=Paper=
{{Paper
|id=Vol-3892/paper13
|storemode=property
|title=Resource-Efficient Solutions for Data Security at the Network Level of the Medical Internet of Things
|pdfUrl=https://ceur-ws.org/Vol-3892/paper13.pdf
|volume=Vol-3892
|authors=Inna Rozlomii,Andrii Yarmilko,Serhii Naumenko
|dblpUrl=https://dblp.org/rec/conf/iddm/RozlomiiYN24
}}
==Resource-Efficient Solutions for Data Security at the Network Level of the Medical Internet of Things==
Resource-efficient solutions for data security at the
network level of the Medical Internet of Things⋆
Inna Rozlomii1,2,†, Andrii Yarmilko2,∗,† and Serhii Naumenko2,†
1
Cherkasy State Technological University, 460, Shevchenko Blvd., Cherkasy, 18006, Ukraine
2
Bohdan Khmelnytsky National University of Cherkasy, 81, Shevchenko Blvd., Cherkasy, 18031, Ukraine
Abstract
The article focuses on resource-efficient solutions for ensuring data security at the network level of Medical
Internet of Things (MIoT) systems. Modern systems of this type use a vast number of medical devices with
limited computational resources and power capacity. To address the challenges of ensuring the
confidentiality, integrity, and availability of medical data in such systems, implementing efficient
cryptographic solutions is a necessary step. The article substantiates the importance of using lightweight
cryptographic algorithms, such as LEA, which demonstrate high performance and minimal energy
consumption—critical for the autonomous operation of medical devices. Specifically, a comparative analysis
of lightweight cryptographic algorithms and traditional methods showed that LEA encrypts three times
faster while consuming significantly less energy compared to AES-128, confirming its suitability for use in
MIoT devices. Furthermore, testing LEA revealed reduced CPU load, allowing MIoT systems to respond
faster to changes in patients' health conditions. The article also discusses promising directions for security
development in MIoT, including quantum cryptography and the use of simulation environments for
modeling cyberattacks. Emphasis is placed on the potential of quantum cryptography to provide an
unprecedented level of medical data protection, while simulation platforms enable testing of security
measures in controlled conditions with various attack scenarios on MIoT systems. The approaches proposed
in the article aim to ensure reliable protection of medical data without overloading the devices, which is
crucial for maintaining the efficiency of MIoT systems in resource-constrained environments.
Keywords
MIoT, cryptographic algorithms, LEA, AES-128, data security, network level, data confidentiality, data
integrity, energy consumption 1
1. Introduction
The Medical Internet of Things (MIoT) is one of the key directions of modern technologies,
integrating medical devices, sensors, software, and network infrastructure to ensure continuous
monitoring and management of patients' health conditions [1]. This technology creates opportunities
for improving the quality of healthcare services, reducing treatment costs, and optimizing diagnostic
and therapy processes. MIoT significantly extends the capabilities of modern medicine, allowing for
remote monitoring of patients, automated health parameter control, and timely response to changes
in their condition [2].
The number of MIoT devices is steadily increasing, driven by the growing demand for health
monitoring technologies, particularly among people with chronic diseases and elderly patients. In
2023, the MIoT market was valued at $144.23 billion USD and is expected to grow at an annual rate
of 20.4%, reaching $668.07 billion by 2030 [3]. This growth is attributed to the increasing use of
medical devices, such as stationary devices, implantable medical devices, and wearable devices,
which are becoming more popular due to improved access to technology and government healthcare
initiatives [4]. Among the most common MIoT devices are wearable gadgets for monitoring heart
IDDM’24: 7th International Conference on Informatics & Data-Driven Medicine, November 14–16, 2024, Birmingham, UK
∗
Corresponding author.
†
These authors contributed equally.
inna-roz@ukr.net (I. Rozlomii); a-ja@ukr.net (A. Yarmilko); naumenko.serhii1122@vu.cdu.edu.ua (S. Naumenko)
0000-0001-5065-9004 (I. Rozlomii); 0000-0003-2062-2694 (A. Yarmilko); 0000-0002-6337-1605 (S. Naumenko)
© 2024 Copyright for this paper by its authors. Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0).
CEUR
ceur-ws.org
Workshop ISSN 1613-0073
Proceedings
rate, glucose levels, blood pressure, and other vital indicators, as well as medical implants and devices
for remote therapy control. In recent years, the MIoT market has shown rapid growth in the number
of devices installed in hospitals, clinics, and even at home (Figure 1). It is expected that by 2025, the
number of medical IoT devices will increase several times. These trends indicate the need for
significant measures to ensure their security [5], as MIoT networks transmit vast amounts of
sensitive and critical information related to medical procedures and decisions.
