Submitted:
30 January 2025
Posted:
31 January 2025
You are already at the latest version
Abstract
Keywords:
1. Introduction
2. Related Work
- Develop lightweight cryptographic techniques that minimize computational, memory, and energy requirements, ensuring compatibility with resource-constrained IoT devices in healthcare.
- Design scalable and adaptable security frameworks that dynamically adjust to diverse healthcare IoT environments, accommodating varying device capabilities and resource constraints.
- Establish robust cryptographic solutions capable of resisting advanced cyber threats, including quantum computing-based attacks, side-channel vulnerabilities, and other emerging security risks.
- Create secure and efficient data transmission methods facilitate seamless communication among IoT procedures and cloud facilities, confirming the protection of sensitive healthcare data during transit.
3. Proposed Methodology
3.1. Encryption and Decryption

3.2. Key Size Optimization

3.3. Local and Global Search Optimization
4. Results and Discussion
4.1. PSNR Results Analysis
4.2. MSE Results Analysis
4.3. BER Results Analysis
4.4. SSI Results Analysis
| Lightweight cryptography algorithms | Number of images | ||||
|---|---|---|---|---|---|
| 50 | 100 | 150 | 200 | 250 | |
| With attacks | |||||
| AES | 0.982 | 0.962 | 0.951 | 0.941 | 0.938 |
| PRESENT | 0.978 | 0.960 | 0.948 | 0.937 | 0.933 |
| MESA | 0.975 | 0.955 | 0.944 | 0.933 | 0.929 |
| LEA | 0.980 | 0.961 | 0.950 | 0.939 | 0.935 |
| XTEA | 0.970 | 0.950 | 0.938 | 0.927 | 0.923 |
| SIMON | 0.977 | 0.958 | 0.946 | 0.935 | 0.930 |
| PRINCE | 0.981 | 0.961 | 0.950 | 0.939 | 0.934 |
| RECTANGLE | 0.976 | 0.956 | 0.945 | 0.934 | 0.930 |
| RSA-AM+OBBO | 0.982 | 0.962 | 0.951 | 0.941 | 0.938 |
| ASCONv1.2+HOC+MWG | 0.985 | 0.978 | 0.965 | 0.947 | 0.942 |
| Without attacks | |||||
| AES | 0.985 | 0.975 | 0.963 | 0.952 | 0.948 |
| PRESENT | 0.981 | 0.971 | 0.960 | 0.950 | 0.946 |
| MESA | 0.980 | 0.970 | 0.959 | 0.949 | 0.945 |
| LEA | 0.985 | 0.976 | 0.965 | 0.954 | 0.950 |
| XTEA | 0.975 | 0.955 | 0.944 | 0.933 | 0.930 |
| SIMON | 0.981 | 0.970 | 0.959 | 0.949 | 0.944 |
| PRINCE | 0.985 | 0.975 | 0.964 | 0.954 | 0.950 |
| RECTANGLE | 0.980 | 0.970 | 0.959 | 0.948 | 0.944 |
| RSA-AM+OBBO | 0.985 | 0.975 | 0.963 | 0.952 | 0.948 |
| ASCONv1.2+HOC+MWG | 0.990 | 0.983 | 0.975 | 0.962 | 0.955 |


4.5. Correlation Coefficient Results Analysis
4.6. CPU Run Time Results Analysis
4.7. Encryption Time Results Analysis
4.8. Results Comparison of Proposed and Existing Lightweight Crypto Algorithm
5. Conclusions
Author Contributions
Funding
Data Availability Statement
Acknowledgments
Conflicts of Interest
Appendix A. Symbol Table
| Symbol/Notation | Meaning | Context/Usage |
| j | Secret key | Used for encryption and decryption in the ASCONv1.2 algorithm. |
| J | Size of the secret key | Indicates the bit length of the cryptographic key. |
| Q | Nonce | A unique 128-bit number used to ensure encryption uniqueness. |
| X | Associated data | Metadata combined with plaintext for authenticated encryption. |
| M | Plaintext message | Input data to be encrypted. |
| E | Ciphertext | Encrypted version of the plaintext M. |
| U | Authentication tag | A 128-bit tag used to validate data integrity and authenticity. |
| P | Input communication | Data to be hashed in cryptographic operations. |
| I | Hash output | Result of the hash function applied to P. |
| R | Rate parameter | Defines the block size for sponge-based cryptographic operations. |
| ℎ | Output span constraint | Maximum length of the hash output I. |
| V | Internal state vector | 320-bit vector used during ASCON's encryption and decryption. |
| pb | Round permutation | A function applied to V for cryptographic diffusion. |
