Skip to main content

Machine learning cryptography methods for IoT in healthcare

Abstract

Background

The increased application of Internet of Things (IoT) in healthcare, has fueled concerns regarding the security and privacy of patient data. Lightweight Cryptography (LWC) algorithms can be seen as a potential solution to address this concern. Due to the high variation of LWC, the primary objective of this study was to identify a suitable yet effective algorithm for securing sensitive patient information on IoT devices.

Methods

This study evaluates the performance of eight LWC algorithms—AES, PRESENT, MSEA, LEA, XTEA, SIMON, PRINCE, and RECTANGLE—using machine learning models. Experiments were conducted on a Raspberry Pi 3 microcontroller using 16 KB to 2048 KB files. Machine learning models were trained and tested for each LWC algorithm and their performance was evaluated based using precision, recall, F1-score, and accuracy metrics.

Results

The study analyzed the encryption/decryption execution time, energy consumption, memory usage, and throughput of eight LWC algorithms. The RECTANGLE algorithm was identified as the most suitable and efficient LWC algorithm for IoT in healthcare due to its speed, efficiency, simplicity, and flexibility.

Conclusions

This research addresses security and privacy concerns in IoT healthcare and identifies key performance factors of LWC algorithms utilizing the SLR research methodology. Furthermore, the study provides insights into the optimal choice of LWC algorithm for enhancing privacy and security in IoT healthcare environments.

Peer Review reports

Background

The Internet of Things (IoT) is growing with a remarkable. As of 2020, over 18 billion IoT devices were sold and interconnected via cloud servers. It is anticipated by 2025 there will be 75 billion operational IoT devices, representing a 300 percent increase in five years [1]. This growth has led to an expansion of connected devices with the ability to collect, analyze, and transfer data.

IoT is utilized across various industries and organizational workflows, including healthcare [2] for various applications including real-time monitoring [3]. IoT has opened up new opportunities for the healthcare sector, with the potential to revolutionize the way healthcare services are delivered [2, 3]. Nonetheless, this surge leads to information security and concerns about the privacy and security of sensitive data collected and transferred [4, 5]. The integration of IoT within healthcare also raises significant concerns regarding security and privacy due to the sensitive nature of the data being collected, transmitted, and processed by IoT devices. Given that IoT devices routinely collect data from sensors, wearables, and other smart appliances, they elevate the potential for these devices to pose security threats [6]. Particularly in healthcare, IoT devices collect and transmit sensitive patient personal data [7] that should be protected against unauthorized access and alteration to maintain patient privacy and security. However, IoT devices in healthcare are often utilized by patients who may not be able to fully protect their security and privacy in the digital domain. This issue necessitates attention and needs to be addressed [8].

To address this problem, cryptographic methods are deployed to protect confidential data. However, these methods, along with security standards and protocols are still being developed and can be inconsistent. In designing and manufacturing secure IoT devices, companies experience practical challenges such as implementing standard security measures due to resource constraints inherent in small, low-cost products (Lindqvist & Neumann, 2017). Also, although traditional cryptography algorithms can safeguard sensitive data, most are resource-intensive making their usage challenging in IoT devices with constrained memory, computing capacity, and battery [9].

In this regard, Light-Weight Cryptography (LWC) algorithms have been developed, emerging as viable solutions for data protection on IoT devices. Particularly for devices with limited resources, such as IoT devices, LWC algorithms offer effective and efficient security [9]. These algorithms are well-suited for IoT applications due to their lower processing and memory requirements than traditional cryptography algorithms.

LWC algorithms have developed a significant area of research in the field of information security, driven by the rise of the applications of resource-constrained devices such as IoT, smart cards, and wireless sensors [9]. IoT devices' limited processing, storage, and energy capabilities present challenges in implementing traditional cryptographic algorithms. LWC algorithms have been developed to address this issue, characterized by their small size, fast execution, and adequate security provisions. Their primary objective is to balance security and resource consumption, rendering them suitable for deployment on IoT devices and other resource-constrained platforms.

Numerous LWC algorithms have been proposed, including AES, PRESENT, MSEA, LEA, XTEA, SIMON, PRINCE, and RECTANGLE. Their performance has been evaluated for efficiency and effectiveness in securing data on IoT devices. The US National Institute of Standards and Technology (NIST) standardized the symmetric-key encryption algorithm AES in 2001 [10]. While widely recognized for its security, high computational and memory demands make it impractical for deployment on devices with limited resources [11]. In contrast, the simple symmetric-key encryption algorithm PRESENT was introduced in 2007 [12]. Designed to be portable and efficient, PRESENT boasts a small code size and minimal power consumption. Similarly, the lightweight symmetric-key encryption algorithm MSEA, was developed in 2011 with a low computational load that optimized for the encryption and decryption of short messages [13].

Introduced in 2013, the encryption algorithm LEA prioritizes lightweight, compact, and power-efficient design, featuring minimal memory footprint [14]. TEA, TEA, a cryptographic algorithm proposed in 1995, emphasizes simplicity and efficiency with minimal code and memory requirements [15]. The group of SIMON cryptographic algorithms, released in 2013, focuses on lightweight, cost-effective, and power-efficient designs with minimal memory usage [16]. PRINCE, introduced in 2012, features small code size, minimal energy consumption, and a lightweight functional design [17]. RECTANGLE, a lightweight cryptographic algorithm proposed in 2007, has a small code size, low memory requirements, and efficiency combined with security [18].

