
94% of researchers rate our articles as excellent or good
Learn more about the work of our research integrity team to safeguard the quality of each article we publish.
Find out more
ORIGINAL RESEARCH article
Front. Comput. Sci.
Sec. Computer Security
Volume 7 - 2025 | doi: 10.3389/fcomp.2025.1522184
This article is part of the Research Topic Cyber Security Prevention, Defenses Driven by AI, and Mathematical Modelling and Simulation Tools View all 4 articles
The final, formatted version of the article will be published soon.
You have multiple emails registered with Frontiers:
Please enter your email address:
If you already have an account, please login
You don't have a Frontiers account ? You can register here
The swift advancement of the Internet of Things (IoT) across several industries underscores its revolutionary capacity to gather, process, and transmit real-world data over interconnected networks. This extraordinary development presents significant security issues, especially with the safeguarding of sensitive information produced by IoT devices. The extensive use of compact computer devices, including wireless sensors, RFID tags, and embedded systems, has markedly heightened data susceptibility. With the proliferation and capabilities of IoT devices, they are expected to manage substantial quantities of sensitive data, requiring comprehensive security frameworks to guarantee secure data transfer and storage. Traditional encryption methods such as AES and RSA, although successful in conventional computer contexts, sometimes prove inadequate for IoT applications due to their substantial processing demands and susceptibility to resource-based assaults. These constraints highlight the necessity for light-weight encryption methods that can deliver strong security without burdening the resource-limited characteristics of IoT devices. Contemporary lightweight encryption techniques, especially those focused on picture data, frequently entail pixel-level modifications and positioning adjustments. Nevertheless, these approaches sometimes demonstrate flaws, constraining their dependability and efficacy in real applications. This work aims to enhance IoT security by introducing a collection of novel lightweight cryptographic algorithms tailored for IoT healthcare equipment. The suggested approaches integrate a six-dimensional (6D) hyper-chaotic system, augmented by a Fibonacci Q-matrix, a Logistic-Parity-based chaotic map, and a Combined Transformation and Expansion (CTE) dynamic chaotic system. These methodologies seek to fulfil the dual imperatives of robust security and computing efficiency, rendering them particularly appropriate for the limited surroundings of IoT devices. The suggested models are evaluated utilising essential security measures, including the Unified Average Change Intensity (UACI), Number of Pixels Change Rate (NPCR), and Cross Entropy. The experimental findings indicate that the suggested algorithms attain enhanced encryption and decryption efficiency relative to current approaches, showcasing their capacity to provide strong data security with minimum computational burden. This research addresses the urgent requirement for effective and dependable encryption in IoT systems, especially within the healthcare sector, hence advancing the creation of secure, scalable, and resource-efficient IoT frameworks, which fosters increased confidence and acceptance of IoT technologies.
Keywords: Internet of Things, healthcare systems, medical IoT lightweight cryptography, Data transmission, encryption
Received: 04 Nov 2024; Accepted: 21 Feb 2025.
Copyright: © 2025 Muhammed Rasheed. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) or licensor are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.
* Correspondence:
Abdul Muhammed Rasheed, Noorul Islam University, Kanyakumari, India
Disclaimer: All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article or claim that may be made by its manufacturer is not guaranteed or endorsed by the publisher.
Research integrity at Frontiers
Learn more about the work of our research integrity team to safeguard the quality of each article we publish.