International Journal For Multidisciplinary Research
E-ISSN: 2582-2160
•
Impact Factor: 9.24
A Widely Indexed Open Access Peer Reviewed Multidisciplinary Bi-monthly Scholarly International Journal
Home
Research Paper
Submit Research Paper
Publication Guidelines
Publication Charges
Upload Documents
Track Status / Pay Fees / Download Publication Certi.
Editors & Reviewers
View All
Join as a Reviewer
Get Membership Certificate
Current Issue
Publication Archive
Conference
Publishing Conf. with IJFMR
Upcoming Conference(s) ↓
Conferences Published ↓
IC-AIRCM-T3-2026
SPHERE-2025
AIMAR-2025
SVGASCA-2025
ICCE-2025
Chinai-2023
PIPRDA-2023
ICMRS'23
Contact Us
Plagiarism is checked by the leading plagiarism checker
Call for Paper
Volume 8 Issue 2
March-April 2026
Indexing Partners
End-to-End Security Architecture for Internet of Things Systems
| Author(s) | Prof. Dhikle Shraddha Ajinkya, Kaklij Darshan Balu, Porje Bhushan Ramesh, Patil Sarthak Nandu |
|---|---|
| Country | India |
| Abstract | The rapid expansion of the Internet of Things (IoT) has introduced critical security challenges due to heterogeneous device capabilities, constrained computational and energy resources, large-scale connectivity, and dynamic network environments. Existing security solutions are often fragmented and fail to provide seamless protection across the entire IoT data lifecycle. This paper proposes a comprehensive end-to-end security architecture designed to protect IoT systems from the device layer to the application layer. The proposed framework integrates lightweight mutual authentication, efficient key management, secure communication protocols, data encryption at rest and in transit, fine-grained access control, and optional decentralized trust mechanisms. In addition, edge-level security functions such as intrusion detection and secure firmware updates are incorporated to enhance system resilience. The architecture ensures essential security properties including confidentiality, integrity, availability, authentication, and non-repudiation while maintaining low computational and communication overhead suitable for resource-constrained IoT devices. The framework is evaluated using performance metrics such as end-to-end latency, energy consumption, scalability, and resistance to common cyberattacks. Experimental results demonstrate improved resilience against routing attacks, replay attacks, impersonation, and man-in-the-middle attacks, with minimal impact on system performance, making the proposed approach suitable for secure and scalable IoT deployments. |
| Keywords | IoT Security, End-to-End Architecture, Lightweight Cryptography, Secure Communication, Blockchain. |
| Field | Computer > Artificial Intelligence / Simulation / Virtual Reality |
| Published In | Volume 8, Issue 1, January-February 2026 |
| Published On | 2026-01-23 |
| DOI | https://doi.org/10.36948/ijfmr.2026.v08i01.66664 |
Share this

E-ISSN 2582-2160
CrossRef DOI is assigned to each research paper published in our journal.
IJFMR DOI prefix is
10.36948/ijfmr
Downloads
All research papers published on this website are licensed under Creative Commons Attribution-ShareAlike 4.0 International License, and all rights belong to their respective authors/researchers.
Powered by Sky Research Publication and Journals