Different studies have evaluated LWC algorithms’ effectiveness. Based on [19] LWC algorithms review, SIMON, and SPECK were identified as the most efficient algorithms for securing data on IoT devices. These algorithms facilitate secure communications among power-constrained devices without excessive resource consumption. In a comparative study by [20], PRESENT, LED, and RECTANGLE were found as most efficient algorithms in terms of speed and memory usage. Supplementary file 1 provides an overview of the related work on performance evaluation.

Machine learning for IoT security and privacy

To boost the LWC algorithms' effectiveness, Machine Learning (ML) has emerged as an effective approach integrated with LWC to develop more secure and efficient IoT systems. ML has been identified as a promising solution to address some security concerns in IoT [21, 22]. ML models can be leveraged to detect and prevent cyber-attacks and to design secure and privacy-preserving IoT systems [22]. LWC combined with ML can enhance security by identifying and responding to security threats while maintaining the requisite efficiency necessary for real-time applications.

Recent studies have highlighted the potential of ML techniques in addressing security challenges in IoT systems [23]. With ML, models can be developed to detect and prevent various security and privacy threats in IoT networks. For instance, ML models can be used to identify unusual behavior in IoT devices, indications of possible security breaches or privacy violations [24]. Additionally, ML facilitates the development of Intrusion Detection Systems (IDS) capable of identifying and preventing various types of attacks, including Distributed Denial-of-Service (DDoS) attacks and malware infections [25]. ML models further enable secure data sharing in healthcare IoT frameworks. For instance, Federated Learning (FL), an ML subset, enables the training of a global ML model using data from multiple IoT devices without the need to share the data [26]. This approach helps in maintaining data privacy data while still enabling the development of accurate ML models.

Various ML techniques have been proposed for improving the security and privacy of healthcare IoT systems, including supervised and unsupervised learning, and deep learning. Supervised learning algorithms, such as decision trees and random forests, can classify data and detect potential security breaches [27]. Unsupervised learning algorithms, including clustering and anomaly detection, are suitable for detecting patterns in data and identifying potential security breaches or unauthorized access to sensitive data [27]. Deep learning algorithms, such as convolutional neural networks and recurrent neural networks, can analyze large volumes of data and identify complex patterns within the data [28].

Several studies have demonstrated the effectiveness of ML in addressing security and privacy concerns in healthcare IoT. These ML models can be trained to identify potential security issues and prevent unauthorized access to patient data. For instance [29], developed a real-time ML-based IDS for healthcare IoT with high accuracy in detecting attacks. In another study [30], proposed an ML-based approach for privacy protection in healthcare IoT systems. The authors used a clustering algorithm to group similar data points and then applied an obfuscation technique to protect sensitive data, achieving a high degree of privacy protection while maintaining reasonable data usability.

A novel lightweight scheme for identifying IoT devices is introduced by [31]. The scheme used deep flow inspection (DFI) technology to extract flow-related statistical features. The features were further filtered using a selection method based on NSGA-III, combined with symmetric uncertainty and statistical correlation score. The method was then benchmarked using smart home IoT data and three ML algorithms.

Motivation of the study and the research gap

IoT devices in healthcare present high security vulnerabilities that can jeopardize patients' safety, expose private information, and disrupt other critical healthcare services. In this regard, LWC algorithms and ML techniques can play a critical role in enhancing privacy and security concerns in healthcare IoT systems [32]. Their integration could offer a practical response to the security and privacy challenges. These technologies hold the potential to develop more secure and private healthcare IoT systems leading to improved patient experiences and raising care standards universally.

Nevertheless, current research on suitable LWC algorithms for healthcare IoT devices remains limited. Most studies focus on comparing LWC algorithms' performance in general contexts, using diverse evaluation factors. Therefore, there is a clear need for health-focused research to identify tailored LWC algorithms considering medical IoT performance factors including:

  • (a) ‘Key size’ is important in medical IoT devices that generally have very little storage [33]. LWC algorithms with shorter key sizes (64, 96, or 128 bits) are more suitable, optimizing memory and power usage.

  • (b) ‘Processing time’ can be decreased by reducing block sizes. As medical sensors often transmit short messages, smaller block sizes enhance productivity and efficiency [18].

  • (c) ‘Energy consumption’, or the battery power required during encryption or decryption is a critical factor in IoT-based healthcare monitoring. The main driving factor is improving energy efficiency in medical IoT [34].

  • (d) ‘RAM Requirements’ must be minimized to ensure real-time medical monitoring processes function properly. This involves balancing RAM and ROM requirements to optimize device operations.

  • (e) ‘Number of Rounds’, LWC algorithms generally implement basic logic and mathematical calculations to adhere to resource limitations. The round number is raised as the outcome of performing simple procedures. As a result, when choosing an LWC algorithm for the IoT, the number of rounds is one of the important elements. For example, PRINCE lightweight algorithm intends to accomplish encryption in one clock cycle by requiring a small round number, that requires rapid completion [17].

On the other hand, despite the promising potential of ML in addressing security and privacy concerns in healthcare IoT, several challenges persist. The constrained processing power, memory, and energy resources of IoT devices [32] necessitate the design of lightweight and efficient ML algorithms. Furthermore, the development of ML models for healthcare IoT needs to be accompanied by appropriate data privacy and security protocols to protect the involved sensitive data.

