Skip to main navigation menu Skip to main content Skip to site footer

Articles

Vol. 1 (2025)

Enhancing Data Security in Smart Cities: A Trust-Based Approach Leveraging Elliptic Curve Cryptography

Submitted
December 9, 2025
Published
2025-12-09

Abstract

Background and Objectives: Smart cities rely on interconnected Internet of Things (IoT) devices, which face significant data security and privacy challenges due to their resource-constrained nature. While traditional cryptographic methods are often too computationally heavy for such environments, a scalable and efficient security solution that dynamically adapts to device trustworthiness remains lacking. This paper aims to address this gap by proposing a lightweight, trust-based security framework leveraging Elliptic Curve Cryptography (ECC).

Methods: The study introduces a decentralized trust management framework that integrates ECC for efficient key exchange, data encryption, and secure communication with minimal computational overhead. A reputation-based system continuously evaluates device trustworthiness based on behavioral patterns and interaction history. This trust metric dynamically adjusts cryptographic strength—applying stricter security measures for interactions involving untrusted or suspicious entities. Additionally, a lightweight ECC-based authentication protocol is implemented to support secure device onboarding and access control within the smart city ecosystem. The framework was rigorously evaluated through extensive simulations and empirical testing against common IoT threats.

Results: The proposed framework demonstrated robust resilience against critical security threats, including man-in-the-middle attacks, eavesdropping, and unauthorized access attempts. Simulation results showed that the ECC-based approach significantly reduces computational overhead and energy consumption compared to traditional cryptographic techniques, while maintaining high security standards. The dynamic trust mechanism effectively identified and isolated compromised or malicious devices, enhancing overall network integrity. Furthermore, the authentication protocol enabled seamless yet secure integration of new devices into the IoT infrastructure without degrading system performance.

Conclusion: This study presents a highly effective and scalable security solution tailored for resource-constrained IoT environments in smart cities. The primary contribution is a decentralized, trust-aware ECC-based framework that balances security and efficiency. Additional findings highlight its adaptability to evolving threat landscapes and its practical viability for real-world deployment. These results underscore the potential of integrating cryptographic agility with behavioral trust models to future-proof smart city infrastructures, offering both theoretical advancement and practical value for IoT security.

