<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Resource-efficient solutions for data security at the network level of the Medical Internet of Things ⋆</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Inna</forename><surname>Rozlomii</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">Cherkasy State Technological University</orgName>
								<address>
									<addrLine>460, Shevchenko Blvd</addrLine>
									<postCode>18006</postCode>
									<settlement>Cherkasy</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff1">
								<orgName type="institution">Bohdan Khmelnytsky National University of Cherkasy</orgName>
								<address>
									<addrLine>81, Shevchenko Blvd</addrLine>
									<postCode>18031</postCode>
									<settlement>Cherkasy</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Andrii</forename><surname>Yarmilko</surname></persName>
							<affiliation key="aff1">
								<orgName type="institution">Bohdan Khmelnytsky National University of Cherkasy</orgName>
								<address>
									<addrLine>81, Shevchenko Blvd</addrLine>
									<postCode>18031</postCode>
									<settlement>Cherkasy</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author role="corresp">
							<persName><forename type="first">Serhii</forename><surname>Naumenko</surname></persName>
							<email>naumenko.serhii1122@vu.cdu.edu.ua</email>
							<affiliation key="aff1">
								<orgName type="institution">Bohdan Khmelnytsky National University of Cherkasy</orgName>
								<address>
									<addrLine>81, Shevchenko Blvd</addrLine>
									<postCode>18031</postCode>
									<settlement>Cherkasy</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Resource-efficient solutions for data security at the network level of the Medical Internet of Things ⋆</title>
					</analytic>
					<monogr>
						<idno type="ISSN">1613-0073</idno>
					</monogr>
					<idno type="MD5">B2E0133BBC6611B670E7315132A73D6B</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2025-04-23T17:10+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>MIoT</term>
					<term>cryptographic algorithms</term>
					<term>LEA</term>
					<term>AES-128</term>
					<term>data security</term>
					<term>network level</term>
					<term>data confidentiality</term>
					<term>data integrity</term>
					<term>energy consumption 1</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>The article focuses on resource-efficient solutions for ensuring data security at the network level of Medical Internet of Things (MIoT) systems. Modern systems of this type use a vast number of medical devices with limited computational resources and power capacity. To address the challenges of ensuring the confidentiality, integrity, and availability of medical data in such systems, implementing efficient cryptographic solutions is a necessary step. The article substantiates the importance of using lightweight cryptographic algorithms, such as LEA, which demonstrate high performance and minimal energy consumption-critical for the autonomous operation of medical devices. Specifically, a comparative analysis of lightweight cryptographic algorithms and traditional methods showed that LEA encrypts three times faster while consuming significantly less energy compared to AES-128, confirming its suitability for use in MIoT devices. Furthermore, testing LEA revealed reduced CPU load, allowing MIoT systems to respond faster to changes in patients' health conditions. The article also discusses promising directions for security development in MIoT, including quantum cryptography and the use of simulation environments for modeling cyberattacks. Emphasis is placed on the potential of quantum cryptography to provide an unprecedented level of medical data protection, while simulation platforms enable testing of security measures in controlled conditions with various attack scenarios on MIoT systems. The approaches proposed in the article aim to ensure reliable protection of medical data without overloading the devices, which is crucial for maintaining the efficiency of MIoT systems in resource-constrained environments.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>The Medical Internet of Things (MIoT) is one of the key directions of modern technologies, integrating medical devices, sensors, software, and network infrastructure to ensure continuous monitoring and management of patients' health conditions <ref type="bibr" target="#b0">[1]</ref>. This technology creates opportunities for improving the quality of healthcare services, reducing treatment costs, and optimizing diagnostic and therapy processes. MIoT significantly extends the capabilities of modern medicine, allowing for remote monitoring of patients, automated health parameter control, and timely response to changes in their condition <ref type="bibr" target="#b1">[2]</ref>.</p><p>The number of MIoT devices is steadily increasing, driven by the growing demand for health monitoring technologies, particularly among people with chronic diseases and elderly patients. In 2023, the MIoT market was valued at $144.23 billion USD and is expected to grow at an annual rate of 20.4%, reaching $668.07 billion by 2030 <ref type="bibr" target="#b2">[3]</ref>. This growth is attributed to the increasing use of medical devices, such as stationary devices, implantable medical devices, and wearable devices, which are becoming more popular due to improved access to technology and government healthcare initiatives <ref type="bibr" target="#b3">[4]</ref>. Among the most common MIoT devices are wearable gadgets for monitoring heart rate, glucose levels, blood pressure, and other vital indicators, as well as medical implants and devices for remote therapy control. In recent years, the MIoT market has shown rapid growth in the number of devices installed in hospitals, clinics, and even at home (Figure <ref type="figure" target="#fig_0">1</ref>). It is expected that by 2025, the number of medical IoT devices will increase several times. These trends indicate the need for significant measures to ensure their security <ref type="bibr" target="#b4">[5]</ref>, as MIoT networks transmit vast amounts of sensitive and critical information related to medical procedures and decisions. Structurally, MIoT consists of several layers, specifically the application, network, and physical layers. This three-layer architecture is depicted in Figure <ref type="figure" target="#fig_1">2</ref>. The application layer encompasses software solutions and interfaces that interact with users, such as healthcare professionals or patients. Application programs analyze data obtained through medical sensors and use it to assist in decision-making aimed at improving the efficiency of medical care. The network layer is responsible for data transmission between devices, servers, and cloud solutions. It ensures information exchange between different elements of the system but is vulnerable to cyberattacks, which can affect the confidentiality, integrity, and availability of data. The physical layer includes medical devices, sensors, and other hardware components that directly collect data from patients. This layer is the foundation of the entire MIoT system but is also susceptible to physical interference and device failures. The high sensitivity of the data processed in MIoT makes research in this area highly relevant. Since MIoT systems work with confidential medical information that is subject to strict regulatory requirements, ensuring data protection is a critical task <ref type="bibr" target="#b5">[6]</ref>. Any data breach or compromise can have serious consequences for both patient health and the legal status of medical institutions. Moreover, data security is a crucial aspect of maintaining patient trust in medical technologies, as any data loss can significantly impact the reputation of healthcare facilities <ref type="bibr" target="#b6">[7]</ref>.