Skip to main content

ORIGINAL RESEARCH article

Front. Comput. Sci.

Sec. Computer Security

Volume 7 - 2025 | doi: 10.3389/fcomp.2025.1522184

This article is part of the Research Topic Cyber Security Prevention, Defenses Driven by AI, and Mathematical Modelling and Simulation Tools View all 4 articles

Efficient Lightweight Cryptographic Solutions for Enhancing Data Security in Healthcare Systems based on IoT

Provisionally accepted
  • Noorul Islam University, Kanyakumari, India

The final, formatted version of the article will be published soon.

    The swift advancement of the Internet of Things (IoT) across several industries underscores its revolutionary capacity to gather, process, and transmit real-world data over interconnected networks. This extraordinary development presents significant security issues, especially with the safeguarding of sensitive information produced by IoT devices. The extensive use of compact computer devices, including wireless sensors, RFID tags, and embedded systems, has markedly heightened data susceptibility. With the proliferation and capabilities of IoT devices, they are expected to manage substantial quantities of sensitive data, requiring comprehensive security frameworks to guarantee secure data transfer and storage. Traditional encryption methods such as AES and RSA, although successful in conventional computer contexts, sometimes prove inadequate for IoT applications due to their substantial processing demands and susceptibility to resource-based assaults. These constraints highlight the necessity for light-weight encryption methods that can deliver strong security without burdening the resource-limited characteristics of IoT devices. Contemporary lightweight encryption techniques, especially those focused on picture data, frequently entail pixel-level modifications and positioning adjustments. Nevertheless, these approaches sometimes demonstrate flaws, constraining their dependability and efficacy in real applications. This work aims to enhance IoT security by introducing a collection of novel lightweight cryptographic algorithms tailored for IoT healthcare equipment. The suggested approaches integrate a six-dimensional (6D) hyper-chaotic system, augmented by a Fibonacci Q-matrix, a Logistic-Parity-based chaotic map, and a Combined Transformation and Expansion (CTE) dynamic chaotic system. These methodologies seek to fulfil the dual imperatives of robust security and computing efficiency, rendering them particularly appropriate for the limited surroundings of IoT devices. The suggested models are evaluated utilising essential security measures, including the Unified Average Change Intensity (UACI), Number of Pixels Change Rate (NPCR), and Cross Entropy. The experimental findings indicate that the suggested algorithms attain enhanced encryption and decryption efficiency relative to current approaches, showcasing their capacity to provide strong data security with minimum computational burden. This research addresses the urgent requirement for effective and dependable encryption in IoT systems, especially within the healthcare sector, hence advancing the creation of secure, scalable, and resource-efficient IoT frameworks, which fosters increased confidence and acceptance of IoT technologies.

    Keywords: Internet of Things, healthcare systems, medical IoT lightweight cryptography, Data transmission, encryption

    Received: 04 Nov 2024; Accepted: 21 Feb 2025.

    Copyright: © 2025 Muhammed Rasheed. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) or licensor are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.

    * Correspondence: Abdul Muhammed Rasheed, Noorul Islam University, Kanyakumari, India

    Disclaimer: All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article or claim that may be made by its manufacturer is not guaranteed or endorsed by the publisher.

    Research integrity at Frontiers

    Man ultramarathon runner in the mountains he trains at sunset

    94% of researchers rate our articles as excellent or good

    Learn more about the work of our research integrity team to safeguard the quality of each article we publish.


    Find out more