| m | Number of pixels | Represents image size in medical image encryption and analysis. |
| k | Number of blocks | Indicates how data is divided for block-based encryption. |
| b | Block size | Size of individual blocks in cryptographic operations. |
| T | Iterative threshold coefficient | Guides optimization processes. |
| f | Fitness value | A measure used to evaluate solutions in optimization algorithms like HOS and MWG. |
| c | Center of the hypercube | Reference point in hypercube optimization. |
| Ln, Un | Lower and upper bounds | Define the dimensional constraints of the hypercube search space. |
| pd | Central standards | Average of Ln and Un, defining the search center in optimization. |
| ADR, maxADR | Adaptation rates | Measure success in optimization algorithms. |
| NPCR | Number of Pixel Change Rate | Indicates the sensitivity of encryption to pixel changes in images. |
| UACI | Unified Average Change Intensity | Measures average intensity variations in encrypted images. |
| SSI | Structural Similarity Index | Assesses similarity between original and encrypted images for quality assurance. |
| PSNR | Peak Signal-to-Noise Ratio | Evaluates the quality of encrypted images. |
| MSE | Mean Square Error | Measures distortion in decrypted medical images. |
| BER | Bit Error Rate | Indicates the number of erroneous bits in transmission or encryption. |
| ⊕ | XOR operation | Used for bitwise mixing in encryption and hashing. |
| ∥ | Concatenation | Joins two data strings in cryptographic operations. |
| \mod | Modulus | Calculates remainders during block padding and encryption. |
| ⊥ | Error/null | Indicates decryption failure or invalid tag. |
| ∧ | Logical AND | Ensures all conditions are met in cryptographic processes. |
| ≤, ≥ | Less than or equal to, greater than or equal to | Sets bounds in optimization or cryptographic algorithms. |
| Vnew, Vold | Updated and previous states | Represents state transformations during encryption or optimization. |
| ΔF | Objective function difference | Guides solution refinement in optimization. |
| Xe | Evolution factor | A parameter in the Modified Wild Geese (MWG) optimization algorithm. |
Appendix B. Equations with Explanations









Appendix C. Table of Abbreviations
| Abbreviation | Full Form |
| IoT | Internet of Things |
| IoMT | Internet of Medical Things |
| EHR | Electronic Health Records |
| ASCONv1.2 | ASCON version 1.2 encryption algorithm |
| HOS | Hypercube Optimal Search Algorithm |
| MWG | Modified Wild Geese Algorithm |
| PSNR | Peak Signal-to-Noise Ratio |
| MSE | Mean Square Error |
| BER | Bit Error Rate |
| SSI | Structural Similarity Index |
| AES | Advanced Encryption Standard |
| ECC | Elliptic Curve Cryptography |
| RSA | Rivest-Shamir-Adleman Algorithm |
| BLE | Bluetooth Low Energy |
| XTEA | eXtended Tiny Encryption Algorithm |
| LEA | Lightweight Encryption Algorithm |
| PRINCE | PRINCE encryption algorithm |
| PRESENT | PRESENT encryption algorithm |
| SIMON | SIMON encryption algorithm |
| MESA | Modular Encryption Standard Algorithm |
| RECTANGLE | RECTANGLE encryption algorithm |
| NPCR | Number of Pixel Change Rate |
| UACI | Unified Averaged Changed Intensity |
| FPGA | Field-Programmable Gate Array |
| PSO | Particle Swarm Optimization |
References
- Pradyumna, G.R.; Hegde, R.; Bommegowda, K.B.; Jan, T.; Naik, G. Empowering Healthcare with IoMT: Evolution, Machine Learning Integration, Security, and Interoperability Challenges. IEEE Access 2024, PP, 1–1. [CrossRef]
- Bhambri, P.; Khang, A. Managing and Monitoring Patient's Healthcare Using AI and IoT Technologies. In Driving Smart Medical Diagnosis Through AI-Powered Technologies and Applications; IGI Global, 2024; pp. 1–23. [CrossRef]