</p><p>At the same time, the limited computational power and energy resources of most medical devices make resource efficiency one of the main requirements for ensuring security in MIoT <ref type="bibr" target="#b7">[8]</ref>. Traditional encryption methods, which typically require substantial computational and energy resources, are not optimal for such systems. Therefore, implementing lightweight cryptographic solutions that do not overburden devices becomes an urgent necessity <ref type="bibr" target="#b8">[9]</ref>. This approach allows for effective data protection while preserving the autonomy and functionality of the devices for extended periods.</p><p>Given the structure of MIoT, protection at the network level is particularly important, as it is at this level that data is transmitted between devices and external systems <ref type="bibr" target="#b9">[10]</ref>. The network level is one of the most vulnerable components in this structure, and attacks at this level can have critical consequences, including data interception, alteration, or loss. Considering that medical devices often operate in real time, ensuring reliable data security in the network becomes one of the key aspects of safety <ref type="bibr" target="#b10">[11]</ref>. The use of resource-efficient protection methods, such as lightweight cryptographic algorithms, helps reduce the risk of attacks without overloading the devices, which is especially relevant for medical applications where every second counts.</p><p>The aim of this research is to develop and analyze resource-efficient methods for data protection at the network level of the Medical Internet of Things, which provide an appropriate level of security considering the limited resources of medical devices. Ensuring compliance with these criteria will improve the security of MIoT systems while maintaining their effectiveness and reliability in working with patients.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Background research</head><p>Currently, the results of numerous studies on data security in MIoT devices have been published. Researchers have considered various approaches to information protection using both traditional and lightweight cryptographic algorithms. Specifically, Qiu et al. analyzed the application of standard encryption methods for data security in medical systems. This study discussed the challenges of adapting these methods to devices with limited computational resources, emphasizing the need to reduce energy consumption and computational costs <ref type="bibr" target="#b11">[12]</ref>.</p><p>Additionally, the study conducted by Prince and Lovesum focuses on the use of protocols that take into account the specifics of medical devices, such as protecting data during transmission from wearable devices to cloud services <ref type="bibr" target="#b12">[13]</ref>. The authors developed a lightweight encryption protocol capable of providing the required level of security without significant processor load, which confirms its applicability in real-world scenarios.</p><p>The study by Deebak, Al-Turjman, Aloqaily, and Alfandi focuses on improving authentication mechanisms for medical IoT devices by proposing innovative biometric-based schemes that can effectively counter modern threats, such as man-in-the-middle (MITM) attacks <ref type="bibr" target="#b13">[14]</ref>. This enhances network-level security and provides an additional layer of data protection.</p><p>In another work, Kumar, Gupta, and Tripathi examined the impact of cyber threats on the network level of MIoT, proposing enhanced authentication and access methods <ref type="bibr" target="#b14">[15]</ref>. Of particular note is the study conducted to evaluate the effectiveness of lightweight cryptographic algorithms, such as Lightweight Encryption Algorithm (LEA), GIFT, and others, in medical devices, highlighting their suitability for reducing the load on systems with limited resources. These works justify the use of resource-efficient methods capable of providing the required level of security without significant performance loss.</p><p>However, considering the continuous expansion of MIoT networks and increasing demands for data confidentiality and integrity, the need to find new resource-efficient solutions for network-level security remains relevant. Current research continues to focus on the development of new cryptographic schemes that consider MIoT device limitations, effectively protect data under constrained computational resources, and ensure low energy consumption, which is critical for medical applications. These aspects define future directions for MIoT security research, aiming not only to enhance security but also to ensure the practicality of solutions in real-world medical IoT device environments.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Network level attacks in MIoT</head><p>The network layer of MIoT is one of the most vulnerable because devices transmit sensitive medical data over various communication channels, often using weakly protected protocols <ref type="bibr" target="#b15">[16]</ref>. The main threats at this layer arise from weak protection of communication protocols, lack of reliable authentication, unencrypted connections, and poor network segmentation. This makes MIoT systems susceptible to various attacks that can compromise the confidentiality, integrity, and availability of medical data <ref type="bibr" target="#b16">[17]</ref>. Network-level attacks can have serious consequences for medical systems. They can lead to data access loss, manipulation of patient metrics, theft of sensitive information, and even the disruption of critical medical processes. These attacks are often aimed at intercepting traffic, interfering with data transmission, or disabling network services used by MIoT devices <ref type="bibr" target="#b17">[18]</ref>. Table <ref type="table" target="#tab_0">1</ref> presents the main vulnerabilities of the MIoT network layer. Software updates, use of secure protocols, access control.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Replay Attacks</head><p>Intercepting and retransmitting legitimate data between devices and servers, deceiving the system.</p><p>Use of one-time session keys, replay protection.</p><p>Device Takeover Maliciously gaining control over devices to alter settings or disable them.</p><p>Strong authentication, access control, device monitoring.</p><p>In addition to analyzing attacks, an important step is to build a model for implementing threats at the network level, which allows for a clear assessment of the risks to the system and its vulnerable points. A unified approach is proposed for constructing a mathematical model that considers the key parameters of network attacks, such as the volume of intercepted traffic, the effectiveness of encryption, and protective mechanisms <ref type="bibr" target="#b0">(1)</ref>. This model enables an accurate assessment of the probability of a successful attack and aids in developing more robust protection strategies for the MIoT system at the network level.