Research objective

Based on the discussed limitations and given the rapidly evolving landscape of medical IoT, developing lightweight cryptographic (LWC) algorithms for IoT medical devices presents a significant challenge. Therefore, this study aims to identify the most suitable LWC algorithms that provide optimal security and performance for IoT clinical devices. Based on the unique constraints of healthcare IoT devices—such as slow processing speeds, limited memory, and constrained bandwidth—it is crucial to select LWC algorithms that balance performance with physical and functional limitations. Therefore, the following specific objectives were formulated:

  1. 1-

    Evaluating LWC algorithms in ML models

  2. 2-

    Assessing the performance of selected LWC algorithms on a Raspberry Pi 3 microcontroller using various healthcare datasets.

  3. 3-

    Identifying the efficient LWC Algorithm

Based on these objectives this research aims to provide insights into the effectiveness of these algorithms in securing sensitive patient information across different dataset sizes and conditions. It has also attempted to identify the most efficient LWC algorithm for securing sensitive patient information on IoT devices, focusing on those that offer the best trade-off between security, power consumption, and computational efficiency.

Methods

This study aimed to address privacy and security concerns in healthcare IoT devices by developing ML models using eight LWC algorithms, namely AES, PRESENT, MSEA, LEA, XTEA, SIMON, PRINCE, and RECTANGLE. A test-bed microcontroller, Raspberry Pi 3, was employed to evaluate the performance of these algorithms. The study was conducted in a laboratory environment.

Experimental procedure

The experimental performance tests were analyzed comprehensively to collect data on all features, enabling a thorough evaluation. A controlled testing environment was established to isolate the system from external factors, ensuring the production of accurate results. This controlled environment simulated the performance testing process and collected data from the Raspberry Pi 3 device. The experimental procedure of this study was as follows:

  • Implementation of the eight LWC algorithms using Python libraries and integration with the ML models.

  • The ML models were trained using the pre-processed dataset with fivefold cross-validation.

  • The performance of the ML models was evaluated with accuracy, precision, recall, and F1-score metrics.

  • The results were analyzed and compared to identify the most effective algorithm for the given task.

Selection of lightweight cryptographic algorithms

Eight LWC algorithms were tested for performance, including AES, PRESENT, MSEA, LEA, XTEA, SIMON, PRINCE, and RECTANGLE. These algorithms were selected for their suitability and compliance with NIST's LWC algorithm standards. The description of these algorithms is provided in Supplementary File 2.

The selected LWC algorithms were tested on a Raspberry Pi 3 device with 1 GB of RAM and a 1.2 GHz quad-core processor. The Raspberry Pi 3 utilizes a Broadcom BCM2837 64-bit CPU and a 64-bit ARM Cortex A53 processor, with either a 5 V Micro USB or a Power Bank power source. This research utilized a 10,400 mA Power Bank, and Raspberry Pi 3 was controlled by connecting to a Dell Notebook through ethernet and USB ports.

Data collection and analysis

The obtained data constitutes the foundation of this research methodology. Each performance experiment was conducted as follows:

  • At the start of each experiment, all hardware was turned off. Ensure that no information is saved on the physical components that can affect the data.

  • The laptop was powered on in the second stage.

  • A checklist was utilized to document all the parameters once the experiment was accomplished, ensuring proper configuration.

  • After completing all the procedures, each device's goal was changed to launch the experiment.

  • Once the study collected sufficient data, data were stored, and all devices were powered off.

For data analysis, all study results were documented. Following data recording, the setup reset to its original state, including the removal of data or disconnection of any experiment equipment. The collected data were scrutinized for any deviations or errors during the data analysis phase. Inconsistencies or errors may arise during both the data collection and analysis phases, potentially leading to inaccurate results. Such discrepancies must be identified and addressed by either repeating the test or isolating the source of the problem. Furthermore, certain tests may be repeated multiple times to facilitate results comparison.

Results

In this research, the performance of eight LWC algorithms was assessed for the development of ML models aimed at addressing privacy and security concerns in IoT systems in healthcare. Six message sizes, ranging from 16 to 2048 KB, were employed to evaluate the performance and scalability of the algorithms across various input sizes. The model performance was assessed using accuracy, precision, recall, and F1-score evaluation metrics. Accuracy offered an overview of correctness, precision emphasized false alarm minimization, recall ensured actual case detection, and the F1-score provided a balanced assessment. These metrics collectively informed the algorithm selection, contributing to effective solutions for privacy and security in healthcare IoT systems.

Accuracy

Accuracy is a statistical metric that measures how well the ML model can predict the output values when provided with a set of input data. The accuracy score is calculated as the proportion of accurately predicted output values out of all input values. Table 1 summarises the accuracy of the ML models for the encryption/decryption test between 16 and 2048 KB utilizing various LWC techniques.

Table 1 Model performance comparison of accuracy for different LWC algorithms and ML models on 16 KB-2048 KB test message

Presenting accurate data for ML models using different LWC algorithms across a range of test message sizes is essential for several reasons: selecting the most suitable algorithm, optimizing resource usage, ensuring security, and accommodating real-world variations in data size within healthcare IoT systems. Figures 1, 2, 3, 4, 5 and 6 illustrates the accuracy of the ML models using different LWC algorithms (AES, PRESENT, SIMON, XTEA, PRINCE, MSEA, LEA, and RECTANGLE) for test message sizes ranging from 16 to 2048 KB (16 KB, 64 KB, 256 KB, 512 KB, 1024 KB, and 2048 KB).