- Shafik, W. The Future of Healthcare: AIoMT—Redefining Healthcare with Advanced Artificial Intelligence and Machine Learning Techniques. In Artificial Intelligence and Machine Learning in Drug Design and Development; 2024; pp. 605–634. [CrossRef]
- Mostafa, R.; El-Atawi, K. Strategies to Measure and Improve Emergency Department Performance: A Review. Cureus 2024, 16, e52879. [Google Scholar] [CrossRef]
- Bala, I.; Pindoo, M.M.; Mijwil, M.; Abotaleb, M.; Yundong, W. Ensuring Security and Privacy in Healthcare Systems: A Review Exploring Challenges, Solutions, Future Trends, and the Practical Applications of Artificial Intelligence. Jordan Med. J. 2024, 58. [Google Scholar] [CrossRef]
- Ali, Z.; Mahmood, S.; ul Hassan, K.; Daud, A.; Alharbey, R.; Bukhari, A. A Lightweight and Secure Authentication Scheme for Remote Monitoring of Patients in IoMT. IEEE Access 2024, PP, 1–1. [CrossRef]
- Madanian, S.; Chinbat, T.; Subasinghage, M.; Airehrour, D.; Hassandoust, F.; Yongchareon, S. Health IoT Threats: Survey of Risks and Vulnerabilities. Future Internet 2024, 16, 389. [Google Scholar] [CrossRef]
- Luidold, C.; Jungbauer, C. Cybersecurity Policy Framework Requirements for the Establishment of Highly Interoperable and Interconnected Health Data Spaces. Front. Med. 2024, 11. [Google Scholar] [CrossRef] [PubMed]
- Citroni, R.; Mangini, F.; Frezza, F. Efficient Integration of Ultra-low Power Techniques and Energy Harvesting in Self-Sufficient Devices: A Comprehensive Overview of Current Progress and Future Directions. Sensors 2024, 24, 4471. [Google Scholar] [CrossRef]
- Mahmmod, B.; Naser, M.; Al-Sodani, A.; Alsabah, M.; Mohammed, H.; Alaskar, H.; Almarshad, F.; Hussain, A.; Abdulhussain, S.H. Patient Monitoring System Based on Internet of Things: A Review and Related Challenges With Open Research Issues. IEEE Access 2024, PP, 1–1. [CrossRef]
- Uddin, R.; Koo, I. Real-Time Remote Patient Monitoring: A Review of Biosensors Integrated with Multi-Hop IoT Systems via Cloud Connectivity. Appl. Sci. 2024, 14, 1876. [Google Scholar] [CrossRef]
- Nissar, G.; Khan, R.; Mushtaq, M.; Ahmed, S.; Moon, A. RETRACTED ARTICLE: IoT in Healthcare: A Review of Services, Applications, Key Technologies, Security Concerns, and Emerging Trends. Multimed. Tools Appl. 2024, 83, 80283–80283. [Google Scholar] [CrossRef]
- Nadhan, A.; Jacob, I. Enhancing Healthcare Security in the Digital Era: Safeguarding Medical Images with Lightweight Cryptographic Techniques in IoT Healthcare Applications. Biomed. Signal Process. Control 2024, 88, 105511. [Google Scholar] [CrossRef]
- Salunkhe, V.; Tangudu, A.; Mokkapati, C.; Goel, P.; Aggarwal, A. Advanced Encryption Techniques in Healthcare IoT: Securing Patient Data in Connected Medical Devices. Mod. Dyn. Math. Prog. 2024, 1, 224–247. [Google Scholar] [CrossRef]
- Bakare, S.S.; Adeniyi, A.O.; Akpuokwe, C.U.; Eneh, N.E. Data Privacy Laws and Compliance: A Comparative Review of the EU GDPR and USA Regulations. Comput. Sci. IT Res. J. 2024, 5, 528–543. [Google Scholar] [CrossRef]
- Clemente-Lopez, D.; Rangel-Magdaleno, J.; Munoz-Pacheco, J.M. A Lightweight Chaos-Based Encryption Scheme for IoT Healthcare Systems. Internet Things 2023, 25, 101032. [Google Scholar] [CrossRef]
- Alhaj, A.A.; Alrabea, A.; Jawabreh, O. Efficient and Secure Data Transmission: Cryptography Techniques Using ECC. Indones. J. Electr. Eng. Comput. Sci. 2024, 36, 486–492. [Google Scholar] [CrossRef]
- Pabitha, B.; Sanshi, S.; Karthik, N. A Comprehensive Security Framework for WBANs in the Healthcare Environment. In Security, Privacy, and Trust in WBANs and E-Healthcare; 2024; pp. 186–205. [CrossRef]
- Mir, A.A. Optimizing Mobile Cloud Computing Architectures for Real-Time Big Data Analytics in Healthcare Applications: Enhancing Patient Outcomes through Scalable and Efficient Processing Models. Integr. J. Sci. Technol. 2024, 1. Available online: https://ijstindex.com/index.php/ijst/article/view/68.