</p><formula xml:id="formula_0">P ! = ∑ ( T " T # • L $ L % • 1 S &amp; ) • (1 − E ' ) • A ( ( )*+ n ,<label>(1)</label></formula><p>where P ! -is the overall probability of a successful attack at the network level, n -is the number of attacks or attack attempts, T " -is the volume of malicious traffic or data transmitted by the attacker, T # -is the bandwidth of the protective system (firewalls, IDS/IPS, gateways), L $ -is the number of compromised packets or data, L % -is the total volume of data transmitted in the network, S &amp; -is the effectiveness of the encryption used to protect the traffic (measured in bits), E ' -is the effectiveness of the implemented protective mechanisms (including encryption, authentication, network segmentation), and A ( -is the level of network availability or its resilience to attacks.</p><p>According to the model, the ratio , ! , " characterizes the system's ability to handle malicious traffic or data transmitted by the attacker. If the volume of malicious data entering the network significantly exceeds the bandwidth of the protection system, the probability of a successful attack increases. The ratio</p><formula xml:id="formula_1">-# -$</formula><p>indicates the proportion of compromised traffic among the total volume of transmitted data.</p><p>The more compromised data in the network, the higher the attacker's chances of gaining control over the information. The parameter 𝑆 . accounts for the effectiveness of encryption: the stronger the encryption, the lower the probability that the attacker will successfully decrypt the intercepted data. The effectiveness of the system is also influenced by the parameter E ' , which reflects the level of implemented security measures. If the protective mechanisms are reliable and well-configured, the overall probability of a successful attack decreases. A high probability of success P ! means that the attacker manages to bypass or break the defenses, while a low value indicates the system's ability to effectively handle threats.</p><p>Effective protection at the network level includes the implementation of secure data transmission protocols, such as Transport Layer Security (TLS) or Datagram Transport Layer Security (DTLS), reliable authentication methods, and network segmentation to minimize risks <ref type="bibr" target="#b18">[19,</ref><ref type="bibr" target="#b19">20]</ref>. The implementation of these measures helps to protect medical data, maintain the confidentiality and integrity of transmitted information, and reduce the likelihood of unauthorized access to devices.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Resource-efficient solutions for data security in MIoT</head><p>The development of resource-efficient solutions for data security in MIoT is an extremely important task due to the limited computational resources of medical devices. As mentioned, MIoT consists of numerous sensors, wearable gadgets, and stationary medical devices used for monitoring patient health, collecting, and transmitting sensitive medical information. In such conditions, traditional data protection methods may be ineffective due to their inherent high demands on computational power and energy consumption.</p><p>Resource-efficient solutions focus on optimizing existing technologies and implementing new approaches that provide the necessary level of security with minimal energy and resource expenditure <ref type="bibr" target="#b20">[21]</ref>. Key directions include the implementation of lightweight cryptographic algorithms that reduce the load on the processor and architectural solutions that enhance network protection while maintaining performance <ref type="bibr" target="#b21">[22]</ref>. These approaches help create secure, efficient, and energy-saving systems capable of resisting modern cyber threats.</p><p>An important component of resource-efficient solutions is the adaptation of security protocols and algorithms for operation under low power and limited computational resources <ref type="bibr" target="#b22">[23]</ref>. This includes not only lightweight encryption algorithms but also specialized architectural solutions that reduce risks at the network level while ensuring a high level of reliability and data confidentiality. In particular, a multi-layered approach to security reduces the likelihood of data compromise, enhancing the overall resilience of network systems.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.1.">Resource-efficient cryptographic algorithms for data protection at the network level of MIoT</head><p>Resource-efficient cryptographic algorithms are key components for ensuring data security in MIoT, where it is critically important to maintain a balance between security and the limited computational resources of devices. Effective encryption ensures the confidentiality and integrity of data transmitted between MIoT devices and servers, minimizing the risks of compromise. The main challenge lies in selecting cryptographic algorithms that fit the limited resources of devices with low computational power and energy consumption. One of the key tasks is choosing the appropriate cryptographic algorithm. Lightweight algorithms such as LEA, GIFT, and SPECK provide high data processing speeds with minimal resource load on devices <ref type="bibr" target="#b23">[24]</ref>. LEA offers high speed and low energy consumption, making it an ideal choice for lowpower MIoT devices. GIFT and SPECK algorithms also have minimal resource requirements and are suitable for devices with limited computational capabilities <ref type="bibr" target="#b24">[25]</ref>. In some cases, optimized AES may be used for more powerful devices, providing a high level of security with minor adjustments.</p><p>The integration of encryption can be implemented at the software and firmware level of the device. Modern MIoT devices allow firmware updates to add encryption features, and cryptographic libraries such as mbedTLS or WolfSSL support lightweight algorithms <ref type="bibr" target="#b25">[26]</ref>. This enables devices to maintain efficiency while protecting data from compromise.</p><p>Encrypting data at the transmission stage is also an important component of protection. The use of protocols such as TLS or DTLS ensures reliable encryption of data transmitted between devices and cloud services, safeguarding them from interception. Asymmetric algorithms are used for key exchange, providing secure transmission of keys for subsequent symmetric encryption.</p><p>Additionally, protecting data at the device level is crucial for ensuring their security in the event of device compromise. The use of flash or RAM encryption helps safeguard data even in cases of physical access to the device. Some MIoT devices support hardware encryption, which enables faster data processing and reduces the load on the processor.</p><p>Key management is a critical aspect of data protection. Securely storing keys in specialized hardware modules (Secure Element) and regularly updating keys prevent the use of vulnerable or compromised keys, maintaining a reliable level of security.