Volume 2025, Issue 1 9639728
Review Article
Open Access

Comprehensive Analysis of Lightweight Cryptographic Algorithms for Battery-Limited Internet of Things Devices

Nahom Gebeyehu Zinabu

Corresponding Author

Nahom Gebeyehu Zinabu

Department of Software Engineering , College of Engineering , Addis Ababa Science and Technology University , Addis Ababa , Ethiopia , aastu.edu.et

Search for more papers by this author
Yihenew Wondie Marye

Yihenew Wondie Marye

Associate Professor in School of Electrical and Computer Engineering (SECE) , Addis Ababa Institute of Technology (AAiT) , Addis Ababa University (AAU) , Addis Ababa , Ethiopia , aau.edu.et

Search for more papers by this author
Kula Kekeba Tune

Kula Kekeba Tune

Department of Software Engineering , College of Engineering , Addis Ababa Science and Technology University , Addis Ababa , Ethiopia , aastu.edu.et

Search for more papers by this author
Samuel Asferaw Demilew

Samuel Asferaw Demilew

Department of Information Technology , College of Computing , Debre Berhan University , Debre Berhan , Ethiopia , dbu.edu.et

Search for more papers by this author
First published: 06 June 2025
Academic Editor: Pierre Leone

Abstract

The growth of billions of devices functioning in resource-constrained situations in the Internet of Things (IoT) era poses serious security issues. As a result of their limited processing power efficiency, memory, and battery life, traditional cryptographic algorithms like elliptic curve cryptography (ECC), Rivest–Shamir–Adleman (RSA), and Advanced Encryption Standard (AES) are sometimes too resource-intensive for these devices. Lightweight cryptography has become a crucial field as a remedy, created especially to maintain security while maximizing energy efficiency and reducing resource usage. With an emphasis on contrasting well-known lightweight block ciphers and pointing out areas for future research, this paper examines the most recent developments in lightweight cryptographic methods. In order to synthesize insights into present issues and future goals, it explores cutting-edge methods that improve performance, security, and energy efficiency. Among the main trends that were covered were the trade-offs between resource limitations and security strength, hardware–software co-optimization, block and stream cipher optimization, and hybrid encryption techniques. The study’s conclusion emphasizes how urgently more research is needed to create cryptographic solutions that can sufficiently safeguard IoT devices.

Conflicts of Interest

The authors declare no conflicts of interest.

Data Availability Statement

This published article contains all of the data collected or analyzed during this investigation.

The full text of this article hosted at iucr.org is unavailable due to technical difficulties.