Fig. 1
figure 1

Model performance comparison of accuracy for different LWC algorithms and ML models on 16 KB file

Fig. 2
figure 2

Model performance comparison of accuracy for different LWC algorithms and ML models on 64 KB file

Fig. 3
figure 3

Model performance comparison of accuracy for different LWC algorithms and ML models on 256 KB file

Fig. 4
figure 4

Model performance comparison of accuracy for different LWC algorithms and ML models on 512 KB file

Fig. 5
figure 5

Model performance comparison of accuracy for different LWC algorithms and ML models on 1024 KB file

Fig. 6
figure 6

Model performance comparison of accuracy for different LWC algorithms and ML models on 2048 KB file

The findings indicate that message size and the chosen LWC algorithms significantly impact the accuracy of the ML models. Some algorithms, such as AES, XTEA, and RECTANGLE, generally achieve higher accuracy across all file sizes, while others, like PRINCE and MSEA, tend to have lower scores. Additionally, the SVM model consistently performs better than the other models for all algorithms and message sizes.

Precision

Precision refers to an ML’s ability to correctly identify relevant examples from a given dataset. It is determined by dividing the number of true positives by the total number of true and false positives [35]. Several factors can affect the precision of a model, including the algorithm chosen, the size of the dataset, the complexity of the features used, and the degree of similarity between relevant and irrelevant examples. In the context of LWC, it refers specifically to an ML model’s capability to properly identify the encryption algorithm used to encrypt a specific file [36]. Table 2 summarises the precision of the ML models using different LWC algorithms for a test message size of 16 KB-2048 KB.

Table 2 Model performance comparison of precision for different LWC algorithms and ML models on 16 KB – 2048 KB

Table 2 shows that the size of the test files generally affects the precision of the ML models. This is likely because larger messages provide the models with more characteristics to learn from. For instance, the precision of the best-performing model (SVM) varies from 0.897 to 0.98 for a 16 KB test message and from 0.801 to 0.965 for a 10 KB test message. The table also demonstrates how the effectiveness of the ML models differs depending on the encryption algorithm used. For example, the precision of the best-performing model (MLP) for a 512 KB test message ranges from 0.931 to 0.987, depending on the specific encryption algorithm. Here, AES and MSEA generally perform the best, while XTEA and SIMON perform the worst.

Figures 7, 8, 9, 10, 11 and 12 depicts the precision of the ML models employing different LWC algorithms for the test message size of 16 KB—2048 KB.

Fig. 7
figure 7

Model performance comparison of precision for different LWC algorithms and ML models on 16 KB file

Fig. 8
figure 8

Model performance comparison of precision for different LWC algorithms and ML models on 64 KB file

Fig. 9
figure 9

Model performance comparison of precision for different LWC algorithms and ML models on 256 KB File

Fig. 10
figure 10

Model performance comparison of precision for different LWC Algorithms and ML Models on 512 KB file

Fig. 11
figure 11

Model performance comparison of precision for different LWC algorithms and ML models on 1024 KB file

Fig. 12
figure 12

Model performance comparison of precision for different LWC algorithms and ML models on 1024 KB file

Recall

Recall is a measure of how well the ML model can identify the true positive cases. In the context of LWC, recall refers to the ML model’s ability to correctly identify the encryption algorithm used on processed message [37]. Table 3 summarises the recall of the ML models using different LWC algorithms for a test file size of 16 KB-2048 KB.

Table 3 Model performance comparison of recall for different LWC algorithms and ML models on 16 KB

The recall performance of the ML models are presented in Figs. 13, 14, 15, 16, 17 and 18, across various using different LWC algorithms for the test message size of 16 KB—2048 KB.

Fig. 13
figure 13

Model performance comparison of recall for different LWC algorithms and ML models on 16 KB file

Fig. 14
figure 14

Model performance comparison of recall for different LWC algorithms and ML models on 64 KB file

Fig. 15
figure 15

Model performance comparison of recall for different LWC algorithms and ML models on 256 KB file

Fig. 16
figure 16

Model performance comparison of recall for different LWC algorithms and ML models on 512 KB file

Fig. 17
figure 17

Model performance comparison of recall for different LWC algorithms and ML models on 1024 KB file

Fig. 18
figure 18

Model performance comparison of recall for different LWC algorithms and ML models on 2048 KB file

The figures show that the performance of ML models on LWC algorithms generally decreases as the size of the test message increases. However, certain algorithms, such as AES, PRESENT, and SIMON, tend to maintain better performance across all message sizes. Additionally, SVM and MLP models consistently outperform other models for all algorithms and message sizes.

F1-score

In ML, the F1-score is a common metric for evaluating a classification model’s accuracy. It considers both recall (the proportion of actual positives the model identifies correctly) and precision (the proportion of the model’s correct positive predictions) by taking a weighted average of these two metrics.

The formula for F1-score is:

$$F1-score=2*\left(\text{Precision}*\text{Recall}\right)/\left(\text{Precision}+\text{Recall}\right)$$

F1-score ranges between 0 and 1, with 1 indicating perfect precision and recall, and 0 indicating poor performance. It is particularly useful for imbalanced datasets, where one class has significantly more examples than the other. Table 4 summarises the F1-Score of the ML models using different LWC algorithms for a test message size of 16 KB-2048 KB.

Table 4 Model performance comparison of F1-score for different LWC algorithms and ML models on 16 KB

Figures 19, 20, 21, 22, 23 and 24 illustrates the F-1 score results of ML models applied with various LWC algorithms for test message sizes ranging from 16 to 2048 KB.

