Enhancing Security for Resource-Constrained Smart Cities IoT Applications: Optimizing Cryptographic Techniques with Effective Field Multipliers

The broadening adoption of interconnected systems within smart city environments is fundamental for the progression of digitally driven economies, enabling the refinement of city administration, the enhancement of public service delivery, and the fostering of ecologically sustainable progress, there...

Full description

Saved in:
Bibliographic Details
Main Authors: Atef Ibrahim, Fayez Gebali
Format: Article
Language:English
Published: MDPI AG 2025-06-01
Series:Cryptography
Subjects:
Online Access:https://www.mdpi.com/2410-387X/9/2/37
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1849433442742173696
author Atef Ibrahim
Fayez Gebali
author_facet Atef Ibrahim
Fayez Gebali
author_sort Atef Ibrahim
collection DOAJ
description The broadening adoption of interconnected systems within smart city environments is fundamental for the progression of digitally driven economies, enabling the refinement of city administration, the enhancement of public service delivery, and the fostering of ecologically sustainable progress, thereby aligning with global sustainability benchmarks. However, the pervasive distribution of Internet of things (IoT) apparatuses introduces substantial security risks, attributable to the confidential nature of processed data and the heightened susceptibility to cybernetic intrusions targeting essential infrastructure. Commonly, these devices exhibit deficiencies stemming from restricted computational capabilities and the absence of uniform security standards. The resolution of these security challenges is paramount for the full realization of the advantages afforded by IoT without compromising system integrity. Cryptographic protocols represent the most viable solutions for the mitigation of these security vulnerabilities. However, the limitations inherent in IoT edge nodes complicate the deployment of robust cryptographic algorithms, which are fundamentally reliant on finite-field multiplication operations. Consequently, the streamlined execution of this operation is pivotal, as it will facilitate the effective deployment of encryption algorithms on these resource-limited devices. Therefore, the presented research concentrates on the formulation of a spatially and energetically efficient hardware implementation for the finite-field multiplication operation. The proposed arithmetic unit demonstrates significant improvements in hardware efficiency and energy consumption compared to state-of-the-art designs, while its systolic architecture provides inherent timing-attack resistance through deterministic operation. The regular structure not only enables these performance advantages but also facilitates future integration of error-detection and masking techniques for comprehensive side-channel protection. This combination of efficiency and security makes the multiplier particularly suitable for integration within encryption processors in resource-constrained IoT edge nodes, where it can enable secure data communication in smart city applications without compromising operational effectiveness or urban development goals.
format Article
id doaj-art-c519ca0a9bd541b9afa3bf1904c62b5d
institution Kabale University
issn 2410-387X
language English
publishDate 2025-06-01
publisher MDPI AG
record_format Article
series Cryptography
spelling doaj-art-c519ca0a9bd541b9afa3bf1904c62b5d2025-08-20T03:27:01ZengMDPI AGCryptography2410-387X2025-06-01923710.3390/cryptography9020037Enhancing Security for Resource-Constrained Smart Cities IoT Applications: Optimizing Cryptographic Techniques with Effective Field MultipliersAtef Ibrahim0Fayez Gebali1Department of Computer Engineering, College of Computer Engineering and Sciences, Prince Sattam Bin Abdulaziz University, Al-Kharj 16278, Saudi ArabiaDepartment of Electrical and Computer Engineering, University of Victoria, Victoria, BC V8P 5C2, CanadaThe broadening adoption of interconnected systems within smart city environments is fundamental for the progression of digitally driven economies, enabling the refinement of city administration, the enhancement of public service delivery, and the fostering of ecologically sustainable progress, thereby aligning with global sustainability benchmarks. However, the pervasive distribution of Internet of things (IoT) apparatuses introduces substantial security risks, attributable to the confidential nature of processed data and the heightened susceptibility to cybernetic intrusions targeting essential infrastructure. Commonly, these devices exhibit deficiencies stemming from restricted computational capabilities and the absence of uniform security standards. The resolution of these security challenges is paramount for the full realization of the advantages afforded by IoT without compromising system integrity. Cryptographic protocols represent the most viable solutions for the mitigation of these security vulnerabilities. However, the limitations inherent in IoT edge nodes complicate the deployment of robust cryptographic algorithms, which are fundamentally reliant on finite-field multiplication operations. Consequently, the streamlined execution of this operation is pivotal, as it will facilitate the effective deployment of encryption algorithms on these resource-limited devices. Therefore, the presented research concentrates on the formulation of a spatially and energetically efficient hardware implementation for the finite-field multiplication operation. The proposed arithmetic unit demonstrates significant improvements in hardware efficiency and energy consumption compared to state-of-the-art designs, while its systolic architecture provides inherent timing-attack resistance through deterministic operation. The regular structure not only enables these performance advantages but also facilitates future integration of error-detection and masking techniques for comprehensive side-channel protection. This combination of efficiency and security makes the multiplier particularly suitable for integration within encryption processors in resource-constrained IoT edge nodes, where it can enable secure data communication in smart city applications without compromising operational effectiveness or urban development goals.https://www.mdpi.com/2410-387X/9/2/37smart citiessustainable development goals (SDGs)edge computingIoT security issuesprotected data transmissioncryptography
spellingShingle Atef Ibrahim
Fayez Gebali
Enhancing Security for Resource-Constrained Smart Cities IoT Applications: Optimizing Cryptographic Techniques with Effective Field Multipliers
Cryptography
smart cities
sustainable development goals (SDGs)
edge computing
IoT security issues
protected data transmission
cryptography
title Enhancing Security for Resource-Constrained Smart Cities IoT Applications: Optimizing Cryptographic Techniques with Effective Field Multipliers
title_full Enhancing Security for Resource-Constrained Smart Cities IoT Applications: Optimizing Cryptographic Techniques with Effective Field Multipliers
title_fullStr Enhancing Security for Resource-Constrained Smart Cities IoT Applications: Optimizing Cryptographic Techniques with Effective Field Multipliers
title_full_unstemmed Enhancing Security for Resource-Constrained Smart Cities IoT Applications: Optimizing Cryptographic Techniques with Effective Field Multipliers
title_short Enhancing Security for Resource-Constrained Smart Cities IoT Applications: Optimizing Cryptographic Techniques with Effective Field Multipliers
title_sort enhancing security for resource constrained smart cities iot applications optimizing cryptographic techniques with effective field multipliers
topic smart cities
sustainable development goals (SDGs)
edge computing
IoT security issues
protected data transmission
cryptography
url https://www.mdpi.com/2410-387X/9/2/37
work_keys_str_mv AT atefibrahim enhancingsecurityforresourceconstrainedsmartcitiesiotapplicationsoptimizingcryptographictechniqueswitheffectivefieldmultipliers
AT fayezgebali enhancingsecurityforresourceconstrainedsmartcitiesiotapplicationsoptimizingcryptographictechniqueswitheffectivefieldmultipliers