References

  1. R. Ahmad, R. Wazirali, and T. Abu-Ain, “Machine learning for wireless sensor networks security: An overview of challenges and issues,” Sensors, vol. 22, no. 13, p. 4730, 2022. Sasirega, L., & Shanthi, C. (2022). Lightweight ECC and token based authentication mechanism for WSN-IoT. Scientific and Technical Journal of Information Technologies, Mechanics and Optics, 22(2), 332-338. https://doi.org/10.17586/2226-1494-2022-22-2-332-338
  2. M. Gheisari, H. E. Najafabadi, J. A. Alzubi, J. Gao, G. Wang, A. A. Abbasi, and A. Castiglione, “Obpp: An ontology-based framework for privacy-preserving in iot-based smart city,” Future Generation Computer Systems, vol. 123, pp. 1-13, 2021. https://doi.org/10.1016/j.future.2021.01.028
  3. S. Ullah, J. Zheng, N. Din, M. T. Hussain, F. Ullah, and M. Yousaf, “Elliptic curve cryptography; applications, challenges, recent advances, and future trends: A comprehensive survey,” Computer Science Review, vol. 47, p. 100530, 2023. https://doi.org/10.1016/j.cosrev.2022.100530
  4. M. M. Hasan, M. Jahan, and S. Kabir, “A trust model for edge-driven vehicular ad hoc networks using fuzzy logic,” IEEE Transactions on Intelligent Transportation Systems, 2023. https://doi.org/10.1109/TITS.2023.3305342
  5. M. Gheisari, Z. Safari, M. Almasi, R. G. Abel Sridharan, Y. Liu, and A. A. Abbasi, “A novel enhanced algorithm for efficient human tracking,” Int J Inf Commun Technol, vol. 11, no. 1, pp. 1-7, 2022. https://doi.org/10.11591/ijict.v11i1.pp1-7
  6. Y. Liu, L. Lin, L. Jiang, W. Zhang, X. Wang, M. Gheisari, and H. E. Najafabadi, “A blockchain-based privacy-preserving advertising attribution architecture: Requirements, design, and a prototype implementation,” Software: Practice and Experience, vol. 53, no. 8, pp. 1700-1721, 2023. https://doi.org/10.1002/spe.3209
  7. A. A. Abbasi, M. A. Al-qaness, M. A. Elaziz, H. A. Khalil, and S. Kim, “Bouncer: a resource-aware admission control scheme for cloud services,” Electronics, vol. 8, no. 9, p. 928, 2019. https://doi.org/10.3390/electronics8090928
  8. K. Ahmad, M. Maabreh, M. Ghaly, K. Khan, J. Qadir, and A. AlFuqaha, “Developing future human-centered smart cities: Critical analysis of smart city security, data management, and ethical challenges,” Computer Science Review, vol. 43, p. 100452, 2022. https://doi.org/10.1016/j.cosrev.2021.100452
  9. M. H. P. Rizi and S. A. H. Seno, “A systematic review of technologies and solutions to improve security and privacy protection of citizens in the smart city,” Internet of Things, vol. 20, p. 100584, 2022. https://doi.org/10.1016/j.iot.2022.100584
  10. E. Ismagilova, L. Hughes, N. P. Rana, and Y. K. Dwivedi, “Security, privacy and risks within smart cities: Literature review and development of a smart city interaction framework,” Information Systems Frontiers, pp. 1-22, 2022.
  11. M. Gheisari, E. Shojaeian, A. Javadpour, A. Jalili, H. EsmaeiliNajafabadi, B. S. Bigham, and M. Rezaei, “An agile privacypreservation solution for iot-based smart city using different distributions,” IEEE Open Journal of Vehicular Technology, vol. 4, pp. 356-362, 2023. https://doi.org/10.1109/OJVT.2023.3243226
  12. B. Ali, M. A. Gregory, and S. Li, “Multi-access edge computing architecture, data security and privacy: A review,” IEEE Access, vol. 9, pp. 18 706-18 721, 2021. https://doi.org/10.1109/ACCESS.2021.3053233
  13. A. Alzu’bi, A. A. Alomar, S. Alkhaza’leh, A. Abuarqoub, and M. Hammoudeh, “A review of privacy and security of edge computing in smart healthcare systems: issues, challenges, and research directions,” Tsinghua Science and Technology, vol. 29, no. 4, pp. 1152-1180, 2024. https://doi.org/10.26599/TST.2023.9010080
  14. M. F. Khan, K. Saleem, M. Alotaibi, M. M. Hazzazi, E. Rehman, A. A. Abbasi, and M. A. Gondal, “Construction and optimization of trng based substitution boxes for block encryption algorithms,” Computers, Materials Continua, vol. 73, no. 2, pp. 2679-2696, 2022. https://doi.org/10.32604/cmc.2022.027655
  15. A. Ullah, M. Azeem, H. Ashraf, A. A. Alaboudi, M. Humayun, and N. Z. Jhanjhi, “Secure healthcare data aggregation and transmission in iot—a survey,” IEEE Access, vol. 9, pp. 16 849-16 865, 2021.