Figure 1: Dynamics of MIoT device implementation.
Structurally, MIoT consists of several layers, specifically the application, network, and physical
layers. This three-layer architecture is depicted in Figure 2. The application layer encompasses
software solutions and interfaces that interact with users, such as healthcare professionals or
patients. Application programs analyze data obtained through medical sensors and use it to assist in
decision-making aimed at improving the efficiency of medical care. The network layer is responsible
for data transmission between devices, servers, and cloud solutions. It ensures information exchange
between different elements of the system but is vulnerable to cyberattacks, which can affect the
confidentiality, integrity, and availability of data. The physical layer includes medical devices,
sensors, and other hardware components that directly collect data from patients. This layer is the
foundation of the entire MIoT system but is also susceptible to physical interference and device
failures.
Figure 2: Three-layer MIoT architecture.
The high sensitivity of the data processed in MIoT makes research in this area highly relevant.
Since MIoT systems work with confidential medical information that is subject to strict regulatory
requirements, ensuring data protection is a critical task [6]. Any data breach or compromise can have
serious consequences for both patient health and the legal status of medical institutions. Moreover,
data security is a crucial aspect of maintaining patient trust in medical technologies, as any data loss
can significantly impact the reputation of healthcare facilities [7].
At the same time, the limited computational power and energy resources of most medical devices
make resource efficiency one of the main requirements for ensuring security in MIoT [8]. Traditional
encryption methods, which typically require substantial computational and energy resources, are
not optimal for such systems. Therefore, implementing lightweight cryptographic solutions that do
not overburden devices becomes an urgent necessity [9]. This approach allows for effective data
protection while preserving the autonomy and functionality of the devices for extended periods.
Given the structure of MIoT, protection at the network level is particularly important, as it is at
this level that data is transmitted between devices and external systems [10]. The network level is
one of the most vulnerable components in this structure, and attacks at this level can have critical
consequences, including data interception, alteration, or loss. Considering that medical devices often
operate in real time, ensuring reliable data security in the network becomes one of the key aspects
of safety [11]. The use of resource-efficient protection methods, such as lightweight cryptographic
algorithms, helps reduce the risk of attacks without overloading the devices, which is especially
relevant for medical applications where every second counts.
The aim of this research is to develop and analyze resource-efficient methods for data protection
at the network level of the Medical Internet of Things, which provide an appropriate level of security
considering the limited resources of medical devices. Ensuring compliance with these criteria will
improve the security of MIoT systems while maintaining their effectiveness and reliability in
working with patients.
2. Background research
Currently, the results of numerous studies on data security in MIoT devices have been published.
Researchers have considered various approaches to information protection using both traditional
and lightweight cryptographic algorithms. Specifically, Qiu et al. analyzed the application of
standard encryption methods for data security in medical systems. This study discussed the
challenges of adapting these methods to devices with limited computational resources, emphasizing
the need to reduce energy consumption and computational costs [12].
Additionally, the study conducted by Prince and Lovesum focuses on the use of protocols that
take into account the specifics of medical devices, such as protecting data during transmission from
wearable devices to cloud services [13]. The authors developed a lightweight encryption protocol
capable of providing the required level of security without significant processor load, which confirms
its applicability in real-world scenarios.
The study by Deebak, Al-Turjman, Aloqaily, and Alfandi focuses on improving authentication
mechanisms for medical IoT devices by proposing innovative biometric-based schemes that can
effectively counter modern threats, such as man-in-the-middle (MITM) attacks [14]. This enhances
network-level security and provides an additional layer of data protection.
In another work, Kumar, Gupta, and Tripathi examined the impact of cyber threats on the
network level of MIoT, proposing enhanced authentication and access methods [15]. Of particular
note is the study conducted to evaluate the effectiveness of lightweight cryptographic algorithms,
such as Lightweight Encryption Algorithm (LEA), GIFT, and others, in medical devices, highlighting
their suitability for reducing the load on systems with limited resources. These works justify the use
of resource-efficient methods capable of providing the required level of security without significant
performance loss.
However, considering the continuous expansion of MIoT networks and increasing demands for
data confidentiality and integrity, the need to find new resource-efficient solutions for network-level
security remains relevant. Current research continues to focus on the development of new
cryptographic schemes that consider MIoT device limitations, effectively protect data under
constrained computational resources, and ensure low energy consumption, which is critical for
medical applications. These aspects define future directions for MIoT security research, aiming not
only to enhance security but also to ensure the practicality of solutions in real-world medical IoT
device environments.
