Design and Implementation of a Secure Communication Architecture for IoT Devices
Abstract
1. Introduction
- Compared to other state-of-the-art solutions for securing IoT devices, the architecture proposed in this work—based on two Raspberry Pi boards, the 802.1X protocol, and digital certificate-based authentication—offers a highly effective balance between security, affordability, and ease of deployment.
- Blockchain-based security mechanisms provide strong protection through decentralized identity management and immutable transaction logs. However, these solutions often require higher processing power and increased energy consumption, making them less suitable for resource-constrained IoT environments. Additionally, the complexity of implementing blockchain in existing networks can be a barrier for many organizations.
- Cloud-based IoT security platforms (such as AWS IoT or Azure IoT Hub) are known for their scalability, centralized certificate management, and rich access control features. Despite their advantages, they depend on constant internet connectivity and introduce a degree of vendor lock-in. For sensitive or isolated networks—such as those in industrial or critical infrastructure contexts—the proposed local, offline-capable solution is more suitable.
- Lightweight encryption approaches, such as DTLS or CoAP with OSCORE, are designed for extremely constrained devices, offering low overhead and efficient performance. However, they typically rely on pre-shared keys and do not support robust mutual authentication. This can make them vulnerable to spoofing and replay at-tacks. In contrast, your system leverages EAP-TLS and digital certificates to achieve strong identity verification and encryption without relying on weak credentials.
- Zero Trust architectures, which implement continuous authentication, strict access segmentation, and real-time monitoring, proposed solution is far more accessible and easier to implement. While Zero Trust is highly effective for enterprise-level networks, it requires complex infrastructure and significant maintenance overhead, which are often unnecessary for small or medium-scale IoT deployments.
2. Materials and Methods
2.1. Fundamentals of the Security Protocols
- Fast authentication—ideal for environments that require simple and fast security;
- Vulnerabilities—exposed to attacks;
- Deprecated—has been replaced by more secure protocols such as EAP-TLS.
- Data encryption—ensures confidentiality by protecting data so that it cannot be intercepted;
- Integrity—guarantees that data has not been modified during transmission;
- Authentication—confirms the identity of the parties involved in communication.
2.2. Design of the Proposed Secure Communication Architecture
3. Results
3.1. Results Obtained in UDP
3.2. Results Obtained in TCP
4. Discussion
4.1. Benefits of the Proposed Approach
- The energy consumed is insignificant because two Raspberry Pi platforms are used, and they are recognized for their low energy consumption [21].
- The two platforms cost around EUR 200, and the software used is open source, which determines zero additional costs (Raspbian, FreeRadius, Open-source Secure Sockets Layer (OpenSSL)).
- The system has very high security by implementing digital certificates in the topology [22] for authentication and encryption. Each device attempting to connect will be required to present a valid certificate issued by a trusted Certificate Authority (CA). This ensures that only authorized users and devices can access the network, mitigating the risk of unauthorized access. The certificates will be used in conjunction with EAP-TLS for WiFi authentication, providing mutual authentication between clients and the authentication server. Additionally, private keys associated with the certificates will be securely stored, preventing theft or misuse. The use of certificates eliminates reliance on passwords, which are more susceptible to attacks such as phishing or brute force. The entire certificate lifecycle, including issuance, renewal, and revocation, will be care-fully managed to maintain security. Integration with a blockchain-based verification mechanism will further enhance trust by ensuring certificate integrity. The FreeRadius server will handle certificate validation, rejecting any expired or untrusted certificates.
- With the help of this architecture, a secure connection is achieved where it is impossible to use any type of cables.
- It can secure IoT devices that do not have the possibility of connecting by implementing digital certificates. For example, most televisions, although they are considered “smart-tv” do not offer the possibility of making a connection by introducing digital certificates [20].
4.2. Limitations in Deployment Environments
- Offloading authentication to a more powerful server or cloud-based FreeRADIUS implementation while retaining the Raspberry Pi as a bridge device.
- Load balancing between multiple Raspberry Pi units to distribute authentication requests more evenly.
- Lightweight alternatives such as EAP-FAST or pre-authenticated device provisioning for static IoT environments with known devices.
5. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
Abbreviations
AAA | Authentication Authorization and Accounting |
AES | Advanced encryption standard |
AP | Access Point |
CHAP | Challenge Handshake Authentication Protocol |
CLI | Command line interface |
EAP | Extensible Authentication Protocol |
EAP-MD5 | Extensible Authentication Protocol—Message Digest Algorithm 5 |
EAP-TLS | Extensible Authentication Protocol—Transport Layer Security |
EAP-TTLS | Extensible Authentication Protocol—Tunnelled Transport Layer Security |
ICMP | Internet control message protocol |
IoT | Internet of Things |
IIoT | Industrial Internet of Things |
IPsec | Internet Protocol Security |
LDAP | Lightweight Directory Access Protocol |
MS-CHAP | Microsoft version of the Challenge-Handshake Authentication Protocol |
PAP | Password Authentication Protocol |
PEAP | Protected Extensible Authentication Protocol |
RADIUS | Remote Authentication Dial in User Service |
SSL | Secure Sockets Layer |
TCP | Transport control protocol |
UDP | User Datagram Protocol |
WI-FI | Wireless Fidelity |
WPA2 | Wi-Fi Protected Access |
WPA2-PSK | Wi-Fi Protected Access Pre-Shared Key |
References
- Kampourakis, V.; Chatzoglou, E.; Kambourakis, G.; Dolmes, A.; Zaroliagis, C. WPAxFuzz: Sniffing Out Vulnerabilities in Wi-Fi Implementations. Cryptography 2022, 6, 53. [Google Scholar] [CrossRef]
- Marian, C.V. DNS Records Secure Provisioning Mechanism for Virtual Machines automatic management in high density data centers. In Proceedings of the IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom), Bucharest, Romania, 24–28 May 2021; pp. 1–5. [Google Scholar] [CrossRef]
- Anghelescu, P. Design and Implementation of an Electronic Encryption System Based on Programmable Cellular Automata Algorithm. In Proceedings of the The 47th International Spring Seminar on Electronics Technology (ISSE), Prague, Czech Republic, 15–19 May 2024; pp. 1–4. [Google Scholar] [CrossRef]
- Fan, S.; Wang, J. Multi-dimension-precision chaotic encryption mechanism for Internet of Things. Internet Things 2024, 26, 101202. [Google Scholar] [CrossRef]
- Zhang, B.; Zhang, T.; Xi, Z.; Chen, P.; Wei, J.; Liu, Y. Secure Device-to-Device Communication in IoT: Fuzzy Identity from Wireless Channel State Information for Identity-Based Encryption. Electronics 2024, 13, 984. [Google Scholar] [CrossRef]
- Velmurugan, P.; Senthil Kumar, K.; Sridhar, S.S.; Gotham, E. An advanced and effective encryption methodology used for modern IoT security. Mater. Today 2023, 81, 389–394. [Google Scholar] [CrossRef]
- Cezar, D.; Gheorghe, G.; Gabriel, P.; Mariuca-Roxana, G. Device For Securing IoT In The Wireless Environment. In Proceedings of the 16th International Conference on Electronics, Computers and Artificial Intelligence (ECAI), Iasi, Romania, 27–28 June 2024. [Google Scholar] [CrossRef]
- Ahmad, N.; Madhura, K.; Agarwal, T.; Zaidi, T. Implementing Encryption Algorithms for the Protection of Wireless Networks. In Proceedings of the 5th International Conference on Data Science, Machine Learning and Applications, Hyderabad, India, 15–16 December 2023; Volume 2. [Google Scholar] [CrossRef]
- Faíscas, D. Security in Wi-Fi networks: A systematic review. ARIS2-J. 2024, 2, 17–23. [Google Scholar] [CrossRef]
- Kaur, N.; Gupta, L. Securing the 6G–IoT Environment: A Framework for Enhancing Transparency in Artificial Intelligence Decision-Making Through Explainable Artificial Intelligence. Sensors 2025, 25, 854. [Google Scholar] [CrossRef]
- Cisco: Powering an Inclusive, Digital Future for All, Powering an Inclusive, Digital Future for All. Available online: https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2023/m01/powering-an-inclusive-digital-future-for-all.html (accessed on 20 February 2025).