- Dave, D.M.; Mittapally, B. Data Integration and Interoperability in IoT: Challenges, Strategies, and Future Direction. Int. J. Comput. Eng. Technol. 2024, 15, 45–60. Available online: https://www.researchgate.net/publication/377805078_Data_Integration_and_Interoperability_in_IOT_Challenges_Strategies_and_Future_Direction.
- Alruwaili, O.; Tanveer, M.; Alotaibi, F.M.; Abdelfattah, W.; Armghan, A.; Alserhani, F.M. Securing the IoT-Enabled Smart Healthcare System: A PUF-Based Resource-Efficient Authentication Mechanism. Heliyon 2024, 10, e37577. [Google Scholar] [CrossRef] [PubMed]
- Chinbat, T.; Madanian, S.; Airehrour, D.; Hassandoust, F. Machine Learning Cryptography Methods for IoT in Healthcare. BMC Med. Inform. Decis. Mak. 2024, 24, 153. [Google Scholar] [CrossRef]
- Zitouni, N.; Sedrati, M.; Behaz, A. Lightweight Energy-Efficient Block Cipher Based on DNA Cryptography to Secure Data in Internet of Medical Things Devices. Int. J. Inf. Technol. 2023, 16. [Google Scholar] [CrossRef]
- Sheena, N.; Joseph, S.; Shailesh, S. Lightweight Encryption Algorithms for Resource-Constrained Devices for Internet-of-Things Applications. In Emerging Trends for Securing Cyber Physical Systems and the Internet of Things; CRC Press, 2024; pp. 19–40. [CrossRef]
- Ahmad, I.; Shahid, F.; Islam, J.; Haque, K.N.; Harjula, E. Adaptive Lightweight Security for Performance Efficiency in Critical Healthcare Monitoring. arXiv 2024, arXiv:2406.03786, 2024. [Google Scholar] [CrossRef]
- Qasem, M.A.; Thabit, F.; Can, O.; Naji, E.; Alkhzaimi, H.A.; Patil, P.R.; Thorat, S.B. Cryptography Algorithms for Improving the Security of Cloud-Based Internet of Things. Secur. Priv. 2024, 7, e378. [Google Scholar] [CrossRef]
- Elhamzi, W. Enhancing Medical Image Security with FPGA-Accelerated LED Cryptography and LSB Watermarking. Trait. Signal 2024, 41. [Google Scholar] [CrossRef]
- Popoola, O.; Rodrigues, M.A.; Marchang, J.; Shenfield, A.; Ikpehai, A.; Popoola, J. An Optimized Hybrid Encryption Framework for Smart Home Healthcare: Ensuring Data Confidentiality and Security. Internet Things 2024, 27, 101314. [Google Scholar] [CrossRef]
- Rana, M.; Mamun, Q.; Islam, R. Balancing Security and Efficiency: A Power Consumption Analysis of a Lightweight Block Cipher. Electronics 2024, 13, 4325. [Google Scholar] [CrossRef]
- Al-Khalisy, J.; Abed, W.; Al-Kateb, G.; Aljanabi, M.; Mijwil, M.; Abotaleb, M.; Dhoska, K. QIULEA: Quantum-Inspired Ultra-Lightweight Encryption Algorithm for IoT Devices. Pollack Period. 2024. [Google Scholar] [CrossRef]
- Rasheed, A.M.; Satheesh Kumar, R.M. Lightweight Cryptographic Algorithms for Medical IoT Devices Using Combined Transformation and Expansion (CTE) and Dynamic Chaotic System. Int. J. Adv. Comput. Sci. Appl. 2024, 15. [Google Scholar] [CrossRef]
- Selvaraj, J.; Lai, W.-C.; Kavin, B.P.; C., K.; Seng, G.H. Cryptographic Encryption and Optimization for Internet of Things Based Medical Image Security. Electronics 2023, 12, 1636. [CrossRef]
- Yadav, T.; Kumar, M. ML-Based Improved Differential Distinguisher with High Accuracy: Application to GIFT-128 and ASCON. Cryptol. ePrint Arch. 2024, Paper 2024/1370. Available online: https://eprint.iacr.org/2024/1370.