3. Network level attacks in MIoT
The network layer of MIoT is one of the most vulnerable because devices transmit sensitive medical
data over various communication channels, often using weakly protected protocols [16]. The main
threats at this layer arise from weak protection of communication protocols, lack of reliable
authentication, unencrypted connections, and poor network segmentation. This makes MIoT
systems susceptible to various attacks that can compromise the confidentiality, integrity, and
availability of medical data [17]. Network-level attacks can have serious consequences for medical
systems. They can lead to data access loss, manipulation of patient metrics, theft of sensitive
information, and even the disruption of critical medical processes. These attacks are often aimed at
intercepting traffic, interfering with data transmission, or disabling network services used by MIoT
devices [18]. Table 1 presents the main vulnerabilities of the MIoT network layer.
Table 1
Main vulnerabilities of the MIoT network layer
Type of attack Description Protection methods
MITM Interception of communication Implementation of TLS/DTLS,
between MIoT devices and central data encryption, robust
systems for spying, altering, or authentication.
injecting false data.
DoS/DDoS Overloading MIoT devices or networks Network segmentation, traffic
with traffic, making them unavailable. filtering, use of IDPS (Intrusion
Detection and Prevention
Systems).
Ransomware Encrypting critical medical data to Regular backups, software
demand a ransom for unlocking it. updates, multi-factor
authentication.
Data Breaches Exploiting vulnerabilities to steal Data encryption, access control,
confidential patient information. traffic monitoring.
Remote Code Remote execution of malicious code on Software updates, use of secure
Execution (RCE) MIoT devices through software protocols, access control.
vulnerabilities.
Replay Attacks Intercepting and retransmitting Use of one-time session keys,
legitimate data between devices and replay protection.
servers, deceiving the system.
Device Takeover Maliciously gaining control over Strong authentication, access
devices to alter settings or disable control, device monitoring.
them.
In addition to analyzing attacks, an important step is to build a model for implementing threats
at the network level, which allows for a clear assessment of the risks to the system and its vulnerable
points. A unified approach is proposed for constructing a mathematical model that considers the key
parameters of network attacks, such as the volume of intercepted traffic, the effectiveness of
encryption, and protective mechanisms (1). This model enables an accurate assessment of the
probability of a successful attack and aids in developing more robust protection strategies for the
MIoT system at the network level.
T L 1 (1)
∑()*+( " ∙ $ ∙ ) ∙ (1 − E' ) ∙ A(
T# L% S&
P! = ,
n
where P! – is the overall probability of a successful attack at the network level, n – is the number
of attacks or attack attempts, T" – is the volume of malicious traffic or data transmitted by the
attacker, T# – is the bandwidth of the protective system (firewalls, IDS/IPS, gateways), L$ – is the
number of compromised packets or data, L% – is the total volume of data transmitted in the network,
S& – is the effectiveness of the encryption used to protect the traffic (measured in bits), E' – is the
effectiveness of the implemented protective mechanisms (including encryption, authentication,
network segmentation), and A( – is the level of network availability or its resilience to attacks.
,
According to the model, the ratio ,! characterizes the system's ability to handle malicious traffic
"
or data transmitted by the attacker. If the volume of malicious data entering the network significantly
exceeds the bandwidth of the protection system, the probability of a successful attack increases. The
-
ratio # indicates the proportion of compromised traffic among the total volume of transmitted data.
-$
The more compromised data in the network, the higher the attacker's chances of gaining control
over the information. The parameter 𝑆. accounts for the effectiveness of encryption: the stronger
the encryption, the lower the probability that the attacker will successfully decrypt the intercepted
data. The effectiveness of the system is also influenced by the parameter E' , which reflects the level
of implemented security measures. If the protective mechanisms are reliable and well-configured,
the overall probability of a successful attack decreases. A high probability of success P! means that
the attacker manages to bypass or break the defenses, while a low value indicates the system's ability
to effectively handle threats.
Effective protection at the network level includes the implementation of secure data transmission
protocols, such as Transport Layer Security (TLS) or Datagram Transport Layer Security (DTLS),
reliable authentication methods, and network segmentation to minimize risks [19, 20]. The
implementation of these measures helps to protect medical data, maintain the confidentiality and
integrity of transmitted information, and reduce the likelihood of unauthorized access to devices.
4. Resource-efficient solutions for data security in MIoT
The development of resource-efficient solutions for data security in MIoT is an extremely important
task due to the limited computational resources of medical devices. As mentioned, MIoT consists of
numerous sensors, wearable gadgets, and stationary medical devices used for monitoring patient
health, collecting, and transmitting sensitive medical information. In such conditions, traditional data
protection methods may be ineffective due to their inherent high demands on computational power
and energy consumption.