</p><p>Based on the analysis of resource-efficient cryptographic algorithms and the need for data protection at the network level of MIoT, an important step is to build a secure system architecture. This architecture embodies the integration of modern cryptographic solutions into the software and hardware of MIoT devices and demonstrates how data protection is ensured during transmission over the network. Below is the structure of the secure MIoT system, which illustrates in detail the processes of data encryption, key management, and secure information transmission channels (Figure <ref type="figure" target="#fig_2">3</ref>). The presented diagram illustrates the interaction of MIoT devices with cloud services through secure channels, focusing on ensuring the confidentiality and integrity of the transmitted data. The integration of cryptographic libraries into the device firmware enables encryption at both the storage level and during data transmission. The key management system (Secure Elements) provides secure storage and updating of cryptographic keys, reducing the risk of their compromise and enhancing the overall security of the system.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.2.">Architectural solutions for enhancing security at the network level</head><p>Resource-efficient architectural solutions are crucial for ensuring the security of MIoT, as they allow for the effective use of limited computational and energy resources of devices. The network level of MIoT is vulnerable to various types of attacks, making resource-efficient approaches aimed at reducing risks without significantly burdening the system critically important for data protection and the stable operation of devices.</p><p>Resource-efficient architectural solutions include:</p><p>1. Network segmentation with traffic minimization. Dividing devices into different virtual networks (VLANs) optimizes the use of network resources, reduces unnecessary traffic, and ensures data protection in each segment separately. Utilizing segmentation decreases the load on devices and improves the overall system performance. 2. Implementation of lightweight security gateways. Security gateways with minimal computational resource requirements monitor traffic and filter data. They can detect suspicious connections and control access to critical services, preventing unauthorized access to MIoT devices.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Integration of lightweight intrusion detection and prevention systems (IDPS).</head><p>Lightweight IDPS are recommended for MIoT devices, as they can operate under limited resources. These systems provide real-time attack detection with minimal impact on device performance. They effectively identify anomalous actions, such as man-in-the-middle (MITM) attacks or DDoS attempts, allowing for timely responses to threats. 4. Optimized network-level encryption. Implementing TLS or DTLS protocols ensures traffic encryption between devices and servers with minimal energy costs. These protocols can be configured to use lightweight algorithms, such as LEA or GIFT, which provide reliable protection without significantly reducing data processing speed. 5. Automated security policy management. Utilizing automated systems for managing access policies and monitoring the network allows for rapid adaptation to changes in the network environment, reducing the need for manual intervention and minimizing the risk of human errors.</p><p>The listed resource-efficient architectural solutions provide reliable protection at the network level of MIoT without significantly negatively impacting the computational capabilities of devices. Overall, optimizing network processes, minimizing traffic, and using effective threat detection methods contribute to enhancing the security and stability of MIoT systems.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">Comparison of proposed methods with traditional approaches</head><p>One of the key advantages of the proposed solutions is their low energy consumption, which is critical for battery-operated MIoT devices or those with limited energy resources. The use of lightweight algorithms, such as LEA, significantly extends the battery life of devices as they perform computations faster and with lower energy expenditure.</p><p>The proposed resource-efficient cryptographic algorithms, such as LEA, GIFT, and SPECK, differ significantly from traditional algorithms like AES and RSA in terms of efficiency and adaptation to the resource capabilities of MIoT devices. In particular, lightweight algorithms utilize simplified operations, such as XOR, addition, and shifting, which greatly reduce computational costs and energy requirements. Traditional algorithms, while providing a high level of security, often overload MIoT devices due to the complexity of computations and high energy consumption.</p><p>During the experiment, several cryptographic algorithms were tested on real models of resourceconstrained microcontrollers, such as Texas Instruments CC2538 and NXP Kinetis KL02. The testing included a comparison of metrics such as encryption execution time, power consumption, and impact on the overall performance of the device (Table <ref type="table" target="#tab_1">2</ref>). The comparison showed that the resource-efficient algorithms LEA, GIFT, and SPECK have significantly better performance and energy consumption metrics compared to traditional algorithms like AES-128 and RSA. The advantage of 2-3 times faster encryption execution with simultaneously lower CPU load and significantly reduced energy consumption provided by lightweight algorithms is critically significant for MIoT devices.</p><p>The security aspects of using lightweight algorithms are also noteworthy: although they are less complex than traditional ones, they can effectively withstand most types of attacks, including those at the network level. The proposed architectural solutions, such as network segmentation and the implementation of lightweight security gateways, further enhance protection by minimizing the risks of data interception and unauthorized access.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6.">Analysis of efficiency</head><p>The proposed resource-efficient cryptographic solutions were tested in a software environment using the Python programming language. Undoubtedly, due to the relatively low speed of the resulting applications, Python is not an optimal language for the industrial implementation of cryptographic algorithms. However, it offers significant advantages as a testing and modeling tool in research settings. Its high-level syntax and extensive library ecosystem, such as cryptography and pycryptodome, allow for rapid prototyping and a focus on evaluating algorithm efficiency without significant time investment in implementation. With a broad selection of libraries for simulation modeling and performance analysis (notably timeit for measuring execution time and psutil for resource monitoring), Python simplifies experiment execution and data collection regarding efficiency. Its cross-platform nature also ensures versatility for running tests across different environments, which is important for verifying algorithm robustness. Thus, Python serves as a convenient tool for the preliminary evaluation of cryptographic algorithms before low-level implementation in languages optimized for performance, like C or C++.</p><p>To ensure accuracy and objectivity in evaluating cryptographic algorithms, a specialized research testbed was created. Its functionality allows for measuring key performance parameters in conditions close to real-world scenarios for MIoT devices. The foundation of these experiments included the following components:</p><p>1. Hardware. Testing was conducted on a computer equipped with an Intel Core i5 processor and 8 GB of RAM, providing sufficient computational power for simulating MIoT devices. To evaluate the performance of cryptographic algorithms in resource-constrained environments, an ESP32-WROOM-32 microcontroller was used as additional hardware.