Lightweight Cryptographic and Scalable IoT Systems for Encryption across GSM-MQTT Architectures in Resource-Constrained Aquaculture Environment

Authors

  • Rupali P. Shete Symbiosis Institute of Technology, Symbiosis International (Deemed University), Pune Campus, Lavale, Pune, Maharashtra, India https://orcid.org/0000-0003-4833-2912
  • Anupkumar M. Bongale Department of Artificial Intelligence and Machine Learning, Symbiosis Institute of Technology, Symbiosis International (Deemed University), Pune Campus, Lavale, Pune, Maharashtra, India
  • Deepak Dharrao Department of Computer Science and Engineering, Symbiosis Institute of Technology, Symbiosis International (Deemed University), Pune Campus, Lavale, Pune, Maharashtra, India https://orcid.org/0000-0002-2540-6942
Volume: 15 | Issue: 4 | Pages: 25133-25139 | August 2025 | https://doi.org/10.48084/etasr.10367

Abstract

Internet of Things (IoT) technologies in environmental monitoring provide real-time remote data acquisition capabilities and decision-making for different domains, including aquaculture. This study investigates a secure water quality monitoring system designed specifically for fish farms through IoT technology with an emphasis on lightweight encryption methods combined with real-time GSM communications. The primary objective is to protect and maintain the confidentiality, integrity, and operational efficiency of vital pH, Dissolved Oxygen (DO), and Temperature (T) measurements collected by low-power microcontroller devices. A wireless data transmission system was based on Arduino with calibrated analog sensors and the SIM800L GSM module to implement the MQTT protocol for data transfer. The data security assessment involved the implementation and testing of the AES-128-CBC and SPECK-128-CBC symmetric encryption algorithms under equivalent real-time circumstances. SPECK-128-CBC delivered faster encryption (209.64 µs) than AES-128-CBC (235.08 µs) along with improved memory efficiency and more compact payloads, indicating its best fit for constrained environments. AES-128-CBC demonstrated a slightly higher level of ciphertext entropy, reaching 5.18 bits/byte compared to 5.09 of SPECK-128-CBC. Using a weighted scoring method that weighted entropy at 40%, processing speed at 30%, and memory and payload efficiency at 30%, SPECK achieved 0.9931 while AES reached 0.9484. These results suggest that SPECK-128-CBC offers an energy-efficient encryption solution to provide optimal security for GSM-based IoT systems in aquaculture environments.

Keywords:

IOT security, lightweight encryption, resource constrained devices, aquaculture, AES-128, SPECK

Downloads

Download data is not yet available.

References

K. M. Ahmed, R. Shams, F. H. Khan, and M. Á. Luque-Nieto, "Securing Underwater Wireless Sensor Networks: A Review of Attacks and Mitigation Techniques," IEEE Access, vol. 12, pp. 161096–161133, 2024. DOI: https://doi.org/10.1109/ACCESS.2024.3490498

S. Jennings et al., "Aquatic food security: insights into challenges and solutions from an analysis of interactions between fisheries, aquaculture, food safety, human health, fish and human welfare, economy and environment," Fish and Fisheries, vol. 17, no. 4, pp. 893–938, 2016. DOI: https://doi.org/10.1111/faf.12152

J. Gladju, B. S. Kamalam, and A. Kanagaraj, "Applications of data mining and machine learning framework in aquaculture and fisheries: A review," Smart Agricultural Technology, vol. 2, Dec. 2022, Art. no. 100061. DOI: https://doi.org/10.1016/j.atech.2022.100061

V. Rao and K. V. Prema, "A review on lightweight cryptography for Internet-of-Things based applications," Journal of Ambient Intelligence and Humanized Computing, vol. 12, no. 9, pp. 8835–8857, Sep. 2021. DOI: https://doi.org/10.1007/s12652-020-02672-x

V. A. Thakor, M. A. Razzaque, and M. R. A. Khandaker, "Lightweight Cryptography Algorithms for Resource-Constrained IoT Devices: A Review, Comparison and Research Opportunities," IEEE Access, vol. 9, 2021. DOI: https://doi.org/10.1109/ACCESS.2021.3052867

Amrita, C. P. Ekwueme, I. H. Adam, and A. Dwivedi, "Lightweight Cryptography for Internet of Things: A Review," EAI Endorsed Transactions on Internet of Things, vol. 10, Mar. 2024. DOI: https://doi.org/10.4108/eetiot.5565

J. Soto-Cruz, E. Ruiz-Ibarra, J. Vázquez-Castillo, A. Espinoza-Ruiz, A. Castillo-Atoche, and J. Mass-Sanchez, "A Survey of Efficient Lightweight Cryptography for Power-Constrained Microcontrollers," Technologies, vol. 13, no. 1, Dec. 2024, Art. no. 3. DOI: https://doi.org/10.3390/technologies13010003

S. Aqeel, A. S. Khan, I. A. Abbasi, F. Algarni, and D. Grzonka, "Enhancing IoT security with a DNA-based lightweight cryptography system," Scientific Reports, vol. 15, no. 1, Apr. 2025, Art. no. 13367. DOI: https://doi.org/10.1038/s41598-025-96292-0

A. M. Rasheed and R. M. S. Kumar, "Lightweight Cryptographic Algorithms for Medical IoT Devices using Combined Transformation and Expansion (CTE) and Dynamic Chaotic System," International Journal of Advanced Computer Science and Applications, vol. 15, no. 4, 2024. DOI: https://doi.org/10.14569/IJACSA.2024.0150472

J. Khalid, "Lightweight Cryptography Algorithms for Internet of Things Enabled Networks. A Comparative Study," International Journal of Innovations in Science & Technology, vol. 6, no. 4, pp. 2124–2139, Dec. 2024.