Resource-efficient solutions focus on optimizing existing technologies and implementing new
approaches that provide the necessary level of security with minimal energy and resource
expenditure [21]. Key directions include the implementation of lightweight cryptographic
algorithms that reduce the load on the processor and architectural solutions that enhance network
protection while maintaining performance [22]. These approaches help create secure, efficient, and
energy-saving systems capable of resisting modern cyber threats.
An important component of resource-efficient solutions is the adaptation of security protocols
and algorithms for operation under low power and limited computational resources [23]. This
includes not only lightweight encryption algorithms but also specialized architectural solutions that
reduce risks at the network level while ensuring a high level of reliability and data confidentiality.
In particular, a multi-layered approach to security reduces the likelihood of data compromise,
enhancing the overall resilience of network systems.
4.1. Resource-efficient cryptographic algorithms for data protection at the
network level of MIoT
Resource-efficient cryptographic algorithms are key components for ensuring data security in MIoT,
where it is critically important to maintain a balance between security and the limited computational
resources of devices. Effective encryption ensures the confidentiality and integrity of data
transmitted between MIoT devices and servers, minimizing the risks of compromise. The main
challenge lies in selecting cryptographic algorithms that fit the limited resources of devices with low
computational power and energy consumption.
One of the key tasks is choosing the appropriate cryptographic algorithm. Lightweight algorithms
such as LEA, GIFT, and SPECK provide high data processing speeds with minimal resource load on
devices [24]. LEA offers high speed and low energy consumption, making it an ideal choice for low-
power MIoT devices. GIFT and SPECK algorithms also have minimal resource requirements and are
suitable for devices with limited computational capabilities [25]. In some cases, optimized AES may
be used for more powerful devices, providing a high level of security with minor adjustments.
The integration of encryption can be implemented at the software and firmware level of the
device. Modern MIoT devices allow firmware updates to add encryption features, and cryptographic
libraries such as mbedTLS or WolfSSL support lightweight algorithms [26]. This enables devices to
maintain efficiency while protecting data from compromise.
Encrypting data at the transmission stage is also an important component of protection. The use
of protocols such as TLS or DTLS ensures reliable encryption of data transmitted between devices
and cloud services, safeguarding them from interception. Asymmetric algorithms are used for key
exchange, providing secure transmission of keys for subsequent symmetric encryption.
Additionally, protecting data at the device level is crucial for ensuring their security in the event
of device compromise. The use of flash or RAM encryption helps safeguard data even in cases of
physical access to the device. Some MIoT devices support hardware encryption, which enables faster
data processing and reduces the load on the processor.
Key management is a critical aspect of data protection. Securely storing keys in specialized
hardware modules (Secure Element) and regularly updating keys prevent the use of vulnerable or
compromised keys, maintaining a reliable level of security.
Based on the analysis of resource-efficient cryptographic algorithms and the need for data
protection at the network level of MIoT, an important step is to build a secure system architecture.
This architecture embodies the integration of modern cryptographic solutions into the software and
hardware of MIoT devices and demonstrates how data protection is ensured during transmission
over the network. Below is the structure of the secure MIoT system, which illustrates in detail the
processes of data encryption, key management, and secure information transmission channels
(Figure 3). The presented diagram illustrates the interaction of MIoT devices with cloud services
through secure channels, focusing on ensuring the confidentiality and integrity of the transmitted
data.
Figure 3: Architecture of the secure MIoT system.
The integration of cryptographic libraries into the device firmware enables encryption at both
the storage level and during data transmission. The key management system (Secure Elements)
provides secure storage and updating of cryptographic keys, reducing the risk of their compromise
and enhancing the overall security of the system.
4.2. Architectural solutions for enhancing security at the network level
Resource-efficient architectural solutions are crucial for ensuring the security of MIoT, as they allow
for the effective use of limited computational and energy resources of devices. The network level of
MIoT is vulnerable to various types of attacks, making resource-efficient approaches aimed at
reducing risks without significantly burdening the system critically important for data protection
and the stable operation of devices.
Resource-efficient architectural solutions include:
1. Network segmentation with traffic minimization. Dividing devices into different virtual
networks (VLANs) optimizes the use of network resources, reduces unnecessary traffic, and
ensures data protection in each segment separately. Utilizing segmentation decreases the
load on devices and improves the overall system performance.
2. Implementation of lightweight security gateways. Security gateways with minimal
computational resource requirements monitor traffic and filter data. They can detect
suspicious connections and control access to critical services, preventing unauthorized access
to MIoT devices.
