Secure and Lightweight Cipher for Resource-constrained IoT Healthcare Applications using Snake Key Generation

The integration of the Internet of Things (IoT) in healthcare has transformed the monitoring of physiological parameters, significantly enhancing the capabilities of medical diagnostics and patient care. This study explores the use of advanced cryptographic techniques to secure IoT healthcare syste...

Full description

Saved in:
Bibliographic Details
Main Authors: Saja Kareem Ismael, Mohamed Ibrahim Shujaa, Ahmed Bahaaulddin A. Alwahhab
Format: Article
Language:English
Published: Al-Khwarizmi College of Engineering – University of Baghdad 2025-03-01
Series:Al-Khawarizmi Engineering Journal
Subjects:
Online Access:https://alkej.uobaghdad.edu.iq/index.php/alkej/article/view/962
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1850228870894059520
author Saja Kareem Ismael
Mohamed Ibrahim Shujaa
Ahmed Bahaaulddin A. Alwahhab
author_facet Saja Kareem Ismael
Mohamed Ibrahim Shujaa
Ahmed Bahaaulddin A. Alwahhab
author_sort Saja Kareem Ismael
collection DOAJ
description The integration of the Internet of Things (IoT) in healthcare has transformed the monitoring of physiological parameters, significantly enhancing the capabilities of medical diagnostics and patient care. This study explores the use of advanced cryptographic techniques to secure IoT healthcare systems, particularly through block chain (BC) technology. Moreover, this study evaluates the effectiveness of two cryptographic key generators—bee swarm key generator and snake key generator—in enhancing data security within a BC-based framework for remote patient monitoring. Our study conducts a series of NIST randomness tests to compare the performance of these key generators in terms of randomness, resilience to cryptographic attacks and computational efficiency. Results show that the snake key generator outperforms the bee swarm key generator, demonstrating higher randomness in key generation and better secure coverage of the orientation space. This finding is crucial for securing important healthcare data, especially given the complexity of IoT devices, which transmit vital patient health information. Furthermore, this study examines the double-layer encryption architecture used to secure data in at rest and during transmission from a sensor’s gathering location to long-term storage. This approach is essential to preserve the privacy and integrity of patient data, which is critical for maintaining trust in IoT healthcare systems. This study aims to provide a comprehensive and comparative analysis to support the continued evolution of secure, efficient and scalable cryptographic solutions within IoT healthcare, demonstrating the importance of selecting the most effective key generation technique to address the unique security challenges of this new field.
format Article
id doaj-art-dbc8a68cad1d49bf992e41053e84a89b
institution OA Journals
issn 1818-1171
2312-0789
language English
publishDate 2025-03-01
publisher Al-Khwarizmi College of Engineering – University of Baghdad
record_format Article
series Al-Khawarizmi Engineering Journal
spelling doaj-art-dbc8a68cad1d49bf992e41053e84a89b2025-08-20T02:04:24ZengAl-Khwarizmi College of Engineering – University of BaghdadAl-Khawarizmi Engineering Journal1818-11712312-07892025-03-0121110.22153/kej.2025.09.002Secure and Lightweight Cipher for Resource-constrained IoT Healthcare Applications using Snake Key GenerationSaja Kareem Ismael0Mohamed Ibrahim Shujaa1Ahmed Bahaaulddin A. Alwahhab2Electrical Engineering Technical College, Middle Technical University, Baghdad, IraqElectrical Engineering Technical College, Middle Technical University, Baghdad, IraqTechnical College of Management, Middle Technical University, Baghdad, Iraq The integration of the Internet of Things (IoT) in healthcare has transformed the monitoring of physiological parameters, significantly enhancing the capabilities of medical diagnostics and patient care. This study explores the use of advanced cryptographic techniques to secure IoT healthcare systems, particularly through block chain (BC) technology. Moreover, this study evaluates the effectiveness of two cryptographic key generators—bee swarm key generator and snake key generator—in enhancing data security within a BC-based framework for remote patient monitoring. Our study conducts a series of NIST randomness tests to compare the performance of these key generators in terms of randomness, resilience to cryptographic attacks and computational efficiency. Results show that the snake key generator outperforms the bee swarm key generator, demonstrating higher randomness in key generation and better secure coverage of the orientation space. This finding is crucial for securing important healthcare data, especially given the complexity of IoT devices, which transmit vital patient health information. Furthermore, this study examines the double-layer encryption architecture used to secure data in at rest and during transmission from a sensor’s gathering location to long-term storage. This approach is essential to preserve the privacy and integrity of patient data, which is critical for maintaining trust in IoT healthcare systems. This study aims to provide a comprehensive and comparative analysis to support the continued evolution of secure, efficient and scalable cryptographic solutions within IoT healthcare, demonstrating the importance of selecting the most effective key generation technique to address the unique security challenges of this new field. https://alkej.uobaghdad.edu.iq/index.php/alkej/article/view/962IoT healthcare; blockchain technology; cryptographic key generation; data security; NIST randomness
spellingShingle Saja Kareem Ismael
Mohamed Ibrahim Shujaa
Ahmed Bahaaulddin A. Alwahhab
Secure and Lightweight Cipher for Resource-constrained IoT Healthcare Applications using Snake Key Generation
Al-Khawarizmi Engineering Journal
IoT healthcare; blockchain technology; cryptographic key generation; data security; NIST randomness
title Secure and Lightweight Cipher for Resource-constrained IoT Healthcare Applications using Snake Key Generation
title_full Secure and Lightweight Cipher for Resource-constrained IoT Healthcare Applications using Snake Key Generation
title_fullStr Secure and Lightweight Cipher for Resource-constrained IoT Healthcare Applications using Snake Key Generation
title_full_unstemmed Secure and Lightweight Cipher for Resource-constrained IoT Healthcare Applications using Snake Key Generation
title_short Secure and Lightweight Cipher for Resource-constrained IoT Healthcare Applications using Snake Key Generation
title_sort secure and lightweight cipher for resource constrained iot healthcare applications using snake key generation
topic IoT healthcare; blockchain technology; cryptographic key generation; data security; NIST randomness
url https://alkej.uobaghdad.edu.iq/index.php/alkej/article/view/962
work_keys_str_mv AT sajakareemismael secureandlightweightcipherforresourceconstrainediothealthcareapplicationsusingsnakekeygeneration
AT mohamedibrahimshujaa secureandlightweightcipherforresourceconstrainediothealthcareapplicationsusingsnakekeygeneration
AT ahmedbahaaulddinaalwahhab secureandlightweightcipherforresourceconstrainediothealthcareapplicationsusingsnakekeygeneration