- Abo-Soliman, M.A.; Azer, M.A. A study in WPA2 enterprise recent attacks. In Proceedings of the 13th International Computer Engineering Conference (ICENCO), Cairo, Egypt, 27–28 December 2017. [Google Scholar] [CrossRef]
- Kohlios, C.P.; Hayajneh, T. A Comprehensive Attack Flow Model and Security Analysis for Wi-Fi and WPA3. Electronics 2018, 7, 284. [Google Scholar] [CrossRef]
- Oproiu, M.I.; Ileana, M.; Marian, C.V. Exploring the Intricacies of the Architectural Framework Under-lying the Internet of Things Ecosystem. In Proceedings of the International Conference on Electronics, Computers and Artificial Intelligence (ECAI), Iasi, Romania, 27–28 June 2024; pp. 1–6. [Google Scholar] [CrossRef]
- Ileana, M.; Oproiu, M.I.; Marian, C.V. Exploring and Analyzing Internet of Things Devices for Process Optimization in Industrial Environments. In Proceedings of the Advanced Topics on Measurement and Simulation (ATOMS), Constanta, Romania, 28–30 August 2024; pp. 148–151. [Google Scholar] [CrossRef]
- How Authentication Protocols Work. Available online: https://networkradius.com/articles/2022/02/20/how-authentication-protocols-work.html (accessed on 20 February 2025).
- Available online: https://iperf.fr/iperf-doc.php (accessed on 20 February 2025).
- Chung, J.; Vlajic, N. Survey of Remote TLS Vulnerability Scanning Tools and Snapshot of TLS Use in Banking Sector. In Proceedings of the IEEE Conference on Communications and Network Security (CNS), Austin, TX, USA, 3–5 October 2022. [Google Scholar] [CrossRef]
- Emily, L.; VoIP, J. What It Is and How to Fix It. Available online: https://www.openphone.com/blog/voip-jitter (accessed on 20 February 2025).
- Vivek, R. EAP-TTLS Versus PEAP (Protected Extensible Authentication Protocol) Authentication Method. Available online: https://www.securew2.com/blog/eap-tls-vs-eap-ttls-pap (accessed on 20 February 2025).
- Duan, L.; Li, Y.; Liao, L. Practical Certificate-Less Infrastructure with Application in TLS. Cryptography 2023, 7, 63. [Google Scholar] [CrossRef]
- Ibrar, A. A Comparative Study on the Power Usage of Raspberry Pi Models. Available online: https://projects-raspberry.com/a-comparative-study-on-the-power-usage-of-raspberry-pi-models (accessed on 6 March 2024).
- Lungu, R.S.; Marian, C.V. Data Collection and Command Mechanism for Management of Network Re-sources. In Proceedings of the 14th International Conference on Electronics, Computers and Artificial Intelligence (ECAI), Ploiesti, Romania, 30 June–1 July 2022; pp. 1–5. [Google Scholar] [CrossRef]
- Raceanu, D.N.; Marian, C.V. Cybersecurity Virtual Labs for Pentesting Education. In Proceedings of the 13th International Symposium on Advanced Topics in Electrical Engineering (ATEE), Bucharest, Romania, 23–25 March 2023; pp. 1–4. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Dumitrache, C.-G.; Anghelescu, P. Design and Implementation of a Secure Communication Architecture for IoT Devices. J. Sens. Actuator Netw. 2025, 14, 64. https://doi.org/10.3390/jsan14040064
Dumitrache C-G, Anghelescu P. Design and Implementation of a Secure Communication Architecture for IoT Devices. Journal of Sensor and Actuator Networks. 2025; 14(4):64. https://doi.org/10.3390/jsan14040064
Chicago/Turabian StyleDumitrache, Cezar-Gabriel, and Petre Anghelescu. 2025. "Design and Implementation of a Secure Communication Architecture for IoT Devices" Journal of Sensor and Actuator Networks 14, no. 4: 64. https://doi.org/10.3390/jsan14040064
APA StyleDumitrache, C.-G., & Anghelescu, P. (2025). Design and Implementation of a Secure Communication Architecture for IoT Devices. Journal of Sensor and Actuator Networks, 14(4), 64. https://doi.org/10.3390/jsan14040064