3. Integration of lightweight intrusion detection and prevention systems (IDPS).
Lightweight IDPS are recommended for MIoT devices, as they can operate under limited
resources. These systems provide real-time attack detection with minimal impact on device
performance. They effectively identify anomalous actions, such as man-in-the-middle
(MITM) attacks or DDoS attempts, allowing for timely responses to threats.
4. Optimized network-level encryption. Implementing TLS or DTLS protocols ensures
traffic encryption between devices and servers with minimal energy costs. These protocols
can be configured to use lightweight algorithms, such as LEA or GIFT, which provide reliable
protection without significantly reducing data processing speed.
5. Automated security policy management. Utilizing automated systems for managing
access policies and monitoring the network allows for rapid adaptation to changes in the
network environment, reducing the need for manual intervention and minimizing the risk of
human errors.
The listed resource-efficient architectural solutions provide reliable protection at the network
level of MIoT without significantly negatively impacting the computational capabilities of devices.
Overall, optimizing network processes, minimizing traffic, and using effective threat detection
methods contribute to enhancing the security and stability of MIoT systems.
5. Comparison of proposed methods with traditional approaches
One of the key advantages of the proposed solutions is their low energy consumption, which is
critical for battery-operated MIoT devices or those with limited energy resources. The use of
lightweight algorithms, such as LEA, significantly extends the battery life of devices as they perform
computations faster and with lower energy expenditure.
The proposed resource-efficient cryptographic algorithms, such as LEA, GIFT, and SPECK, differ
significantly from traditional algorithms like AES and RSA in terms of efficiency and adaptation to
the resource capabilities of MIoT devices. In particular, lightweight algorithms utilize simplified
operations, such as XOR, addition, and shifting, which greatly reduce computational costs and
energy requirements. Traditional algorithms, while providing a high level of security, often overload
MIoT devices due to the complexity of computations and high energy consumption.
During the experiment, several cryptographic algorithms were tested on real models of resource-
constrained microcontrollers, such as Texas Instruments CC2538 and NXP Kinetis KL02. The testing
included a comparison of metrics such as encryption execution time, power consumption, and impact
on the overall performance of the device (Table 2).
Table 2
Operational characteristics of cryptographic algorithms
Algorithm Encryption time (ms) Energy consumption (mW) CPU load (%)
LEA 1.5 18 5
GIFT 1.8 20 6
SPECK 2.0 22 7
AES-128 4.5 38 12
RSA 10.0 65 20
The comparison showed that the resource-efficient algorithms LEA, GIFT, and SPECK have
significantly better performance and energy consumption metrics compared to traditional
algorithms like AES-128 and RSA. The advantage of 2-3 times faster encryption execution with
simultaneously lower CPU load and significantly reduced energy consumption provided by
lightweight algorithms is critically significant for MIoT devices.
The security aspects of using lightweight algorithms are also noteworthy: although they are less
complex than traditional ones, they can effectively withstand most types of attacks, including those
at the network level. The proposed architectural solutions, such as network segmentation and the
implementation of lightweight security gateways, further enhance protection by minimizing the
risks of data interception and unauthorized access.
6. Analysis of efficiency
The proposed resource-efficient cryptographic solutions were tested in a software environment
using the Python programming language. Undoubtedly, due to the relatively low speed of the
resulting applications, Python is not an optimal language for the industrial implementation of
cryptographic algorithms. However, it offers significant advantages as a testing and modeling tool
in research settings. Its high-level syntax and extensive library ecosystem, such as cryptography and
pycryptodome, allow for rapid prototyping and a focus on evaluating algorithm efficiency without
significant time investment in implementation. With a broad selection of libraries for simulation
modeling and performance analysis (notably timeit for measuring execution time and psutil for
resource monitoring), Python simplifies experiment execution and data collection regarding
efficiency. Its cross-platform nature also ensures versatility for running tests across different
environments, which is important for verifying algorithm robustness. Thus, Python serves as a
convenient tool for the preliminary evaluation of cryptographic algorithms before low-level
implementation in languages optimized for performance, like C or C++.
To ensure accuracy and objectivity in evaluating cryptographic algorithms, a specialized research
testbed was created. Its functionality allows for measuring key performance parameters in conditions
close to real-world scenarios for MIoT devices. The foundation of these experiments included the
following components:
1. Hardware. Testing was conducted on a computer equipped with an Intel Core i5 processor
and 8 GB of RAM, providing sufficient computational power for simulating MIoT devices. To
evaluate the performance of cryptographic algorithms in resource-constrained
environments, an ESP32-WROOM-32 microcontroller was used as additional hardware.
