. Electr. Eng. 2024, 118, https://doi.org/10.1016/j.compeleceng.2024.109353. DOI: https://doi.org/10.1016/j.compeleceng.2024.109353

Nozari, H., Szmelter-Jarosz, A., & Ghahremani-Nahr, J. (2022). Analysis of the Challenges of Artificial Intelligence of Things (AIoT) for the Smart Supply Chain (Case Study: FMCG Industries). Sensors (Basel, Switzerland), 22(8), 2931. https://doi.org/10.3390/s22082931 DOI: https://doi.org/10.3390/s22082931

Mary K. Pratt. (2021). Learn the basics of cryptography in IoT - TechTarget. https://www.techtarget.com/iotagenda/tip/Learn-the-basics-of-cryptography-in-IoT

Terry Olaes. (2025). Top IoT Security Challenges and Best Practices | Balbix. https://www.balbix.com/insights/addressing-iot-security-challenges/

Hadas Spektor. (2024). Top 10 IoT Vulnerabilities and How to Mitigate Them. https://sternumiot.com/iot-blog/top-10-iot-vulnerabilities-and-how-to-mitigate-them/

Sneka. (2024). Strengthening AIoT: Key Cybersecurity Considerations - GBHackers. https://gbhackers.com/strengthening-aiot-key-cybersecurity-considerations/

B. M. Sai and M. Bhatia, "A Survey on IoT Security Using Cryptographic Algorithms," in E3S Web of Conferences, vol. 453, Art. no. 01048, 2023, doi: 10.1051/e3sconf/202345301048. DOI: https://doi.org/10.1051/e3sconf/202345301048

Mary K. Pratt. (2021). Learn the basics of cryptography in IoT - TechTarget. https://www.techtarget.com/iotagenda/tip/Learn-the-basics-of-cryptography-in-IoT

K. Reaz and G. Wunder, "A Comprehensive Framework for Building Highly Secure, Network-Connected Devices: Chip to App," arXiv preprint, arXiv:2501.13716 [cs.NI], Jan. 2025, doi: 10.48550/arXiv.2501.13716.

Andrii Stanko, Oleksii Duda, Andrii Mykytyshyn, Oleg Totosko, and Rostyslav Koroliuk, "Artificial Intelligence of Things (AIoT): Integration Challenges, and Security Issues," in Proceedings of the BAIT 2024: The 1st International Workshop on Bioinformatics and Applied Information Technologies (BAIT’2024), Zboriv, Ukraine, 2024, pp. 92–105. CEUR-WSDBLPhttps://ceur-ws.org/Vol-3842/paper6.pdf

Romi Minin Digital Marketing Manager. (2024). Man in the Middle Attack Tools - Comprehensive Guide - Sepio. https://sepiocyber.com/blog/man-in-the-middle-attack/

What Is a Man-in-the Middle (MITM) Attack? Types & Examples. (2024). https://www.fortinet.com/resources/cyberglossary/man-in-the-middle-attack

Louise José. (2024). Mitigating IoT Denial of Service Attacks: Essential Strategies for ... https://deviceauthority.com/mitigating-iot-denial-of-service-attacks-essential-strategies-for-protection/

Synchronizing real-time and high-precision LDoS defense of ... (n.d.). https://www.sciencedirect.com/science/article/abs/pii/S1084804524000936

Alessandro Mascellino. (2025). Exclusive: Massive IoT Data Breach Exposes 2.7 Billion Records. https://www.infosecurity-magazine.com/news/iot-data-breach-exposes-27-billion/

el Gaabouri, Ismail & Senhadji, Mohamed & Belkasmi, Mostafa. (2022). A Survey on Lightweight Cryptography Approach For IoT Devices Security. 1-8. 10.1109/NISS55057.2022.10085144. DOI: https://doi.org/10.1109/NISS55057.2022.10085144

Downloads

Published

22-08-2025

Issue

Section

Research Articles

How to Cite

[1]
Dr. Falguni Suthar, Ms. Hiralben Patel, and Dr. Bhavesh Patel, “Advanced Cryptographic Techniques for Securing AI-Driven IoT Systems”, Int. J. Sci. Res. Comput. Sci. Eng. Inf. Technol, vol. 11, no. 4, pp. 392–406, Aug. 2025, doi: 10.32628/CSEIT25111686.