Fig. 19
figure 19

Model performance comparison of F1-score for different LWC algorithms and ML models on 16 KB file

Fig. 20
figure 20

Model performance comparison of F1-score for different LWC algorithms and ML models on 64 KB file

Fig. 21
figure 21

Model performance comparison of F1-score for different LWC algorithms and ML models on 256 KB file

Fig. 22
figure 22

Model performance comparison of F1-score for different LWC algorithms and ML models on 512 KB file

Fig. 23
figure 23

Model performance comparison of F1-score for different LWC algorithms and ML models on 1024 KB file

Fig. 24
figure 24

Model performance comparison of F1-score for different LWC algorithms and ML models on 2048 KB file

For smaller message sizes (16 KB and 64 KB), the random forest and MLP models generally perform well across all LWC algorithms. Decision tree and SVM models also show good performance with some algorithms. However, the KNN model consistently scores the lowest F1-score across all algorithms.

With increasing message size, the performance of the different models and algorithms begins to diverge. For instance, at 256 KB, the SVM model significantly outperforms decision tree and KNN models for some algorithms. Meanwhile, at 1024 KB, the MLP model consistently achieves the highest F1-score across all algorithms, while the SVM and decision tree models still perform well for so.

Discussion

IoT devices play a fundamental role in healthcare systems, smart homes, and industrial applications. The integration of LWC algorithms and ML models creates legitimate security concerns. The observed performance variations among cryptographic algorithms highlight the importance of selecting encryption methods tailored to the constraints of IoT devices. For instance, the consistent efficacy demonstrated by RECTANGLE implies its potential superiority in securing IoT communications better than its counterparts, given its balance between security and computational efficiency.

Furthermore, the findings regarding file size and model performance have security implications for IoT devices and systems. These devices are often resource-constrained, with limitations in processing power and memory. The decrease in model accuracy with increasing file size suggests the need for lightweight encryption methods. These methods should reduce the computational requirements of IoT devices while maintaining an adequate level of security level. However, the ever-increasing file sizes on devices complicate this matter. Therefore, file size needs to be a critical consideration in designing IoT security protocols, as it directly affects the feasibility and efficiency of cryptographic operations on these devices. The findings emphasize that selecting ML models for IoT security frameworks must align with the unique requirements of IoT environments. The Random Forest model’s consistently high accuracy across various scenarios suggests its potential for anomaly detection and threat identification in IoT networks. However, this, and any ML model choice, should be examined against resource limitations. Decision Trees and Support Vector Machines could be more suitable for real-time security monitoring on resource-constrained IoT devices.

These findings highlight the importance of well-tailored LWC algorithms, careful consideration of file size limitations, and the cautious selection of ML models. This combination achieves well-balanced and resource-efficient security protocols for IoT ecosystems.

The outcomes of the experiments conducted in this paper reveal that the performance of various ML models significantly varies depending on the LWC algorithm employed and the size of the test file. The performance of each ML model for each LWC algorithm and test file size is presented in Tables 1, 2, 3 and 4, indicating that there is no universally optimal approach to file encryption and classification.

Across most LWC algorithms and test file sizes, the Random Forest model shows superior accuracy, precision, recall, and F1-score performance. This observation is consistent with the renowned capability of Random Forests to handle complicated datasets and avoid overfitting [38]. It is important to note that in certain cases, alternative ML models such as Decision Tree and SVM dropped behind, indicating that different models may be more suitable in specific cases.

When examining individual LWC algorithms, it was evident that RECTANGLE consistently outperformed others across all ML models and test file sizes. This finding aligns with RECTANGLE’s widespread adoption in practice due to its combination of security and efficiency. On the other hand, algorithms like AES and MSEA performed poorly across all ML models and test file sizes, indicating that further optimization is required to make these LWC algorithms suitable for use in practical applications.

Furthermore, the outcomes demonstrated a decline in ML model performance as the test file size increased. This phenomenon is likely attributable to the increased time and computing resources required to encrypt larger files, potentially impacting the accuracy of the ML models. Additionally, not all LWC algorithms showed the equivalent decrease in performance; certain algorithms were more significantly affected. For instance, compared to the others, the performance of the ML models employing RECTANGLE and SIMON was less impacted by the expansion in file size.

The findings underscore that the performance of the models may vary based on the test file size. For instance, the performance of the models with a 2048 KB file size differs from those with a 64 KB file size. This discrepancy is likely a result of the complexity associated with larger file sizes, which may require more advanced models or classification methods. This suggests that while developing a system for file encryption and classification, the choice of file size is a key component to be considered.

The findings suggest that some LWC algorithms such as RECTANGLE and SIMON, as well as specific ML models like Random Forest and SVM, may offer more enhanced efficacy for encryption and classification tasks. However, the preferred model and algorithm combination could vary depending on the specific application and system requirements. Consequently, these findings can be utilized to support future system design for file encryption and categorization, while also serving as a motivation for further research and development in this area.

These findings offer useful results in the performance of various ML models and LWC algorithms when utilized for encryption and classification. However, It is important to acknowledge that these findings may not universally apply to all scenarios, as they were collected under specific circumstances. Hence, to comprehensively evaluate the performance of these methods, additional tests in different settings are recommended.

Conclusion

To the best of our knowledge, this research is one of the very few studies dedicated to exploring and evaluating the performance of different ML models and LWC algorithms for medical IoT devices. This study compared the performance of various ML models and LWC algorithms for message encryption and classification. The aim was to clarify the implications of these findings for both industrial and scientific contexts. The results revealed significant variability in the performance of the ML models depending on the LWC algorithm used and the file size. While the Random Forest model generally performed the best in terms of accuracy, precision, and recall, RECTANGLE consistently outperformed others across all ML models and test message sizes. Conversely, algorithms like MSEA and AES consistently showed poor performance across all ML models and test message sizes, indicating the need for further optimization in practical applications.