</p><p>Power consumption was measured using a power module with power-monitoring capabilities.</p><p>2. Software. Experiments were conducted in a Linux environment (Ubuntu 20.04) using Python libraries, such as cryptography for AES-128 and specialized lightweight libraries for LEA. Performance measurement tools included timeit and psutil. 3. Methodology. Encryption was performed on instances of randomly generated data with a size of 1 KB. The resource demand of the algorithms was evaluated under representative conditions with the following metrics: execution time for encryption and decryption operations, power consumption, and CPU load. To ensure the reliability of results, each algorithm underwent a series of 10 test runs under stable conditions. After each encryption cycle, power consumption measurements were taken. Measurements were recorded using specialized power analysis equipment connected to the ESP32-WROOM-32 microcontroller on which the algorithms were tested. This setup provided actual data on CPU load and energy consumption. The effectiveness of security mechanisms was tested by simulating various attacks, including MITM, DoS, and DDoS, in a controlled environment. For this purpose, specialized scripts were used to model malicious traffic behavior and the system's response to it. Specifically, during DoS attacks, the system's ability to maintain stable operation under load was monitored, while during MITM attacks, the resilience of security algorithms to data interception was assessed. All processes were tracked using an Intrusion Detection System (IDS) to log traffic anomalies. Network resilience was evaluated by calculating the probability of a successful attack, taking into account the system's capability to filter malicious traffic.</p><p>The simulation approach allowed precise control over the encryption process, enabling performance assessment and comparison of lightweight algorithms with traditional methods. For testing, the lightweight LEA algorithm and the traditional AES-128 were selected. The tools used for their analysis are presented in Figure <ref type="figure" target="#fig_3">4</ref>. Both functions are designed to measure the time required to encrypt random data (based on os.urandom) using the LEA and AES-128 algorithms in ECB mode. The encryption process includes key generation, data encryption, and execution time measurement. According to the experiment results, LEA achieved the following: encryption time -0.0015 seconds, power consumption -18 mW, CPU load -5%. For AES-128, the data obtained were: encryption time -0.0045 seconds, power consumption -38 mW, CPU load -12%. Thus, the experiment confirmed that lightweight algorithms are significantly more efficient than traditional ones in resource-constrained systems, providing fast encryption with lower energy consumption. The anomalies detected by the IDS confirmed the high effectiveness of lightweight algorithms in identifying and blocking threats. Consequently, they can effectively counteract attacks without overloading the system, specifically by maintaining stable CPU load and minimal energy consumption even during active exposure to malicious factorsthem.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="7.">Discussion</head><p>In addition to the successful testing of the advantages of lightweight cryptographic algorithms, an important aspect is the identification of promising directions for the further development of data protection in MIoT. Among the key trends that could significantly enhance security in medical networks are quantum cryptography and simulation environments for modeling cyberattacks and testing security effectiveness.</p><p>Although the implementation of quantum cryptography in MIoT is currently somewhat challenging due to technical limitations and high costs, its potential in the future is undeniable. Quantum algorithms have the ability to provide an exceptionally high level of security due to the properties of quantum mechanics, such as the impossibility of cloning quantum states and detecting interception attempts. The prospects of integrating quantum cryptography into MIoT open new opportunities for securing sensitive medical information. One example is the use of Quantum Key Distribution (QKD) to ensure secure data transmission. However, this requires further research into optimizing quantum solutions for the limited resources of MIoT devices.</p><p>Another important direction is the development and use of simulation environments for modeling cyberattacks and testing protective measures. Since real attacks on MIoT systems can have catastrophic consequences for patient health, simulations allow for the prior assessment of network vulnerabilities and the effectiveness of protective measures. Modern simulation platforms provide the ability to detail various attack scenarios, such as Man-in-the-Middle (MITM) attacks, DDoS, and others. They also allow for testing defensive measures, such as lightweight cryptographic algorithms, for resilience against various types of threats under controlled conditions. This may include simulating interactions between devices, data transmission, and the application of security protocols. With the development of such simulation environments, researchers can quickly test new algorithms and architectural solutions, evaluate their effectiveness, and identify potential weaknesses without risking real systems. This also opens opportunities for building effective machine learning models capable of automatically identifying potential threats and adapting security strategies.</p><p>In the context of resource-efficient solutions, an important direction is also the development of artificial intelligence technologies for automatic threat detection and anomaly identification in MIoT systems. The integration of machine learning algorithms allows for the creation of adaptive security systems that not only respond to known attacks but also predict potential threats based on real-time analysis of large data sets.</p><p>Thus, the prospect of integrating quantum technologies, simulation environments, and artificial intelligence into MIoT security systems opens new horizons for enhancing network-level security and effectively utilizing the resources of medical devices. Further development in these areas will be a crucial step towards ensuring the reliable operation of MIoT systems.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="8.">Conclusion</head><p>The results of the conducted research confirmed the effectiveness of the proposed resource-efficient solutions for data protection at the network level of MIoT systems. Special attention was given to the use of lightweight cryptographic algorithms, such as LEA, and their advantages compared to traditional algorithms like AES-128. The testing demonstrated that lightweight algorithms provide fast encryption and low energy consumption, which is critically important for medical devices with limited resources. The use of LEA reduced the encryption time by almost three times compared to AES-128, with more than twice the energy savings. This shows that the proposed methods are not only effective in terms of security but also help preserve the energy resources of devices, extending their autonomous operation. Considering that many MIoT devices operate on batteries or have limited power, such reductions in energy consumption represent a significant advantage. Additionally, during the testing with LEA, a significantly lower CPU load was also observed, which is important for maintaining stable operation of devices in real-time. This advantage is critically significant in a medical context, as reducing the load on processing components will allow MIoT systems to respond more quickly to changes in patients' health conditions.