Power consumption was measured using a power module with power-monitoring
capabilities.
2. Software. Experiments were conducted in a Linux environment (Ubuntu 20.04) using Python
libraries, such as cryptography for AES-128 and specialized lightweight libraries for LEA.
Performance measurement tools included timeit and psutil.
3. Methodology. Encryption was performed on instances of randomly generated data with a
size of 1 KB. The resource demand of the algorithms was evaluated under representative
conditions with the following metrics: execution time for encryption and decryption
operations, power consumption, and CPU load. To ensure the reliability of results, each
algorithm underwent a series of 10 test runs under stable conditions. After each encryption
cycle, power consumption measurements were taken. Measurements were recorded using
specialized power analysis equipment connected to the ESP32-WROOM-32 microcontroller
on which the algorithms were tested. This setup provided actual data on CPU load and energy
consumption. The effectiveness of security mechanisms was tested by simulating various
attacks, including MITM, DoS, and DDoS, in a controlled environment. For this purpose,
specialized scripts were used to model malicious traffic behavior and the system's response
to it. Specifically, during DoS attacks, the system's ability to maintain stable operation under
load was monitored, while during MITM attacks, the resilience of security algorithms to data
interception was assessed. All processes were tracked using an Intrusion Detection System
(IDS) to log traffic anomalies. Network resilience was evaluated by calculating the probability
of a successful attack, taking into account the system's capability to filter malicious traffic.
The simulation approach allowed precise control over the encryption process, enabling
performance assessment and comparison of lightweight algorithms with traditional methods. For
testing, the lightweight LEA algorithm and the traditional AES-128 were selected. The tools used for
their analysis are presented in Figure 4. Both functions are designed to measure the time required to
encrypt random data (based on os.urandom) using the LEA and AES-128 algorithms in ECB mode.
The encryption process includes key generation, data encryption, and execution time measurement.
According to the experiment results, LEA achieved the following: encryption time – 0.0015 seconds,
power consumption – 18 mW, CPU load – 5%. For AES-128, the data obtained were: encryption time
– 0.0045 seconds, power consumption – 38 mW, CPU load – 12%.
Figure 4: Functions for testing encryption with LEA and AES-128.
Thus, the experiment confirmed that lightweight algorithms are significantly more efficient than
traditional ones in resource-constrained systems, providing fast encryption with lower energy
consumption. The anomalies detected by the IDS confirmed the high effectiveness of lightweight
algorithms in identifying and blocking threats. Consequently, they can effectively counteract attacks
without overloading the system, specifically by maintaining stable CPU load and minimal energy
consumption even during active exposure to malicious factorsthem.
7. Discussion
In addition to the successful testing of the advantages of lightweight cryptographic algorithms, an
important aspect is the identification of promising directions for the further development of data
protection in MIoT. Among the key trends that could significantly enhance security in medical
networks are quantum cryptography and simulation environments for modeling cyberattacks and
testing security effectiveness.
Although the implementation of quantum cryptography in MIoT is currently somewhat
challenging due to technical limitations and high costs, its potential in the future is undeniable.
Quantum algorithms have the ability to provide an exceptionally high level of security due to the
properties of quantum mechanics, such as the impossibility of cloning quantum states and detecting
interception attempts. The prospects of integrating quantum cryptography into MIoT open new
opportunities for securing sensitive medical information. One example is the use of Quantum Key
Distribution (QKD) to ensure secure data transmission. However, this requires further research into
optimizing quantum solutions for the limited resources of MIoT devices.
Another important direction is the development and use of simulation environments for modeling
cyberattacks and testing protective measures. Since real attacks on MIoT systems can have
catastrophic consequences for patient health, simulations allow for the prior assessment of network
vulnerabilities and the effectiveness of protective measures. Modern simulation platforms provide
the ability to detail various attack scenarios, such as Man-in-the-Middle (MITM) attacks, DDoS, and
others. They also allow for testing defensive measures, such as lightweight cryptographic algorithms,
for resilience against various types of threats under controlled conditions. This may include
simulating interactions between devices, data transmission, and the application of security protocols.
With the development of such simulation environments, researchers can quickly test new algorithms
and architectural solutions, evaluate their effectiveness, and identify potential weaknesses without
risking real systems. This also opens opportunities for building effective machine learning models
capable of automatically identifying potential threats and adapting security strategies.
In the context of resource-efficient solutions, an important direction is also the development of
artificial intelligence technologies for automatic threat detection and anomaly identification in MIoT
systems. The integration of machine learning algorithms allows for the creation of adaptive security
systems that not only respond to known attacks but also predict potential threats based on real-time
analysis of large data sets.