Furthermore, the study showed a decrement in model performance with an increase in the size of the test message. This highlights the importance of considering message size when selecting ML models and LWC algorithms for message encryption and classification tasks.

Overall, these results offer valuable insights into the performance of different ML models and LWC algorithms for message encryption and classification. This research might help researchers and professionals in choosing the most appropriate ML models and LWC algorithms for tasks involving message encryption and classification while taking into account the specific use case and system requirements.

However, future researchers should focus on the development of lightweight and efficient ML algorithms that can be deployed on resource-constrained IoT devices while still providing adequate security and privacy measures.

Availability of data and materials

The models and codes developed in this study are available from the corresponding author upon reasonable request.

Abbreviations

AUT:

Auckland University of Technology

DFI:

Deep Flow Inspection

DDoS:

Distributed Denial-of-Service

FL:

Federated Learning

IDS:

Intrusion Detection Systems

IoT:

Internet of Things

LWC:

Light Weight Cryptography

ML:

Machine learning

NIST:

National Institute of Standards and Technology

DDoS:

Distributed denial-of-service

SPN:

Substitution-Permutation Network

References

  1. Abed SE, Jaffal R, Mohd BJ, Al-Shayeji M. An analysis and evaluation of lightweight hash functions for blockchain-based IoT devices. Cluster Comput. 2021;24(4):3065–84.

    Article  Google Scholar 

  2. Tun SY, Madanian S, Parry D. Clinical perspective on internet of things applications for care of the elderly. Electronics. 2020;9(11):1925.

    Article  Google Scholar 

  3. Tun SYY, Madanian S, Mirza F. Internet of things (IoT) applications for elderly care: a reflective review. Aging Clin Exp Res. 2021;33(4):855–67.

    Article  PubMed  Google Scholar 

  4. Tawalbeh LA, Muheidat F, Tawalbeh M, Quwaider M. IoT Privacy and Security: Challenges and Solutions. Appl Sci. 2020;10(12):4102.

    Article  CAS  Google Scholar 

  5. Ahmad S, Shakeel I, Mehfuz S, Ahmad J. Deep learning models for cloud, edge, fog, and IoT computing paradigms: Survey, recent advances, and future directions. Comput Sci Rev. 2023;49:100568.

    Article  Google Scholar 

  6. Rizvi S, Pipetti R, McIntyre N, Todd J, Williams I. Threat model for securing internet of things (IoT) network at device-level. IoT. 2020;11:100240.

    Google Scholar 

  7. Sadhu PK, Yanambaka VP, Abdelgawad A. Internet of things: security and solutions survey. Sensors. 2022;22(19):7433.

    Article  PubMed  PubMed Central  Google Scholar 

  8. Pradhan B, Bhattacharyya S, Pal K. IoT-based applications in healthcare devices. J Healthc Eng. 2021;2021:6632599.

    Article  PubMed  PubMed Central  Google Scholar 

  9. Thakor VA, Razzaque MA, Khandaker MRA. Lightweight cryptography algorithms for resource-constrained IoT devices: A review, comparison and research opportunities. IEEE Access. 2021;9:28177–93.

    Article  Google Scholar 

  10. U.S. Department of Commerce. Advanced Encryption Standard (AES). Gaithersburg: National Institute of Standards and Technology; 2023.

    Google Scholar 

  11. Rachmat N, Samsuryadi, editors. Performance analysis of 256-bit AES encryption algorithm on android smartphone. Journal of Physics: Conference Series; 2019. IOP Publishing.

  12. Bogdanov A, Knudsen LR, Leander G, Paar C, Poschmann A, Robshaw MJ, et al. editors. PRESENT: an ultra-lightweight block cipher. Cryptographic hardware and embedded systems-CHES 2007: 9th International workshop, Vienna, Austria, september 10–13, 2007 proceedings 9. Berlin, Heidelberg: Springer; 2007.

  13. Kumar R, Mishra KK, Tripathi A, Tomar A, Singh S. MSEA: modified symmetric encryption algorithm. Cryptology ePrint Archive; 2014.

  14. Hong D, Lee J-K, Kim D-C, Kwon D, Ryu KH, Lee D-G, editors. LEA: A 128-Bit Block Cipher for Fast Encryption on Common Processors. Information Security Applications. Cham: Springer International Publishing; 2014.

  15. Wheeler DJ, Needham RM, editors. TEA, a tiny encryption algorithm. Fast software encryption: second international workshop Leuven, Belgium, december 14–16, 1994 proceedings 2. Berlin, Heidelberg: Springer; 1995.

  16. Beaulieu R, Treatman-Clark S, Shors D, Weeks B, Smith J, Wingers L. "The SIMON and SPECK lightweight block ciphers," 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC), San Francisco; 2015. p. 1–6. https://doi.org/10.1145/2744769.2747946. https://ieeexplore.ieee.org/document/7167361.

  17. Borghoff J, Canteaut A, Güneysu T, Kavun EB, Knezevic M, Knudsen LR, et al., editors. PRINCE–a low-latency block cipher for pervasive computing applications. Advances in Cryptology–ASIACRYPT 2012: 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2–6, 2012 Proceedings 18. Berlin, Heidelberg: Springer; 2012.

