Adaptive Lightweight Security for Performance Efficiency in Critical Healthcare Monitoring

Ijaz Ahmad,Faheem Shahid,Ijaz Ahmad,Johirul Islam,Kazi Nymul Haque,Erkki Harjula
2024-06-06
Abstract:The healthcare infrastructure requires robust security procedures, technologies, and policies due to its critical nature. Since the Internet of Things (IoT) with its diverse technologies has become an integral component of future healthcare systems, its security requires a thorough analysis due to its inherent security limitations that arise from resource constraints. Existing communication technologies used for IoT connectivity, such as 5G, provide communications security with the underlying communication infrastructure to a certain level. However, the evolving healthcare paradigm requires adaptive security procedures and technologies that can adapt to the varying resource constraints of IoT devices. This need for adaptive security is particularly pronounced when considering components outside the security sandbox of 5G, such as IoT nodes and M2M connections, which introduce additional security challenges. This article brings forth the unique healthcare monitoring requirements and studies the existing encryption-based security approaches to provide the necessary security. Furthermore, this research introduces a novel approach to optimizing security and performance in IoT in healthcare, particularly in critical use cases such as remote patient monitoring. Finally, the results from the practical implementation demonstrate a marked improvement in the system performance.
Cryptography and Security
What problem does this paper attempt to address?
### What problem does this paper attempt to solve? This paper aims to solve the trade - off problem between security and performance efficiency of Internet of Things (IoT) devices in the remote patient monitoring (RPM) scenario in the healthcare field. Specifically, it focuses on the following aspects: 1. **Security of IoT devices**: - Although existing communication technologies (such as 5G) provide a certain level of security, they cannot fully adapt to the resource limitations of IoT devices. - Especially in the healthcare field, IoT nodes and machine - to - machine (M2M) connections introduce additional security challenges because these components are usually not within the 5G security protection range. 2. **Application of lightweight encryption algorithms**: - Traditional encryption methods (such as TLS), although providing strong security, are not suitable for resource - constrained IoT devices due to their resource - intensive nature. - The paper proposes to use ASCON, a lightweight encryption standard, to minimize the impact on device performance while ensuring data security. 3. **Real - time and data confidentiality in remote patient monitoring**: - In remote patient monitoring, it is crucial to ensure the real - time and confidentiality of data transmission. The paper verifies the performance of different encryption schemes in practical applications through experiments, and in particular, ASCON performs excellently in the case of small message volumes. 4. **Adaptive security mechanisms**: - The particularity of the healthcare field requires that security mechanisms can be adjusted according to different resource constraints. The paper emphasizes the importance of developing adaptive security measures to meet the needs of different application scenarios. ### Main contributions of the paper - **Experimental setup**: Constructed an experimental environment for remote patient monitoring, using MQTT as the underlying M2M protocol. - **Performance evaluation**: Analyzed the impact of TLS encryption on MQTT performance and explored the applications of NIST - standard AES - 128 - GCM and the ASCON lightweight encryption standard in telemedicine. - **Performance improvement**: Demonstrated the significant effect of the ASCON lightweight encryption algorithm in improving system performance, especially in the case of small message volumes. - **Future prospects**: Proposed the research direction of real - time adaptive security mechanisms in the context of 6G technology and AI/ML integration. ### Summary This paper verifies through experiments the superiority of ASCON as a lightweight encryption algorithm in remote patient monitoring, especially on resource - constrained IoT devices, which can maintain high performance efficiency while ensuring data security. This provides an important reference for future healthcare IoT applications.