International Journal For Multidisciplinary Research

E-ISSN: 2582-2160     Impact Factor: 9.24

A Widely Indexed Open Access Peer Reviewed Multidisciplinary Bi-monthly Scholarly International Journal

Call for Paper Volume 8, Issue 2 (March-April 2026) Submit your research before last 3 days of April to publish your research paper in the issue of March-April.

End-to-End Security Architecture for Internet of Things Systems

Author(s) Prof. Dhikle Shraddha Ajinkya, Kaklij Darshan Balu, Porje Bhushan Ramesh, Patil Sarthak Nandu
Country India
Abstract The rapid expansion of the Internet of Things (IoT) has introduced critical security challenges due to heterogeneous device capabilities, constrained computational and energy resources, large-scale connectivity, and dynamic network environments. Existing security solutions are often fragmented and fail to provide seamless protection across the entire IoT data lifecycle. This paper proposes a comprehensive end-to-end security architecture designed to protect IoT systems from the device layer to the application layer. The proposed framework integrates lightweight mutual authentication, efficient key management, secure communication protocols, data encryption at rest and in transit, fine-grained access control, and optional decentralized trust mechanisms. In addition, edge-level security functions such as intrusion detection and secure firmware updates are incorporated to enhance system resilience. The architecture ensures essential security properties including confidentiality, integrity, availability, authentication, and non-repudiation while maintaining low computational and communication overhead suitable for resource-constrained IoT devices. The framework is evaluated using performance metrics such as end-to-end latency, energy consumption, scalability, and resistance to common cyberattacks. Experimental results demonstrate improved resilience against routing attacks, replay attacks, impersonation, and man-in-the-middle attacks, with minimal impact on system performance, making the proposed approach suitable for secure and scalable IoT deployments.
Keywords IoT Security, End-to-End Architecture, Lightweight Cryptography, Secure Communication, Blockchain.
Field Computer > Artificial Intelligence / Simulation / Virtual Reality
Published In Volume 8, Issue 1, January-February 2026
Published On 2026-01-23
DOI https://doi.org/10.36948/ijfmr.2026.v08i01.66664

Share this