</p><p>Undoubtedly, it is worth noting that while lightweight cryptographic algorithms demonstrate excellent results in terms of energy efficiency and speed, they may offer lower levels of security compared to more complex algorithms like AES-128. However, in the context of MIoT, where it is important to ensure a balance between security and efficiency, lightweight algorithms such as LEA offer an optimal solution.</p><p>Further research could focus on expanding the range of tested algorithms, including additional lightweight algorithms, and analyzing their effectiveness under different conditions. Investigating methods for integrating lightweight algorithms into real MIoT devices, taking into account their limited computational power, is also important.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="9.">Declaration on Generative AI</head><p>During the preparation of this work, the authors didn't use Generative AI.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Figure 1 :</head><label>1</label><figDesc>Figure 1: Dynamics of MIoT device implementation.</figDesc><graphic coords="2,142.32,161.10,317.94,189.60" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Figure 2 :</head><label>2</label><figDesc>Figure 2: Three-layer MIoT architecture.</figDesc><graphic coords="2,147.99,550.49,306.65,193.34" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Figure 3 :</head><label>3</label><figDesc>Figure 3: Architecture of the secure MIoT system.</figDesc><graphic coords="6,88.87,600.26,424.80,138.23" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_3"><head>Figure 4 :</head><label>4</label><figDesc>Figure 4: Functions for testing encryption with LEA and AES-128.</figDesc><graphic coords="9,77.54,476.57,447.38,110.70" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head>Table 1</head><label>1</label><figDesc>Main vulnerabilities of the MIoT network layer</figDesc><table><row><cell>Type of attack</cell><cell>Description</cell><cell>Protection methods</cell></row><row><cell>MITM</cell><cell>Interception of communication</cell><cell>Implementation of TLS/DTLS,</cell></row><row><cell></cell><cell>between MIoT devices and central</cell><cell>data encryption, robust</cell></row><row><cell></cell><cell>systems for spying, altering, or</cell><cell>authentication.</cell></row><row><cell></cell><cell>injecting false data.</cell><cell></cell></row><row><cell>DoS/DDoS</cell><cell>Overloading MIoT devices or networks</cell><cell>Network segmentation, traffic</cell></row><row><cell></cell><cell>with traffic, making them unavailable.</cell><cell>filtering, use of IDPS (Intrusion</cell></row><row><cell></cell><cell></cell><cell>Detection and Prevention</cell></row><row><cell></cell><cell></cell><cell>Systems).</cell></row><row><cell>Ransomware</cell><cell>Encrypting critical medical data to</cell><cell>Regular backups, software</cell></row><row><cell></cell><cell>demand a ransom for unlocking it.</cell><cell>updates, multi-factor</cell></row><row><cell></cell><cell></cell><cell>authentication.</cell></row><row><cell>Data Breaches</cell><cell>Exploiting vulnerabilities to steal</cell><cell>Data encryption, access control,</cell></row><row><cell></cell><cell>confidential patient information.</cell><cell>traffic monitoring.</cell></row><row><cell>Remote Code</cell><cell>Remote execution of malicious code on</cell><cell></cell></row><row><cell>Execution (RCE)</cell><cell>MIoT devices through software</cell><cell></cell></row><row><cell></cell><cell>vulnerabilities.</cell><cell></cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_1"><head>Table 2</head><label>2</label><figDesc>Operational characteristics of cryptographic algorithms</figDesc><table><row><cell>Algorithm</cell><cell>Encryption time (ms)</cell><cell>Energy consumption (mW)</cell><cell>CPU load (%)</cell></row><row><cell>LEA</cell><cell>1.5</cell><cell>18</cell><cell>5</cell></row><row><cell>GIFT</cell><cell>1.8</cell><cell>20</cell><cell>6</cell></row><row><cell>SPECK</cell><cell>2.0</cell><cell>22</cell><cell>7</cell></row><row><cell>AES-128</cell><cell>4.5</cell><cell>38</cell><cell>12</cell></row><row><cell>RSA</cell><cell>10.0</cell><cell>65</cell><cell>20</cell></row></table></figure>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">A holistic analysis of Medical Internet of Things (MIoT)</title>
		<author>
			<persName><forename type="first">N</forename><surname>Akhtar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Rahman</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Sadia</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Perwej</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Information and Computational Science</title>
		<imprint>
			<biblScope unit="volume">11</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page" from="209" to="222" />
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">The internet of medical things and artificial intelligence: trends, challenges, and opportunities</title>
		<author>
			<persName><forename type="first">K</forename><surname>Kakhi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Alizadehsani</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><forename type="middle">D</forename><surname>Kabir</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Khosravi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Nahavandi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">U</forename><forename type="middle">R</forename><surname>Acharya</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Biocybernetics and Biomedical Engineering</title>
		<imprint>
			<biblScope unit="volume">42</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="749" to="771" />
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<monogr>
		<ptr target="https://www.grandviewresearch.com/industry-analysis/internet-of-medical-things-iomt-market-report" />
		<title level="m">Internet of Medical Things (IoMT) Market Size, Share &amp; Trends Analysis Report By End-use (Hospitals, Clinics), By Component (Software, Services), By Deployment (Cloud, On-premise), By Application, By Region, And Segment Forecasts</title>
				<imprint>
			<date type="published" when="2022">2023-2030. 2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Internet of Medical Things (IoMT) Market Size, Share &amp; Industry Analysis, By Product</title>
		<ptr target="https://www.fortunebusinessinsights.com/industry-reports/internet-of-medical-things-iomt-market-101844" />
	</analytic>
	<monogr>
		<title level="m">(Stationary Medical Devices, Implanted Medical Devices, and Wearable External Medical Devices), By Application (Telemedicine, Medication Management, Patient Monitoring, and Others), By End-user (Healthcare Providers, Patients, Government Authorities, and Others), and Regional Forecast</title>
				<imprint>
			<date type="published" when="2023">2024-2032. 2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<monogr>
		<ptr target="https://www.marketsandmarkets.com/Market-Reports/iot-medical-device-market-15629287.html" />
		<title level="m">IoT Medical Devices Market Size, Share &amp; Trends</title>
				<imprint>
			<date type="published" when="2023">2028. 2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">A Methodical Analysis of Medical Internet of Things (MIoT) security and privacy in current and future trends</title>
