Design of a Secure and Scalable Key Management Protocol for IoT Communication over RF-Constrained Wireless Networks

Authors

DOI:

https://doi.org/10.31838/NJAP/07.03.16

Keywords:

IoT Security, RF-Constrained Networks, Key Management Protocol, ECC, Secure Communication, Wireless Sensor Networks, Lightweight Cryptography, Scalability, Authentication, Cluster-Based Architecture

Abstract

The fast spread of the Internet of Things (IoT) has transformed many fields of application within the realm of smart cities, automation of industries, healthcare services, and environmental control. But securing contact in such a setting has been a quite daunting task, particularly in RF-limited wireless systems using low bandwidth, energy, and computing resources. The traditional key management protocols tend to be inadequate in those environments since they either provide too much cryptographic overhead or are non-scalable or non-adaptive. In order to overcome these shortcomings, it was decided the paper would introduce a new, lightweight, scalable Key Management Protocol in and around the IoT Communication over RF-Constrained Networks (KMP-IoT-RF). The protocol merges the cryptographic strength of Elliptic Curve Cryptography (ECC) alongside a cluster-based trust structure that permits the reduction in the cost of communication and computational expense whilst increasing the performance of the key distribution. IoT nodes authentication is performed with the help of ECC-based challenge and responses and end-to-end encryption is implemented with help of Elliptic Curve DiffieHellman (ECDH) exchanges between the node and its cluster head. In addition, the protocol has dynamic key refresh, localized revocation and also hash-based chain functions along with compressed broadcasts of certificate revocation. The vast simulation experiments show that KMP-IoT-RF is far better than the current symmetric, asymmetric key management approaches with respect to the energy efficiency, setup time of keys, and resilience to various security challenges, such as node capture, replay attacks, and impersonation. The protocol is computationally and packet efficient to perform secure key exchange and is easily applicable to IoT networks that have unreliable channels and where computing resources are scarce. Striking a balance between security, scalability, and RF-efficiency, KMP-IoT-RF acts as a further step towards the realisation of practical, real-life cryptographies in the framework of next-generation IoT frameworks. Future research avenues would be to further customize the protocol to accommodate mobility, post-quantum cryptographic primitives, and an implementation of real worldpath using more constrained hardware pulses like ARM Cortex-M and RISC-V.

References

1. Al-Jame, F., Al-Fares, R.A., Ali, W., Ashour, H., & Murshid, N. (2023). Fundamental design approach: Realization of decoder block for secured transmission. Journal of VLSI Circuits and Systems, 5(1), 55–60. https://doi.org/10.31838/jvcs/05.01.08

2. Sudhakar, R., Rajakumari, J., Poornima, S., & Ramya, V. (2019). A security threats and authentication approaches in wireless sensor networks. International Journal of Communication and Computer Technologies, 7(2), 1–3.

3. Liu, A., & Ning, P. (2005). Establishing pairwise keys in distributed sensor networks. ACM Transactions on Information and System Security (TISSEC), 8(1), 41–77. https://doi.org/10.1145/1053283.1053288

4. Malan, D.J., Welsh, M., & Smith, M.D. (2004). A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography. In Proceedings of the 1st International Conference on Embedded Networked Sensor Systems (SenSys ’04), pp. 71–80. ACM. https://doi.org/10.1145/1031495.1031505

5. Prasad, B.S.V., & Roopashree, H.R. (2023). Energy efficient secure key management scheme for hierarchical cluster based WSN. Journal of Internet Services and Information Security, 13(2), 146–156. https://doi.org/10.58346/JISIS.2023.I2.009

6. Vlada, N., Sánchez-Ancajima, R.A., Rubio, M.A.T., Campos-Ugaz, W.A., Benavides, A.M., Hende-Santolaya, M.D.R., & Ponce-Meza, J.C. (2023). Enhancing security in mobile ad hoc networks: Enhanced particle swarm optimization-driven intrusion detection and secure routing algorithm. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 14(3), 77–88. https://doi.org/10.58346/JOWUA.2023.I3.006

7. Gura, N., Patel, A., Wander, A., Eberle, H., & Shantz, S.C. (2004). Comparing elliptic curve cryptography and RSA on 8-bit CPUs. In: Joye, M., & Quisquater, J.J. (eds.). Cryptographic hardware and embedded systems – CHES

2004. Springer, Berlin, Heidelberg. pp. 119–132. https://doi.org/10.1007/978-3-540-28632-5_9

8. Krawczyk, H. (2005). HMQV: A high-performance secure Diffie-Hellman protocol. In Advances in Cryptology – CRYPTO 2005, 3621, 546–566. Springer. https://doi.org/10.1007/11535218_33

9. Mia, M., Emma, A., & Hannah, P. (2025). Leveraging data science for predictive maintenance in industrial settings. Innovative Reviews in Engineering and Science, 3(1), 49–58. https://doi.org/10.31838/INES/03.01.07

10. Michael, P., & Jackson, K. (2025). Advancing scientific discovery: A high-performance computing architecture for AI and machine learning. Journal of Integrated VLSI, Embedded and Computing Technologies, 2(2), 18–26. https://doi.org/10.31838/JIVCT/02.02.03

11. Lee, J., & Kim, H. (2022). Lightweight key agreement protocols for next-generation IoT devices in 6G networks. IEEE Internet of Things Journal, 9(15), 13455–13467. https://doi.org/10.1109/JIOT.2022.3171560

12. Kavitha, M. (2024). Advances in wireless sensor networks: From theory to practical applications. Progress in Electronics and Communication Engineering, 1(1), 32–37. https://doi.org/10.31838/PECE/01.01.06

13. Abdullah, D. (2024). Strategies for low-power design in reconfigurable computing for IoT devices. SCCTS Transactions on Reconfigurable Computing, 1(1), 21–25. https://doi.org/10.31838/RCC/01.01.05

14. Castiñeira, M., & Francis, K. (2025). Model-driven design approaches for embedded systems development: A case

study. SCCTS Journal of Embedded Systems Design and Applications, 2(2), 30–38.

15. Kumar, T.M.S. (2024). Low-power communication protocols for IoT-driven wireless sensor networks. Journal of Wireless Sensor Networks and IoT, 1(1), 37–43. https://doi.org/10.31838/WSNIOT/01.01.06

16. Prakash, M., & Prakash, A. (2023). Cluster head selection and secured routing using glowworm swarm algorithm and

hybrid security algorithm for over IoT-WSNs. International Academic Journal of Innovative Research, 10(2), 01–09. https://doi.org/10.9756/IAJIR/V10I2/IAJIR100466

17. Kumar, R., Singh, A.K., & Singh, P. (2017). Lightweight hybrid key management protocol for ZigBee wireless sensor networks. Wireless Personal Communications, 96(3), 4075–4092. https://doi.org/10.1007/s11277-017-4322-2

18. Sharma, A., & Pandey, A. (2024). Design and Implementation of a Secure Cloud-Based Storage System. International Academic Journal of Science and Engineering, 11(4), 22–26. https://doi.org/10.71086/IAJSE/V11I4/IAJSE1166

Downloads

Published

2025-12-10

Issue

Section

Articles

How to Cite

Sachin Sharma, Bhanu Juneja, Sridhar G, Mary Gladence L, Sarita Mohapatra, & Sudhakar Reddy. (2025). Design of a Secure and Scalable Key Management Protocol for IoT Communication over RF-Constrained Wireless Networks. National Journal of Antennas and Propagation, 7(3), 118-127. https://doi.org/10.31838/NJAP/07.03.16

Similar Articles

1-10 of 197

You may also start an advanced similarity search for this article.