Enhancing Reliability and Security in Resource-Constrained IoT Networks A Middleware-Centric Approach

Authors

  • Ajit Kumar Amity University Jharkhand Author
  • Kumari Puja Noida Institute of Engineering and Technology image/svg+xml Author
  • Abhishek kumar Author
  • Lakshmi Kumari Author
  • Ashok singh Gaur Author
  • Sachin Kashyap Author

Keywords:

IoT Security; Resource-Constrained Networks; Middleware; Reliability; Trust; Authentication; Access Control; Energy Efficiency; Edge Computing; Resilience; Cyber-Physical Systems; Data Integrity; Confidentiality.

Abstract

The ubiquitous deployment of Internet of Things devices, 
particularly within resource-constrained environments, 
necessitates the development of robust solutions that 
effectively address both reliability and security challenges. 
This paper proposes a novel middleware-centric 
architectural framework designed to enhance the inherent 
limitations of such networks concerning computational 
power, memory, and energy. Our approach integrates 
comprehensive security and trust mechanisms directly into 
the 
middleware layer, emphasizing decentralized 
authentication, granular access control, and the judicious use 
of secure protocols to counter various cyber threats. 
Concurrently, the proposed middleware incorporates 
strategies aimed at bolstering system reliability through 
optimized energy-efficient operations and resilient service 
embedding. The methodology details the design principles, 
outlines critical implementation considerations, and presents 
a rigorous performance evaluation framework. This 
framework includes both simulation-based analyses and 
real-world testbed experiments, designed to validate the 
middleware's efficacy in improving data integrity, 
confidentiality, availability, and overall system resilience, 
crucially without compromising the operational efficiency 
imperative for constrained IoT devices. This work 
significantly contributes to bridging the persistent gap 
between severe resource limitations and the critical demand 
for secure and dependable IoT deployments. 

Downloads

Published

2026-02-09 — Updated on 2026-02-15

Versions

Issue

Section

Articles