		<author>
			<persName><forename type="first">Y</forename><surname>Perwej</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Akhtar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Kulshrestha</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Mishra</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Emerging Technologies and Innovative Research</title>
		<imprint>
			<biblScope unit="volume">9</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="346" to="371" />
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">A survey of Internet of Things (IoT) in education: Opportunities and challenges</title>
		<author>
			<persName><forename type="first">M</forename><surname>Al-Emran</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">I</forename><surname>Malik</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">N</forename><surname>Al-Kabi</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-030-24513-9_12</idno>
	</analytic>
	<monogr>
		<title level="m">Toward Social Internet of Things (SIoT): Enabling Technologies, Architectures and Applications. Studies in Computational Intelligence</title>
				<editor>
			<persName><forename type="first">A</forename><surname>Hassanien</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">R</forename><surname>Bhatnagar</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">N</forename><surname>Khalifa</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">M</forename><surname>Taha</surname></persName>
		</editor>
		<meeting><address><addrLine>Cham</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2020">2020</date>
			<biblScope unit="volume">846</biblScope>
			<biblScope unit="page" from="197" to="209" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Security requirements for the internet of things: A systematic approach</title>
		<author>
			<persName><forename type="first">S</forename><surname>Pal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Hitchens</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Rabehaja</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Mukhopadhyay</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Sensors</title>
		<imprint>
			<biblScope unit="volume">20</biblScope>
			<biblScope unit="issue">20</biblScope>
			<biblScope unit="page">5897</biblScope>
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">IoT Smart Implants: Information Security and the Implementation of Lightweight Cryptography</title>
		<author>
			<persName><forename type="first">I</forename><surname>Rozlomii</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Yarmilko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Naumenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Mykhailovskyi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 6th International Conference on Informatics &amp; Data-Driven Medicine, IDDM&apos;2023, ceur-ws.org</title>
				<meeting>the 6th International Conference on Informatics &amp; Data-Driven Medicine, IDDM&apos;2023, ceur-ws.org</meeting>
		<imprint>
			<date type="published" when="2023">2023</date>
			<biblScope unit="volume">3609</biblScope>
			<biblScope unit="page" from="145" to="156" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">A secure fog-cloud based architecture for MIoT</title>
		<author>
			<persName><forename type="first">T</forename><surname>Almehmadi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Alshehri</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Tahir</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">2019 2nd International Conference on Computer Applications &amp; Information Security, ICCAIS, IEEE</title>
				<imprint>
			<date type="published" when="2019">2019</date>
			<biblScope unit="page" from="1" to="6" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">A Multilayered Hybrid Access Control Model for Cloud-Enabled Medical Internet of Things</title>
		<author>
			<persName><forename type="first">N</forename><forename type="middle">N</forename><surname>Thilakarathne</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><forename type="middle">D</forename><surname>Weerasinghe</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Welhenge</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Sustainable Advanced Computing: Select Proceedings of ICSAC 2021</title>
				<meeting><address><addrLine>Singapore, Singapore</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2022">2022</date>
			<biblScope unit="page" from="455" to="471" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Secure health data sharing for medical cyber-physical systems for the healthcare 4.0</title>
		<author>
			<persName><forename type="first">H</forename><surname>Qiu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Qiu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Liu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Memmi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE journal of biomedical and health informatics</title>
		<imprint>
			<biblScope unit="volume">24</biblScope>
			<biblScope unit="issue">9</biblScope>
			<biblScope unit="page" from="2499" to="2505" />
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">Privacy enforced access control model for secured data handling in cloud-based pervasive health care system</title>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">B</forename><surname>Prince</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">J</forename><surname>Lovesum</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">SN Computer Science</title>
		<imprint>
			<biblScope unit="volume">1</biblScope>
			<biblScope unit="issue">5</biblScope>
			<biblScope unit="page">239</biblScope>
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">An authentic-based privacy preservation protocol for smart e-healthcare systems in IoT</title>
		<author>
			<persName><forename type="first">B</forename><forename type="middle">D</forename><surname>Deebak</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Al-Turjman</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Aloqaily</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Alfandi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Access</title>
		<imprint>
			<biblScope unit="volume">7</biblScope>
			<biblScope unit="page" from="135632" to="135649" />
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">An ensemble learning and fog-cloud architecture-driven cyber-attack detection framework for IoMT networks</title>
		<author>
			<persName><forename type="first">P</forename><surname>Kumar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><forename type="middle">P</forename><surname>Gupta</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Tripathi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Computer Communications</title>
		<imprint>
			<biblScope unit="volume">166</biblScope>
			<biblScope unit="page" from="110" to="124" />
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">A review on security threats, vulnerabilities, and counter measures of 5G enabled Internet-of-Medical-Things</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">K</forename><surname>Hasan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><forename type="middle">M</forename><surname>Ghazal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">A</forename><surname>Saeed</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Pandey</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Gohel</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">A</forename><surname>Eshmawi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Abdel-Khalek</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><forename type="middle">M</forename><surname>Alkhassawneh</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IET communications</title>