  18. Zhang W, Bao Z, Lin D, Rijmen V, Yang B, Verbauwhede I. RECTANGLE: a bit-slice lightweight block cipher suitable for multiple platforms. Sci China Inf Sci. 2015;58(12):1–15.

    Google Scholar 

  19. Hasan H, Ali G, Elmedany W, Balakrishna C, editors. Lightweight encryption algorithms for internet of things: a review on security and performance aspects. 2022 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT). 2022.

  20. Rana M, Mamun Q, Islam R. Lightweight cryptography in IoT networks: A survey. Futur Gener Comput Syst. 2022;129:77–89.

    Article  Google Scholar 

  21. Hussain F, Hussain R, Hassan SA, Hossain E. Machine learning in IoT security: current solutions and future challenges. IEEE Commun Surv Tutor. 2020;22(3):1686–721.

    Article  Google Scholar 

  22. Rodríguez E, Otero B, Canal R. A survey of machine and deep learning methods for privacy protection in the internet of things. Sensors (Basel). 2023;23(3):1252.

    Article  PubMed  Google Scholar 

  23. Ahmad S, Mehfuz S, Mebarek-Oudina F, Beg J. RSM analysis based cloud access security broker: a systematic literature review. Clust Comput. 2022;25(5):3733–63.

    Article  Google Scholar 

  24. Li X, Dai H-N, Wang Q, Imran M, Li D, Imran MA. Securing internet of medical things with friendly-jamming schemes. Comput Commun. 2020;160:431–42.

    Article  PubMed  PubMed Central  Google Scholar 

  25. Saini PS, Behal S, Bhatia S, editors. Detection of DDoS attacks using machine learning algorithms. 2020 7th International Conference on Computing for Sustainable Global Development (INDIACom). 2020.

  26. Bonawitz K, Ivanov V, Kreuter B, Marcedone A, McMahan HB, Patel S, et al editors. Practical secure aggregation for privacy-preserving machine learning. proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. 2017.

  27. Dini P, Elhanashi A, Begni A, Saponara S, Zheng Q, Gasmi K. Overview on intrusion detection systems design exploiting machine learning for networking cybersecurity. Appl Sci. 2023;13(13):7507.

    Article  CAS  Google Scholar 

  28. Liu W, Wang Z, Liu X, Zeng N, Liu Y, Alsaadi FE. A survey of deep neural network architectures and their applications. Neurocomputing. 2017;234:11–26.

    Article  Google Scholar 

  29. KayodeSaheed Y, Idris Abiodun A, Misra S, Kristiansen Holone M, Colomo-Palacios R. A machine learning-based intrusion detection for detecting internet of things network attacks. Alex Eng J. 2022;61(12):9395–409.

    Article  Google Scholar 

  30. Majeed A, Khan S, Hwang SO. Toward privacy preservation using clustering based anonymization: recent advances and future research outlook. IEEE Access. 2022;10:53066–97.

    Article  Google Scholar 

  31. Du R, Wang J, Li S. A lightweight flow feature-based IoT device identification scheme. Secur Commun Netw. 2022;2022:8486080.

    Article  Google Scholar 

  32. Williams P, Dutta IK, Daoud H, Bayoumi M. A survey on security in internet of things with a focus on the impact of emerging technologies. IoT. 2022;19:100564.

    Google Scholar 

  33. Uslu BÇ, Okay E, Dursun E. Analysis of factors affecting IoT-based smart hospital design. J Cloud Comput. 2020;9(1):67.

    Article  Google Scholar 

  34. Ghosh A, Raha A, Mukherjee A. Energy-efficient IoT-health monitoring system using approximate computing. IoT. 2020;9:100166.

    Google Scholar 

  35. Michaud EJ, Liu Z, Tegmark M. Precision machine learning. Entropy (Basel). 2023;25(1):175.

    Article  PubMed  Google Scholar 

  36. Sagayam KM, Bhushan B, Andrushia AD, Albuquerque VHCD. Deep learning strategies for security enhancement in wireless sensor networks. Hershey, PA: IGI Global; 2020.

  37. Zhang W, Zhao Y, Fan S. Cryptosystem identification scheme based on ASCII code statistics. Secur Commun Netw. 2020;2020:1–10.

    CAS  Google Scholar 

  38. Breiman L. Random forests. Mach Learn. 2001;45(1):5–32.

    Article  Google Scholar 

  39. Grossschadl J, Tillich S, Rechberger C, Hofmann M, Medwed M, editors. Energy evaluation of software implementations of block ciphers under memory constraints. 2007 Design, Automation & Test in Europe Conference & Exhibition. San Jose: EDA Consortium; 2007.

  40. Botta M, Simek M, Mitton N, editors. Comparison of hardware and software based encryption for secure communication in wireless sensor networks. 2013 36th International Conference on Telecommunications and Signal Processing (TSP). Rome: IEEE; 2013.

  41. Cazorla M, Marquet K, Minier M, editors. Survey and benchmark of lightweight block ciphers for wireless sensor networks. 2013 International Conference on Security and Cryptography (SECRYPT). 2013.

  42. Patrick C, Schaumont P, editors. The role of energy in the lightweight cryptographic profile. Gaithersburg: Proc NIST Lightweight Cryptography Workshop; 2016.

  43. Clukey SA. Architecture for real-time, low-SWaP embedded vision using FPGAs. 2016.

    Google Scholar 

  44. Kotel S, Sbiaa F, Zeghid M, Machhout M, Baganne A, Tourki R, editors. Performance evaluation and design considerations of lightweight block cipher for low-cost embedded devices. 2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA). 2016.

