Comparative Study of Lightweight Encryption Algorithms Leveraging Neural Processing Unit for Artificial Internet of Medical Things

Authors

  • Puthiyavan Udayakumar Vels Institute of Science, Technology & Advanced Studies
  • R. Anandan

DOI:

https://doi.org/10.22399/ijcesen.1259

Keywords:

Lightweight Encryption, AIoMT, NIST, PRESENT, Security, Medical Data Security

Abstract

The Artificial Internet of Medical Things (AIoMT)enables a new generation of medical devices with real-time data analytics, remote patient monitoring, and tailored medicine. This interconnected landscape also facilitates cyberattacks targeting sensitive and critical patient information.

Cryptography is one Method of ensuring secure data transmission. IoT networks have boosted the concept of lightweight cryptography since IoT devices have limited resources, including power, memory, and batteries. These algorithms are designed to protect data efficiently while utilizing minimal resources.

The research presents a comparative study of lightweight encryption algorithms evaluated by the National Institute of Standards and Technology (NIST) for suitability in securing data on AIoMT devices. Here, we analyze the Functional and Non-Functional characteristics of leading contenders. The value proposition of this research is to address the need to secure critical, sensitive patient information on AIoMT devices.

The evaluation is performed using Raspberry Pi AI Kit, integrated with an M.2 HAT+ board and a Hailo-8L accelerator module; the Method adopted is a systematic literature review. Eight Models adopted AES, PRESENT, MSEA, LEA, XTEA, SIMON, PRINCE, and RECTANGLE; ML models adopted and trained and verified against each of the eight NIST lightweight encryption algorithms and every model assessed with key performance indicators such as precision, recall, F1-score, and accuracy.

References

Vanhoef, M., Staffelbach, L., Ronen, E., & Wright, M. (2018). Decomed: Deconstructing medical device communication protocols. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security (pp. 1025-1040). https://jamanetwork.com/journals/jama-health-forum/fullarticle/2759776

Healthcare IT News. (2023). Denial-of-service attacks on healthcare facilities: Increased risk. https://www.malwarebytes.com/blog/news/2023/02/killnet-group-targets-us-and-european-hospitals-with-ddos-attacks

McAfee. (n.d.). Risks of IoT Security. https://www.mcafee.com/learn/how-to-secure-the-future-of-the-internet-of-things/

CSO Online. (2023, June 14). Healthcare ransomware attacks on the rise: What you need to know. https://www.csoonline.com/article/2069830/the-state-of-ransomware.html

World Economic Forum. (2022, January 18). Cybersecurity supply chain risks grow as IoT adoption soars. https://www.weforum.org/impact/iot-security-keeping-consumers-safe/

Y. Sun, F. P. Lo and B. Lo, "Security and Privacy for the Internet of Medical Things Enabled Healthcare Systems: A Survey".

A. Ghubaish, T. Salman, M. Zolanvari, D. Ünal, A. Al‐Ali and R. Jain, "Recent Advances in the Internet-of-Medical-Things (IoMT) Systems Security".

A. L. N. Al-hajjar and A. K. M. Al‐Qurabat, "An overview of ML methods in enabling IoMT-based epileptic seizure detection".

A. A. Mawgoud, A. I. Karadawy and B. Tawfik, "A Secure Authentication Technique in Internet of Medical Things through ML".

D. Koutras, G. Stergiopoulos, T. K. Dasaklis, P. Kotzanikolaou, D. Glynos and C. Douligeris, "Security in IoMT Communications: A Survey".

F. S. Alsubaei, A. Abuhussein and S. G. Shiva, "A Framework for Ranking IoMT Solutions Based on Measuring Security and Privacy".

S. Vishnu, S. R. J. Ramson and R. Jegan, "Internet of Medical Things (IoMT) - An overview".

D. Koutras, G. Stergiopoulos, T. K. Dasaklis, P. Kotzanikolaou, D. Glynos and C. Douligeris, "Security in IoMT Communications: A Survey".

Zhao, G., Chen, H. & Wang, J. A lightweight block encryption algorithm for narrowband internet of things. Peer-to-Peer Netw. Appl. 16, 2775–2793 (2023). https://doi.org/10.1007/s12083-023-01559-w

A. Ghubaish, T. Salman, M. Zolanvari, D. Ünal, A. Al‐Ali and R. Jain, "Recent Advances in the Internet-of-Medical-Things (IoMT) Systems Security".

A. A. Mawgoud, A. I. Karadawy and B. Tawfik, "A Secure Authentication Technique in Internet of Medical Things through Machine Learning".

R, U. M., P, R. S., Gokul Chandrasekaran, & K, M. (2024). Assessment of Cybersecurity Risks in Digital Twin Deployments in Smart Cities. International Journal of Computational and Experimental Science and Engineering, 10(4). https://doi.org/10.22399/ijcesen.494

V. A. Thakor, M. A. Razzaque and M. R. A. Khandaker, "Lightweight Cryptography Algorithms for Resource-Constrained IoT Devices: A Review, Comparison and Research Opportunities," in IEEE Access, vol. 9, pp. 28177-28193, 2021,

Downloads

Published

2025-03-08

How to Cite

Udayakumar, P., & R. Anandan. (2025). Comparative Study of Lightweight Encryption Algorithms Leveraging Neural Processing Unit for Artificial Internet of Medical Things. International Journal of Computational and Experimental Science and Engineering, 11(1). https://doi.org/10.22399/ijcesen.1259

Issue

Section

Research Article