- Shang, X.; Chao, T.; Ma, P.; Yang, M. An Efficient Local Search-Based Genetic Algorithm for Constructing Optimal Latin Hypercube Design. Eng. Optim. 2019, 52, 1–17. [Google Scholar] [CrossRef]
- Nabih, M.; Ghoneimi, A.; Bakry, A.; Aaaa, S.; Al-Betar, M.; Elsayed Abd Elaziz, M. Rock Physics Analysis from Predicted Poisson's Ratio Using RVFL Based on Wild Geese Algorithm in Scarab Gas Field in WDDM Concession, Egypt. Mar. Pet. Geol. 2022, 147, 105949. [Google Scholar] [CrossRef]
- Raheja, N.; Manocha, A. IoT-Based ECG Monitoring System with Encryption and Authentication in Secure Data Transmission for Clinical Health Care Approach. Biomed. Signal Process. Control 2022, 74, 103481. [Google Scholar] [CrossRef]
- Damodharan, J.; Susai Michael, E.R.; Shaikh-Husin, N. High Throughput PRESENT Cipher Hardware Architecture for the Medical IoT Applications. Cryptography 2023, 7, 6. [Google Scholar] [CrossRef]
- Chen, P.-Y.; Cheng, Y.-C.; Zhong, Z.-H.; Zhang, F.-Z.; Pai, N.-S.; Li, C.-M.; Lin, C.-H. Information Security and Artificial Intelligence–Assisted Diagnosis in an Internet of Medical Thing System (IoMTS). IEEE Access 2024, PP, 1–1. [CrossRef]
- Singh, S.; Sharma, P.; Moon, S.; Park, J. Advanced Lightweight Encryption Algorithms for IoT Devices: Survey, Challenges, and Solutions. J. Ambient Intell. Humaniz. Comput. 2017, 15, 1–18. [Google Scholar] [CrossRef]
- Reddi, S.; Rao, P.M.; Saraswathi, P.; Jangirala, S.; Das, A.K.; Jamal, S.S.; Park, Y. Privacy-Preserving Electronic Medical Record Sharing for IoT-Enabled Healthcare System Using Fully Homomorphic Encryption, IOTA, and Masked Authenticated Messaging. IEEE Trans. Ind. Inform. 2024. [Google Scholar] [CrossRef]
- Khalifa, O.; Ahmed, M.Z.; Hashim, A. Application of Simon Encryption Algorithm for Data Transmission Between Sensor Nodes in IoT Environment. In Proceedings of the 2024 9th International Conference on Mechatronics Engineering (ICOM); 2024; pp. 127–132. [CrossRef]
- Sarkar, S.; Jiang, J.; Tsui, C.-Y.; Ki, W.-H. PRINCE Cipher and eFUSE-Based Embedded Encryption System for Optical Nerve Stimulator. IEEE Sens. J. 2024, PP, 1–1. [CrossRef]
- Sabban, A. Novel Meta-Fractal Wearable Sensors and Antennas for Medical, Communication, 5G, and IoT Applications. Fractal Fract. 2024, 8, 100. [Google Scholar] [CrossRef]















| Lightweight cryptography algorithms | Number of images | ||||
|---|---|---|---|---|---|
| 50 | 100 | 150 | 200 | 250 | |
| With attacks | |||||
| AES | 58.858 | 58.635 | 57.152 | 54.274 | 50.985 |
| PRESENT | 59.342 | 59.120 | 58.013 | 56.095 | 54.239 |
| MESA | 57.865 | 57.453 | 56.172 | 54.298 | 52.110 |
| LEA | 60.135 | 59.874 | 58.823 | 57.122 | 55.441 |
| XTEA | 56.743 | 55.922 | 54.637 | 52.945 | 51.340 |