  16. https://doi.org/10.1109/ACCESS.2021.3052850
  17. A. Entezami, H. Sarmadi, and B. Behkamal, “Long-term health monitoring of concrete and steel bridges under large and missing data by unsupervised meta learning,” Engineering Structures, vol. 279, p. 115616, 2023. https://doi.org/10.1016/j.engstruct.2023.115616
  18. M. Umair, M. A. Cheema, O. Cheema, H. Li, and H. Lu, “Impact of covid-19 on iot adoption in healthcare, smart homes, smart buildings, smart cities, transportation and industrial iot,” Sensors, vol. 21, no. 11, p. 3838, 2021. https://doi.org/10.3390/s21113838
  19. M. Lotfi, G. J. Osorio, M. S. Javadi, A. Ashraf, M. Zahran, G. Samih, ´ and J. P. Catalao, “A dijkstra-inspired graph algorithm for fully ˜ autonomous tasking in industrial applications,” IEEE Transactions on Industry Applications, vol. 57, no. 5, pp. 5448-5460, 2021. https://doi.org/10.1109/TIA.2021.3091418
  20. M. K. Hasan, M. M. Ahmed, S. S. Musa, S. Islam, S. N. H. S. Abdullah, E. Hossain, and N. Vo, “An improved dynamic thermal current rating model for pmu-based wide area measurement framework for reliability analysis utilizing sensor cloud system,” IEEE Access, vol. 9, pp. 14 446-14 458, 2021. https://doi.org/10.1109/ACCESS.2021.3052368
  21. A. N. Alahmadi, S. U. Rehman, H. S. Alhazmi, D. G. Glynn, H. Shoaib, and P. Sole, “Cyber-security threats and side-channel ´ attacks for digital agriculture,” Sensors, vol. 22, no. 9, p. 3520, 2022. https://doi.org/10.3390/s22093520
  22. N. Chaabouni, M. Mosbah, A. Zemmari, C. Sauvignac, and P. Faruki. 2019. Network Intrusion Detection for IoT Security Based on Learning Techniques. IEEE Communications Surveys Tutorials 21, 3 (thirdquarter 2019), 2671-2701. https://doi.org/10.1109/COMST.2019.2896380
  23. Anirban Chakraborty, Manaar Alam, Vishal Dey, Anupam Chattopadhyay, and Debdeep Mukhopadhyay. 2018. Adversarial Attacks and Defences: A Survey. x, x (2018). http://arxiv.org/abs/1810.00069
  24. Guillaume Chapron. 2017. The environment needs cryptogovernance. Nature 545, 7655 (2017), 403-405. https://doi.org/10.1038/545403a
  25. Baibhab Chatterjee, Debayan Das, and Shreyas Sen. 2018. RF-PUF: IoT security enhancement through authentication of wireless nodes using in-situ machine learning. Proceedings of the 2018 IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2018 PP, c (2018), 205-208. https://doi.org/10.1109/HST.2018.8383916
  26. Konstantinos Christidis and Michael Devetsikiotis. 2016. Blockchains and Smart Contracts for the Internet of Things. IEEE Access 4 (2016), 2292-2303. http://ieeexplore.ieee.org/document/7467408/. https://doi.org/10.1109/ACCESS.2016.2566339
  27. Kelton A.P. da Costa, João P. Papa, Celso O. Lisboa, Roberto Munoz, and Victor Hugo C. de Albuquerque. 2019. Internet of Things: A survey on machine learning-based intrusion detection approaches. Computer Networks 151 (2019), 147-157. https://doi.org/10.1016/j.comnet.2019.01.023
  28. Tim Dalgleish, J. Mark G.. Williams, Ann-Marie J. Golden, Nicola Perkins, Lisa Feldman Barrett, Phillip J. Barnard, Cecilia Au Yeung, Victoria Murphy, Rachael Elward, Kate Tchanturia, and Edward Watkins. 2018. The Blockchain-enabled Intelligent IoT Economy. (2018). https://www.forbes.com/sites/cognitiveworld/2018/10/04/ the-blockchain-enabled-intelligent-iot-economy/#14b65de82a59
  29. Guido Dartmann, Houbing Song, and Anke Schmeink. 2019. Big Data Analytics for Cyber-Physical Systems: Machine Learning for the Internet of Things. Elsevier. 1-360 pages.
  30. Tien Tuan Anh Dinh, Ji Wang, Gang Chen, Rui Liu, Beng Chin Ooi, and Kian-Lee Tan. 2017. BLOCKBENCH: A Framework for Analyzing Private Blockchains. (2017).
  31. Abebe Diro and Naveen Chilamkurti. 2018. Leveraging LSTM Networks for Attack Detection in Fog-to-Things Communications. IEEE Communications Magazine 56, 9 (2018), 124-130. https://doi.org/10.1109/MCOM.2018.1701270
  32. Ali Dorri, Salil S. Kanhere, and Raja Jurdak. 2016. Blockchain in internet of things: Challenges and Solutions. CoRR abs/1608.05187 (2016). http://arxiv.org/abs/1608.05187
  33. GhadakSaz, Ehsan, et al. "Design, Implement and Compare two proposed sensor data’s storages Named SemHD and SSW." From Editor in Chief (2012): 78.