Thus, the prospect of integrating quantum technologies, simulation environments, and artificial
intelligence into MIoT security systems opens new horizons for enhancing network-level security
and effectively utilizing the resources of medical devices. Further development in these areas will be
a crucial step towards ensuring the reliable operation of MIoT systems.
8. Conclusion
The results of the conducted research confirmed the effectiveness of the proposed resource-efficient
solutions for data protection at the network level of MIoT systems. Special attention was given to
the use of lightweight cryptographic algorithms, such as LEA, and their advantages compared to
traditional algorithms like AES-128. The testing demonstrated that lightweight algorithms provide
fast encryption and low energy consumption, which is critically important for medical devices with
limited resources. The use of LEA reduced the encryption time by almost three times compared to
AES-128, with more than twice the energy savings. This shows that the proposed methods are not
only effective in terms of security but also help preserve the energy resources of devices, extending
their autonomous operation. Considering that many MIoT devices operate on batteries or have
limited power, such reductions in energy consumption represent a significant advantage.
Additionally, during the testing with LEA, a significantly lower CPU load was also observed, which
is important for maintaining stable operation of devices in real-time. This advantage is critically
significant in a medical context, as reducing the load on processing components will allow MIoT
systems to respond more quickly to changes in patients' health conditions.
Undoubtedly, it is worth noting that while lightweight cryptographic algorithms demonstrate
excellent results in terms of energy efficiency and speed, they may offer lower levels of security
compared to more complex algorithms like AES-128. However, in the context of MIoT, where it is
important to ensure a balance between security and efficiency, lightweight algorithms such as LEA
offer an optimal solution.
Further research could focus on expanding the range of tested algorithms, including additional
lightweight algorithms, and analyzing their effectiveness under different conditions. Investigating
methods for integrating lightweight algorithms into real MIoT devices, taking into account their
limited computational power, is also important.
9. Declaration on Generative AI
During the preparation of this work, the authors didn’t use Generative AI.
References
[1] N. Akhtar, S. Rahman, H. Sadia, Y. Perwej, A holistic analysis of Medical Internet of Things
(MIoT), Journal of Information and Computational Science 11(4) (2021) 209-222.
[2] K. Kakhi, R. Alizadehsani, H. D. Kabir, A. Khosravi, S. Nahavandi, U. R. Acharya, The internet
of medical things and artificial intelligence: trends, challenges, and opportunities,
Biocybernetics and Biomedical Engineering 42(3) (2022) 749-771.
[3] Internet of Medical Things (IoMT) Market Size, Share & Trends Analysis Report By End-use
(Hospitals, Clinics), By Component (Software, Services), By Deployment (Cloud, On-premise),
By Application, By Region, And Segment Forecasts, 2023-2030, 2022. URL:
https://www.grandviewresearch.com/industry-analysis/internet-of-medical-things-iomt-
market-report.
[4] Internet of Medical Things (IoMT) Market Size, Share & Industry Analysis, By Product
(Stationary Medical Devices, Implanted Medical Devices, and Wearable External Medical
Devices), By Application (Telemedicine, Medication Management, Patient Monitoring, and
Others), By End-user (Healthcare Providers, Patients, Government Authorities, and Others), and
Regional Forecast, 2024-2032, 2023. URL: https://www.fortunebusinessinsights.com/industry-
reports/internet-of-medical-things-iomt-market-101844.
[5] IoT Medical Devices Market Size, Share & Trends [2028], 2023. URL:
https://www.marketsandmarkets.com/Market-Reports/iot-medical-device-market-
15629287.html.
[6] Y. Perwej, N. Akhtar, N. Kulshrestha, P. Mishra, A Methodical Analysis of Medical Internet of
Things (MIoT) security and privacy in current and future trends, Journal of Emerging
Technologies and Innovative Research 9(1) (2022) d346-d371.
[7] M. Al-Emran, S. I. Malik, M. N. Al-Kabi, A survey of Internet of Things (IoT) in education:
Opportunities and challenges, in: A. Hassanien, R. Bhatnagar, N. Khalifa, M. Taha (eds), Toward
Social Internet of Things (SIoT): Enabling Technologies, Architectures and Applications. Studies
in Computational Intelligence, vol. 846. Springer, Cham, 2020, pp. 197-209. doi:10.1007/978-3-
030-24513-9_12.
[8] S. Pal, M. Hitchens, T. Rabehaja, S. Mukhopadhyay, Security requirements for the internet of
things: A systematic approach, Sensors 20(20) (2020) 5897.