| SIMON | 61.230 | 60.421 | 59.186 | 58.087 | 56.347 |
| PRINCE | 60.548 | 60.014 | 59.338 | 58.264 | 56.907 |
| RECTANGLE | 58.953 | 58.647 | 57.458 | 55.872 | 53.763 |
| RSA-AM+OBBO | 58.858 | 58.635 | 57.152 | 54.274 | 50.985 |
| ASCONv1.2+HOC+MWG | 63.568 | 63.054 | 62.878 | 62.545 | 60.258 |
| Without attacks | |||||
| AES | 64.232 | 63.945 | 63.387 | 62.095 | 60.312 |
| PRESENT | 64.645 | 64.290 | 63.443 | 62.410 | 60.885 |
| MESA | 62.140 | 61.845 | 61.089 | 59.963 | 58.532 |
| LEA | 64.533 | 64.220 | 63.574 | 62.105 | 60.420 |
| XTEA | 61.795 | 61.231 | 60.056 | 58.552 | 56.832 |
| SIMON | 65.027 | 64.412 | 63.263 | 62.104 | 60.395 |
| PRINCE | 64.860 | 64.254 | 63.437 | 62.288 | 60.716 |
| RECTANGLE | 63.360 | 62.924 | 62.003 | 60.597 | 58.872 |
| RSA-AM+OBBO | 64.040 | 63.753 | 63.034 | 61.793 | 59.567 |
| ASCONv1.2+HOC+MWG | 67.034 | 66.890 | 66.762 | 66.531 | 64.743 |
| Lightweight cryptography algorithms | Number of images | ||||
|---|---|---|---|---|---|
| 50 | 100 | 150 | 200 | 250 | |
| With attacks | |||||
| AES | 0.185 | 0.214 | 0.265 | 0.345 | 0.389 |
| PRESENT | 0.191 | 0.22 | 0.272 | 0.355 | 0.396 |
| MESA | 0.198 | 0.229 | 0.28 | 0.362 | 0.404 |
| LEA | 0.182 | 0.212 | 0.262 | 0.342 | 0.383 |
| XTEA | 0.189 | 0.218 | 0.268 | 0.349 | 0.391 |
| SIMON | 0.178 | 0.208 | 0.259 | 0.34 | 0.381 |
| PRINCE | 0.186 | 0.216 | 0.266 | 0.347 | 0.389 |
| RECTANGLE | 0.195 | 0.225 | 0.276 | 0.358 | 0.399 |
| RSA-AM+OBBO | 0.185 | 0.214 | 0.265 | 0.345 | 0.389 |
| ASCONv1.2+HOC+MWG | 0.152 | 0.185 | 0.192 | 0.215 | 0.232 |
| Without attacks | |||||
| AES | 0.142 | 0.167 | 0.215 | 0.275 | 0.308 |
| PRESENT | 0.149 | 0.172 | 0.22 | 0.282 | 0.316 |
| MESA | 0.156 | 0.181 | 0.229 | 0.292 | 0.327 |
| LEA | 0.138 | 0.164 | 0.213 | 0.272 | 0.306 |
| XTEA | 0.146 | 0.17 | 0.217 | 0.278 | 0.312 |
| SIMON | 0.135 | 0.161 | 0.208 | 0.27 | 0.304 |
| PRINCE | 0.143 | 0.169 | 0.218 | 0.28 | 0.315 |
| RECTANGLE | 0.152 | 0.178 | 0.226 | 0.288 | 0.323 |
| RSA-AM+OBBO | 0.142 | 0.167 | 0.215 | 0.275 | 0.308 |
| ASCONv1.2+HOC+MWG | 0.126 | 0.15 | 0.158 | 0.177 | 0.194 |
| Lightweight cryptography algorithms | Number of images | ||||
|---|---|---|---|---|---|
| 50 | 100 | 150 | 200 | 250 | |
| With attacks | |||||
| AES | 0.184 | 0.168 | 0.155 | 0.137 | 0.132 |
| PRESENT | 0.179 | 0.161 | 0.148 | 0.132 | 0.125 |
| MESA | 0.185 | 0.170 | 0.158 | 0.140 | 0.133 |
| LEA | 0.182 | 0.165 | 0.152 | 0.136 | 0.129 |
| XTEA | 0.190 | 0.174 | 0.160 | 0.145 | 0.139 |
| SIMON | 0.178 | 0.160 | 0.148 | 0.130 | 0.124 |
| PRINCE | 0.183 | 0.167 | 0.154 | 0.138 | 0.131 |
| RECTANGLE | 0.180 | 0.163 | 0.150 | 0.134 | 0.127 |
| RSA-AM+OBBO | 0.184 | 0.168 | 0.155 | 0.137 | 0.132 |