I. El Gaabouri, M. Senhadji, and M. Belkasmi, "A Survey on Lightweight Cryptography Approach For IoT Devices Security," in 2022 5th International Conference on Networking, Information Systems and Security: Envisage Intelligent Systems in 5g//6G-based Interconnected Digital Worlds (NISS), Bandung, Indonesia, Mar. 2022, pp. 1–8. DOI: https://doi.org/10.1109/NISS55057.2022.10085144

I. Makarenko, S. Semushin, S. Suhai, S. M. Ahsan Kazmi, A. Oracevic, and R. Hussain, "A Comparative Analysis of Cryptographic Algorithms in the Internet of Things," in 2020 International Scientific and Technical Conference Modern Computer Network Technologies (MoNeTeC), Oct. 2020, pp. 1–8. DOI: https://doi.org/10.1109/MoNeTeC49726.2020.9258156

S. Maitra and K. Yelamarthi, "Rapidly Deployable IoT Architecture with Data Security: Implementation and Experimental Evaluation," Sensors, vol. 19, no. 11, Jan. 2019. DOI: https://doi.org/10.3390/s19112484

V. Hassija, V. Chamola, V. Saxena, D. Jain, P. Goyal, and B. Sikdar, "A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures," IEEE Access, vol. 7, pp. 82721–82743, 2019. DOI: https://doi.org/10.1109/ACCESS.2019.2924045

P. Velmurugan, K. Senthil kumar, S. S. Sridhar, and E. Gotham, "An advanced and effective encryption methodology used for modern IoT security," Materials Today: Proceedings, vol. 81, pp. 389–394, Jan. 2023. DOI: https://doi.org/10.1016/j.matpr.2021.03.424

B. Li, Y. Feng, Z. Xiong, W. Yang, and G. Liu, "Research on AI security enhanced encryption algorithm of autonomous IoT systems," Information Sciences, vol. 575, pp. 379–398, Oct. 2021. DOI: https://doi.org/10.1016/j.ins.2021.06.016

M. A. Khan, M. T. Quasim, N. S. Alghamdi, and M. Y. Khan, "A Secure Framework for Authentication and Encryption Using Improved ECC for IoT-Based Medical Sensor Data," IEEE Access, vol. 8, pp. 52018–52027, 2020. DOI: https://doi.org/10.1109/ACCESS.2020.2980739

P. Satyanarayana, N. Sriramdas, B. Madhavi, A. M, N. V. Phani Sai Kumar, and V. Gokula Krishnan, "Enhancement of Security in IoT Using Modified AES Algorithm for IoT Applications," in 2023 International Conference on Sustainable Communication Networks and Application (ICSCNA), Theni, India, Nov. 2023, pp. 380–386. DOI: https://doi.org/10.1109/ICSCNA58489.2023.10370606

B. V. Sundaram, M. Ramnath, M. Prasanth, and V. J. Sundaram, "Encryption and hash based security in Internet of Things," in 2015 3rd International Conference on Signal Processing, Communication and Networking (ICSCN), Chennai, India, Mar. 2015, pp. 1–6. DOI: https://doi.org/10.1109/ICSCN.2015.7219926

J. Cecílio, A. Oliveira de Sá, and A. Souto, "Software-Based Security Framework for Edge and Mobile IoT," Ada Lett., vol. 44, no. 1, pp. 95–99, Sep. 2024. DOI: https://doi.org/10.1145/3706601.3706618

M. Jahangir, M. J. Lee, B. H. Kwan, T. Kamal, T. Y. Chai, and W. S. Loh, "Improved Layered Architecture: Integration of IoT with Blockchain for Increased Security and Scalability," in 2024 5th International Conference on Artificial Intelligence and Data Sciences (AiDAS), Bangkok, Thailand, Sep. 2024, pp. 1–7. DOI: https://doi.org/10.1109/AiDAS63860.2024.10730319

I. Al-Hejri, F. Azzedin, S. Almuhammadi, and M. Eltoweissy, "Lightweight Secure and Scalable Scheme for Data Transmission in the Internet of Things," Arabian Journal for Science and Engineering, vol. 49, no. 9, pp. 12919–12934, Sep. 2024. DOI: https://doi.org/10.1007/s13369-024-08884-z

N. Garcia, E. Hammad, and A. Farraj, "Soft-Trust Based Architecture for NextG IIoT/IoET Security, Authentication and Authorization," in 2023 IEEE Texas Power and Energy Conference (TPEC, Feb. 2023, pp. 1–6. DOI: https://doi.org/10.1109/TPEC56611.2023.10078555

A. H. Al-Omari, "Lightweight Dynamic Crypto Algorithm for Next Internet Generation," Engineering, Technology & Applied Science Research, vol. 9, no. 3, pp. 4203–4208, Jun. 2019. DOI: https://doi.org/10.48084/etasr.2743

V. Srivatsan and V. Pathari, "Design and Development of a Simulation Environment for IoT Devices," in 2022 IEEE International Conference on Signal Processing, Informatics, Communication and Energy Systems (SPICES), Thiruvananthapuram, India, Mar. 2022, pp. 207–211. DOI: https://doi.org/10.1109/SPICES52834.2022.9774116

Downloads

How to Cite

[1]
R. P. Shete, A. M. Bongale, and D. Dharrao, “Lightweight Cryptographic and Scalable IoT Systems for Encryption across GSM-MQTT Architectures in Resource-Constrained Aquaculture Environment”, Eng. Technol. Appl. Sci. Res., vol. 15, no. 4, pp. 25133–25139, Aug. 2025.

Metrics

Abstract Views: 418
PDF Downloads: 588

Metrics Information