  45. Diehl W, Farahmand F, Yalla P, Kaps JP, Gaj K, editors. Comparison of hardware and software implementations of selected lightweight block ciphers. 2017 27th International Conference on Field Programmable Logic and Applications (FPL). 2017.

  46. Singh P, Deshpande K. Performance evaluation of cryptographic ciphers on IoT devices. arXiv preprint arXiv:181202220. 2018.

  47. Hatzivasilis G, Fysarakis K, Papaefstathiou I, Manifavas C. A review of lightweight block ciphers. J Cryptogr Eng. 2018;8(2):141–84.

    Article  Google Scholar 

  48. Omrani T, Rhouma R, Sliman L, editors. Lightweight cryptography for resource-constrained devices: a comparative study and rectangle cryptanalysis. Digital Economy Emerging Technologies and Business Innovation: Third International Conference, ICDEc 2018, Brest, France, May 3–5, 2018, Proceedings 3. Cham: Springer; 2018.

  49. Engineer M, Shah A, editors. Performance Analysis of lightweight cryptographic algorithms simulated on Arduino UNO and MATLAB using the voice recognition application. 2018 International Conference on Circuits and Systems in Digital Enterprise Technology (ICCSDET). 2018.

  50. Sehrawat D, Gill NS. Performance evaluation of newly proposed lightweight cipher, BRIGHT. Int J Intell Syst. 2019;12(4). https://www.inass.org/2019/2019083108.pdf.

  51. Meng TX, Buchanan W. Lightweight cryptographic algorithms on resource-constrained devices. Preprints; 2020.

  52. Abdullah AM. Advanced encryption standard (AES) algorithm to encrypt and decrypt data. Cryptography Netw Secur. 2017;16(1):11.

    Google Scholar 

  53. Heron S. Advanced Encryption Standard (AES). Netw Secur. 2009;2009(12):8–12.

    Article  Google Scholar 

  54. Dworkin MJ, Barker EB, Nechvatal JR, Foti J, Bassham LE, Roback E, et al. Advanced encryption standard (AES). 2001.

    Google Scholar 

  55. Kumar P, Rana SB. Development of modified AES algorithm for data security. Optik. 2016;127(4):2341–5.

    Article  Google Scholar 

  56. Pandey JG, Goel T, Karmakar A. Hardware architectures for PRESENT block cipher and their FPGA implementations. IET Circuits Devices Syst. 2019;13(7):958–69.

    Article  Google Scholar 

  57. Kumar P, Rawat S, Choudhury T, Pradhan S,. A performance based comparison of various symmetric cryptographic algorithms in run-time scenario. 2016 International Conference System Modeling & Advancement in Research Trends (SMART). Moradabad: IEEE; 2016.

  58. Jap D, Breier J, editors. Differential fault attack on LEA. Information and communication technology: Third IFIP TC 5/8 International Conference, ICT-EurAsia 2015, and 9th IFIP WG 89 Working Conference, CONFENIS 2015, Held as Part of WCC 2015, Daejeon, Korea, October 4–7, 2015, Proceedings 3. Berlin, Heidelberg: Springer; 2015.

  59. Moon D, Hwang K, Lee W, Lee S, Lim J, editors. Impossible differential cryptanalysis of reduced round XTEA and TEA. Fast software encryption. Berlin, Heidelberg: Springer Berlin Heidelberg; 2002.

  60. Alassaf N, Gutub A, Parah SA, Al GM. Enhancing speed of SIMON: A light-weight-cryptographic algorithm for IoT applications. Multimed Tools Appl. 2019;78:32633–57.

    Article  Google Scholar 

Download references

Acknowledgements

The original work of this research was a master’s dissertation for the Master of Cyber Security and Digital Forensics program at AUT.

Funding

This research is partially supported by partially supported by AUT, School of Engineering, Computer and Mathematical Sciences, 2022 Summer Research Scholarships.

Author information

Authors and Affiliations

Authors

Contributions

TC conducted the experiments. These tasks undertook under SMs’ supervision and guidance. SM proposed contributed to the research method, reflection on research results, and data interpretation. TC prepared the first draft of the research report and the manuscript. DA provided some technical insights and contributed to editing the manuscript. FH contributed to revising, editing and formatting the manuscript. All authors read and agreed on the final revision.

Corresponding author

Correspondence to Samaneh Madanian.

Ethics declarations

Ethics approval and consent to participate

The study does not require any ethical approval or consent to participate.

Consent for publication

The study does not contain any detailed personal data from participants.

Competing interests

The authors declare no competing interests.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Supplementary Information

12911_2024_2548_MOESM1_ESM.docx

Supplementary Material 1. [39,40,41,42,43,44,45,46,47,48,49,50,51].

12911_2024_2548_MOESM2_ESM.docx

Supplementary Material 2. [52,53,54,55,56,57,58,59,60].

Rights and permissions

Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/. The Creative Commons Public Domain Dedication waiver (http://creativecommons.org/publicdomain/zero/1.0/) applies to the data made available in this article, unless otherwise stated in a credit line to the data.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Chinbat, T., Madanian, S., Airehrour, D. et al. Machine learning cryptography methods for IoT in healthcare. BMC Med Inform Decis Mak 24, 153 (2024). https://doi.org/10.1186/s12911-024-02548-6

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1186/s12911-024-02548-6

Keywords