| ASCONv1.2+HOC+MWG | 0.199 | 0.175 | 0.162 | 0.158 | 0.142 |
| Without attacks | |||||
| AES | 0.162 | 0.140 | 0.125 | 0.112 | 0.105 |
| PRESENT | 0.155 | 0.132 | 0.120 | 0.110 | 0.100 |
| MESA | 0.160 | 0.140 | 0.125 | 0.115 | 0.105 |
| LEA | 0.158 | 0.138 | 0.124 | 0.113 | 0.104 |
| XTEA | 0.165 | 0.145 | 0.130 | 0.120 | 0.110 |
| SIMON | 0.154 | 0.134 | 0.120 | 0.110 | 0.100 |
| PRINCE | 0.160 | 0.140 | 0.126 | 0.115 | 0.106 |
| RECTANGLE | 0.158 | 0.138 | 0.124 | 0.113 | 0.104 |
| RSA-AM+OBBO | 0.162 | 0.140 | 0.125 | 0.112 | 0.105 |
| ASCONv1.2+HOC+MWG | 0.138 | 0.118 | 0.105 | 0.097 | 0.090 |
| Lightweight cryptography algorithms | Number of images | ||||
|---|---|---|---|---|---|
| 50 | 100 | 150 | 200 | 250 | |
| With attacks | |||||
| AES | 0.975 | 0.963 | 0.95 | 0.938 | 0.932 |
| PRESENT | 0.976 | 0.965 | 0.952 | 0.94 | 0.935 |
| MESA | 0.973 | 0.96 | 0.947 | 0.935 | 0.93 |
| LEA | 0.977 | 0.965 | 0.953 | 0.942 | 0.937 |
| XTEA | 0.97 | 0.957 | 0.943 | 0.931 | 0.926 |
| SIMON | 0.974 | 0.963 | 0.95 | 0.939 | 0.934 |
| PRINCE | 0.975 | 0.964 | 0.951 | 0.94 | 0.936 |
| RECTANGLE | 0.974 | 0.962 | 0.948 | 0.936 | 0.931 |
| RSA-AM+OBBO | 0.976 | 0.964 | 0.951 | 0.939 | 0.933 |
| ASCONv1.2+HOC+MWG | 0.98 | 0.97 | 0.96 | 0.95 | 0.945 |
| Without attacks | |||||
| AES | 0.985 | 0.978 | 0.97 | 0.96 | 0.955 |
| PRESENT | 0.986 | 0.98 | 0.973 | 0.963 | 0.957 |
| MESA | 0.985 | 0.979 | 0.972 | 0.962 | 0.956 |
| LEA | 0.987 | 0.981 | 0.974 | 0.964 | 0.958 |
| XTEA | 0.98 | 0.974 | 0.967 | 0.957 | 0.951 |
| SIMON | 0.985 | 0.979 | 0.973 | 0.963 | 0.957 |
| PRINCE | 0.986 | 0.98 | 0.974 | 0.964 | 0.958 |
| RECTANGLE | 0.985 | 0.979 | 0.973 | 0.963 | 0.957 |
| RSA-AM+OBBO | 0.986 | 0.98 | 0.973 | 0.963 | 0.957 |
| ASCONv1.2+HOC+MWG | 0.99 | 0.985 | 0.98 | 0.97 | 0.965 |
| Lightweight cryptography algorithms | Number of images | ||||
|---|---|---|---|---|---|
| 50 | 100 | 150 | 200 | 250 | |
| With attacks | |||||
| AES | 0.072 | 0.145 | 0.213 | 0.287 | 0.359 |
| PRESENT | 0.068 | 0.140 | 0.206 | 0.277 | 0.347 |
| MESA | 0.083 | 0.162 | 0.238 | 0.314 | 0.385 |
| LEA | 0.071 | 0.148 | 0.217 | 0.292 | 0.363 |
| XTEA | 0.079 | 0.155 | 0.227 | 0.302 | 0.373 |
| SIMON | 0.075 | 0.151 | 0.222 | 0.296 | 0.367 |
| PRINCE | 0.078 | 0.156 | 0.229 | 0.303 | 0.375 |
| RECTANGLE | 0.077 | 0.153 | 0.226 | 0.300 | 0.371 |
| RSA-AM+OBBO | 0.118 | 0.246 | 0.370 | 0.493 | 0.625 |
| ASCONv1.2+HOC+MWG | 0.150 | 0.310 | 0.465 | 0.612 | 0.765 |
| Without attacks | |||||
| AES | 0.070 | 0.141 | 0.209 | 0.284 | 0.356 |
| PRESENT | 0.066 | 0.137 | 0.203 | 0.274 | 0.344 |
| MESA | 0.080 | 0.158 | 0.234 | 0.310 | 0.381 |
| LEA | 0.069 | 0.144 | 0.212 | 0.287 | 0.358 |
| XTEA | 0.077 | 0.152 | 0.224 | 0.299 | 0.370 |