[9] I. Rozlomii, A. Yarmilko, S. Naumenko, P. Mykhailovskyi, IoT Smart Implants: Information
Security and the Implementation of Lightweight Cryptography, in: Proceedings of the 6th
International Conference on Informatics & Data-Driven Medicine, IDDM’2023, ceur-ws.org, vol.
3609, 2023, pp. 145–156.
[10] T. Almehmadi, S. Alshehri, S. Tahir, A secure fog-cloud based architecture for MIoT, in: 2019
2nd International Conference on Computer Applications & Information Security, ICCAIS, IEEE,
2019, pp. 1-6.
[11] N. N. Thilakarathne, H. D. Weerasinghe, A. Welhenge, A Multilayered Hybrid Access Control
Model for Cloud-Enabled Medical Internet of Things, in: Sustainable Advanced Computing:
Select Proceedings of ICSAC 2021, Springer Singapore, Singapore, 2022, pp. 455-471.
[12] H. Qiu, M. Qiu, M. Liu, G. Memmi, Secure health data sharing for medical cyber-physical
systems for the healthcare 4.0, IEEE journal of biomedical and health informatics 24(9) (2020)
2499-2505.
[13] P. B. Prince, S. J. Lovesum, Privacy enforced access control model for secured data handling in
cloud-based pervasive health care system, SN Computer Science 1(5) (2020) 239.
[14] B. D. Deebak, F. Al-Turjman, M. Aloqaily, O. Alfandi, An authentic-based privacy preservation
protocol for smart e-healthcare systems in IoT, IEEE Access 7 (2019) 135632-135649.
[15] P. Kumar, G. P. Gupta, R. Tripathi, An ensemble learning and fog-cloud architecture-driven
cyber-attack detection framework for IoMT networks, Computer Communications 166 (2021)
110-124.
[16] M. K. Hasan, T. M. Ghazal, R. A. Saeed, B. Pandey, H. Gohel, A. A. Eshmawi, S. Abdel-Khalek,
H. M. Alkhassawneh, A review on security threats, vulnerabilities, and counter measures of 5G
enabled Internet‐of‐Medical‐Things, IET communications 16(5) (2022) 421-432.
[17] A. Omotosho, B. Ayemlo Haruna, Mikail O. Olaniyi, Threat modeling of internet of things health
devices, Journal of Applied Security Research 14(1) (2019) 106-121.
[18] J. P. A. Yaacoub, M. Noura, H. N. Noura, O. Salman, E. Yaacoub, R. Couturier, A. Chehab,
Securing internet of medical things systems: Limitations, issues and recommendations, Future
Generation Computer Systems 105 (2020) 581-606.
[19] A. Ostad-Sharif, H. Arshad, M. Nikooghadam, D. Abbasinezhad-Mood, Three party secure data
transmission in IoT networks through design of a lightweight authenticated key agreement
scheme, Future Generation Computer Systems 100 (2019) 882-892.
[20] A. Ullah, M. Azeem, H. Ashraf, A. A. Alaboudi, M. Humayun, N. Z. Jhanjhi, Secure healthcare
data aggregation and transmission in IoT – A survey, IEEE Access 9 (2021) 16849-16865.
[21] I. Rozlomii, A. Yarmilko, S. Naumenko, Data security of IoT devices with limited resources:
challenges and potential solutions, in: Proceedings of the doors-2024: 4th Edge Computing
Workshop, ceur-ws.org, vol. 3666, 2024, pp. 85-96.
[22] M. Rana, Q. Mamun, R. Islam, Lightweight cryptography in IoT networks: A survey. Future
Generation Computer Systems, 129 (2022) 77-89.
[23] S. S. Dhanda, B. Singh, P. Jindal, Lightweight cryptography: a solution to secure IoT. Wireless
Personal Communications, 112(3) (2020) 1947-1980.
[24] L. Sleem, R. Couturier, Speck-R: An ultra light-weight cryptographic scheme for Internet of
Things. Multimedia Tools and Applications, 80(11) (2021) 17067-17102.
[25] J. A. Chauhan, A. R. Patel, S. Parikh, N. ModiAn analysis of lightweight cryptographic
algorithms for IoT-Applications, in: International Conference on Advancements in Smart
Computing and Information Security, Springer Nature, Cham, Switzerland, 2022, pp. 201-216.
[26] S. Deng, M. Li, Y. Tang, S. Wang, S. Yan, Y. Zhang, Automated Detection of Ciphertext Side-
channel Vulnerabilities in Cryptographic Implementations, in: 32nd USENIX Security
Symposium, USENIX Security 23, 2023, pp. 6843-6860.