		<imprint>
			<biblScope unit="volume">16</biblScope>
			<biblScope unit="issue">5</biblScope>
			<biblScope unit="page" from="421" to="432" />
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">Threat modeling of internet of things health devices</title>
		<author>
			<persName><forename type="first">A</forename><surname>Omotosho</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><forename type="middle">Ayemlo</forename><surname>Haruna</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Mikail</forename><forename type="middle">O</forename><surname>Olaniyi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Applied Security Research</title>
		<imprint>
			<biblScope unit="volume">14</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="106" to="121" />
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">Securing internet of medical things systems: Limitations, issues and recommendations</title>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">P A</forename><surname>Yaacoub</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Noura</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><forename type="middle">N</forename><surname>Noura</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Salman</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Yaacoub</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Couturier</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Chehab</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Future Generation Computer Systems</title>
		<imprint>
			<biblScope unit="volume">105</biblScope>
			<biblScope unit="page" from="581" to="606" />
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title level="a" type="main">Three party secure data transmission in IoT networks through design of a lightweight authenticated key agreement scheme</title>
		<author>
			<persName><forename type="first">A</forename><surname>Ostad-Sharif</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Arshad</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Nikooghadam</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Abbasinezhad-Mood</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Future Generation Computer Systems</title>
		<imprint>
			<biblScope unit="volume">100</biblScope>
			<biblScope unit="page" from="882" to="892" />
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<analytic>
		<title level="a" type="main">Secure healthcare data aggregation and transmission in IoT -A survey</title>
		<author>
			<persName><forename type="first">A</forename><surname>Ullah</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Azeem</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Ashraf</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">A</forename><surname>Alaboudi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Humayun</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><forename type="middle">Z</forename><surname>Jhanjhi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Access</title>
		<imprint>
			<biblScope unit="volume">9</biblScope>
			<biblScope unit="page" from="16849" to="16865" />
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<analytic>
		<title level="a" type="main">Data security of IoT devices with limited resources: challenges and potential solutions</title>
		<author>
			<persName><forename type="first">I</forename><surname>Rozlomii</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Yarmilko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Naumenko</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the doors-2024: 4th Edge Computing Workshop, ceur-ws.org</title>
				<meeting>the doors-2024: 4th Edge Computing Workshop, ceur-ws.org</meeting>
		<imprint>
			<date type="published" when="2024">2024</date>
			<biblScope unit="volume">3666</biblScope>
			<biblScope unit="page" from="85" to="96" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b21">
	<analytic>
		<title level="a" type="main">Lightweight cryptography in IoT networks: A survey</title>
		<author>
			<persName><forename type="first">M</forename><surname>Rana</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Q</forename><surname>Mamun</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Islam</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Future Generation Computer Systems</title>
		<imprint>
			<biblScope unit="volume">129</biblScope>
			<biblScope unit="page" from="77" to="89" />
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b22">
	<analytic>
		<title level="a" type="main">Lightweight cryptography: a solution to secure IoT</title>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">S</forename><surname>Dhanda</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Singh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Jindal</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Wireless Personal Communications</title>
		<imprint>
			<biblScope unit="volume">112</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="1947" to="1980" />
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b23">
	<analytic>
		<title level="a" type="main">Speck-R: An ultra light-weight cryptographic scheme for Internet of Things</title>
		<author>
			<persName><forename type="first">L</forename><surname>Sleem</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Couturier</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Multimedia Tools and Applications</title>
		<imprint>
			<biblScope unit="volume">80</biblScope>
			<biblScope unit="issue">11</biblScope>
			<biblScope unit="page" from="17067" to="17102" />
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b24">
	<analytic>
		<title level="a" type="main">ModiAn analysis of lightweight cryptographic algorithms for IoT-Applications</title>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">A</forename><surname>Chauhan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">R</forename><surname>Patel</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Parikh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">International Conference on Advancements in Smart Computing and Information Security</title>
				<meeting><address><addrLine>Cham, Switzerland</addrLine></address></meeting>
		<imprint>
			<publisher>Springer Nature</publisher>
			<date type="published" when="2022">2022</date>
			<biblScope unit="page" from="201" to="216" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b25">
	<analytic>
		<title level="a" type="main">Automated Detection of Ciphertext Sidechannel Vulnerabilities in Cryptographic Implementations</title>
		<author>
			<persName><forename type="first">S</forename><surname>Deng</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Li</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Tang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Wang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Yan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Zhang</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">USENIX Security Symposium, USENIX Security</title>
				<imprint>
			<date type="published" when="2023">2023</date>
			<biblScope unit="volume">23</biblScope>
			<biblScope unit="page" from="6843" to="6860" />
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