| SIMON | 0.073 | 0.149 | 0.220 | 0.294 | 0.365 |
| PRINCE | 0.076 | 0.153 | 0.226 | 0.299 | 0.371 |
| RECTANGLE | 0.075 | 0.150 | 0.223 | 0.297 | 0.368 |
| RSA-AM+OBBO | 0.115 | 0.240 | 0.362 | 0.485 | 0.610 |
| ASCONv1.2+HOC+MWG | 0.145 | 0.300 | 0.450 | 0.598 | 0.750 |
| Lightweight cryptography algorithms | Number of images | ||||
|---|---|---|---|---|---|
| 50 | 100 | 150 | 200 | 250 | |
| With attacks | |||||
| AES | 0.095 | 0.190 | 0.285 | 0.380 | 0.475 |
| PRESENT | 0.084 | 0.168 | 0.252 | 0.336 | 0.420 |
| MESA | 0.056 | 0.112 | 0.168 | 0.224 | 0.280 |
| LEA | 0.057 | 0.114 | 0.171 | 0.228 | 0.285 |
| XTEA | 0.053 | 0.106 | 0.159 | 0.212 | 0.265 |
| SIMON | 0.059 | 0.118 | 0.177 | 0.236 | 0.295 |
| PRINCE | 0.052 | 0.104 | 0.156 | 0.208 | 0.260 |
| RECTANGLE | 0.065 | 0.130 | 0.195 | 0.260 | 0.325 |
| RSA-AM+OBBO | 0.051 | 0.103 | 0.155 | 0.207 | 0.259 |
| ASCONv1.2+HOC+MWG | 0.048 | 0.096 | 0.144 | 0.192 | 0.240 |
| Without attacks | |||||
| AES | 0.090 | 0.180 | 0.270 | 0.360 | 0.450 |
| PRESENT | 0.080 | 0.160 | 0.240 | 0.320 | 0.400 |
| MESA | 0.054 | 0.108 | 0.162 | 0.216 | 0.270 |
| LEA | 0.055 | 0.110 | 0.165 | 0.220 | 0.275 |
| XTEA | 0.051 | 0.102 | 0.153 | 0.204 | 0.255 |
| SIMON | 0.057 | 0.114 | 0.171 | 0.228 | 0.285 |
| PRINCE | 0.050 | 0.100 | 0.150 | 0.200 | 0.250 |
| RECTANGLE | 0.063 | 0.126 | 0.189 | 0.252 | 0.315 |
| RSA-AM+OBBO | 0.049 | 0.098 | 0.147 | 0.196 | 0.245 |
| ASCONv1.2+HOC+MWG | 0.046 | 0.092 | 0.138 | 0.184 | 0.230 |
| Images | Lightweight cryptography algorithms | NPCR | UACI | Cross entropy |
|---|---|---|---|---|
| ECG | CTE + Dynamic Chaotic [31] | 99.623 | 47.168 | 0.139 |
| ASCONv1.2 + HOC + MWG | 99.700 | 48.500 | 13.950 | |
| EEG | CTE + Dynamic Chaotic [31] | 99.625 | 44.325 | 0.110 |
| ASCONv1.2 + HOC + MWG | 99.710 | 45.800 | 12.120 | |
| MRI | CTE + Dynamic Chaotic [31] | 99.614 | 39.678 | 0.134 |
| ASCONv1.2 + HOC + MWG | 99.690 | 41.000 | 13.545 | |
| X-Ray | CTE + Dynamic Chaotic [31] | 99.617 | 31.225 | 0.132 |
| ASCONv1.2 + HOC + MWG | 99.695 | 33.000 | 13.340 |
| Images | Lightweight cryptography algorithms | NPCR | UACI | Cross entropy |
|---|---|---|---|---|
| ECG | CTE + Dynamic Chaotic [31] | 0 | 0 | 0 |
| ASCONv1.2 + HOC + MWG | 0 | 0 | 0 | |
| EMG | CTE + Dynamic Chaotic [31] | 0 | 0 | 0 |
| ASCONv1.2 + HOC + MWG | 0 | 0 | 0 | |
| MRI | CTE + Dynamic Chaotic [31] | 0 | 0 | 0 |
| ASCONv1.2 + HOC + MWG | 0 | 0 | 0 | |
| X-Ray | CTE + Dynamic Chaotic [31] | 0 | 0 | 0 |
| ASCONv1.2 + HOC + MWG | 0 | 0 | 0 |
| Aspect | CTE+dynamic chaotic [31] | ASCONv1.2+HOC+MWG |
|---|---|---|
| Time complexity | O(m.n) | O(k.b+n+k.logk) |
| Space complexity | O(m+n) | O(m+n+k) |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).