{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,22]],"date-time":"2025-12-22T04:41:37Z","timestamp":1766378497922,"version":"3.40.5"},"reference-count":29,"publisher":"IGI Global","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,10,1]]},"abstract":"<p>Short period monitoring and emergency notification of healthcare signals is becoming affordable with existence of internet of things (IoT) support. However, IoT does not prevent challenges that may hinder the appropriate safe spread of medical solutions. Confidentiality of data is vital, making a real fear requesting cryptography. The limitations in memory, computations processing, power consumptions, and small-size devices contradict the robust encryption process asking for help of low-weight-cryptography to handle practically. This article presents a comparative analysis of performance evaluation of three trusted candidate encryption algorithms, namely AES, SPECK and SIMON, which are simulated and compared in details to distinguish who has the best behaviour to be nominated for a medical application. These encryption algorithms are implemented and evaluated in regard to the execution time, power consumption, memory occupation and speed. The implementation is carried out using the Cooja simulator running on Contiki operating system showing interesting attractive results.<\/p>","DOI":"10.4018\/ijehmc.2019100101","type":"journal-article","created":{"date-parts":[[2019,8,13]],"date-time":"2019-08-13T16:59:38Z","timestamp":1565715578000},"page":"1-15","source":"Crossref","is-referenced-by-count":56,"title":["Simulating Light-Weight-Cryptography Implementation for IoT Healthcare Data Security Applications"],"prefix":"10.4018","volume":"10","author":[{"given":"Norah","family":"Alassaf","sequence":"first","affiliation":[{"name":"Umm Al-Qura University, Makkah, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0923-202X","authenticated-orcid":true,"given":"Adnan","family":"Gutub","sequence":"additional","affiliation":[{"name":"Umm Al-Qura University, Makkah, Saudi Arabia"}]}],"member":"2432","reference":[{"issue":"2","key":"IJEHMC.2019100101-0","doi-asserted-by":"crossref","first-page":"50","DOI":"10.46565\/jreas.2017.v02i02.002","article-title":"Applicable light-weight cryptography to secure medical data in IoT systems.","volume":"2","author":"N.AlAssaf","year":"2017","journal-title":"Journal of Research in Engineering and Applied Sciences"},{"key":"IJEHMC.2019100101-1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2014.05.545"},{"key":"IJEHMC.2019100101-2","unstructured":"Beaulieu, R., Shors, D., Smith, J., Treatman-Clark, S., Weeks, B., Wingers, L. (2015). SIMON and SPECK: Block Ciphers for the Internet of Things. IACR Cryptology ePrint Archive, 585."},{"key":"IJEHMC.2019100101-3","unstructured":"Daemen, J., & Rijmen, V. (1999). AES proposal: Rijndael."},{"key":"IJEHMC.2019100101-4","unstructured":"Dandekar, A. K., Pradhan, S., & Ghormade, S. (2016). Design of AES-512 Algorithm for Communication Network."},{"key":"IJEHMC.2019100101-5","unstructured":"Dinu, D., Le Corre, Y., Khovratovich, D., Perrin, L., Gro\u00dfsch\u00e4dl, J., Biryukov, A. (2015). Triathlon of Lightweight Block Ciphers for the Internet of Things. IACR Cryptology ePrint Archive, 209."},{"key":"IJEHMC.2019100101-6","unstructured":"Gutub, A. (2003, March). High Speed Low Power GF(2k) Elliptic Curve Cryptography Processor Architecture. In IEEE 10th Annual Technical Exchange Meeting, KFUPM, Dhahran, Saudi Arabia."},{"key":"IJEHMC.2019100101-7","first-page":"44","article-title":"Merging GF(p) Elliptic Curve Point Adding and Doubling on Pipelined VLSI Cryptographic ASIC Architecture.","volume":"6","author":"A.Gutub","year":"2006","journal-title":"International Journal of Computer Science and Network Security"},{"key":"IJEHMC.2019100101-8","doi-asserted-by":"crossref","unstructured":"Gutub, A. (2011, June). Subthreshold SRAM Designs for Cryptography Security Computations. In 2nd International Conference on Software Engineering and Computer Systems (ICSECS), Universiti Malaysia Pahang, Kuantan, Malaysia.","DOI":"10.1007\/978-3-642-22170-5_9"},{"key":"IJEHMC.2019100101-9","unstructured":"Gutub, A. (2015, May). Exploratory Data Visualization for Smart Systems. In Smart Cities 2015 - 3rd Annual Digital Grids and Smart Cities Workshop, BurjRafal Hotel Kempinski, Riyadh, Saudi Arabia."},{"key":"IJEHMC.2019100101-10","unstructured":"Gutub, A. & Khan, E. (2011). Using Subthreshold SRAM to Design Low-Power Crypto Hardware. International Journal of New Computer Architectures and their Applications, 1(2), 474-483."},{"key":"IJEHMC.2019100101-11","doi-asserted-by":"crossref","unstructured":"Gutub, A., & Khan, F. (2012, November). Hybrid Crypto Hardware Utilizing Symmetric-Key & Public-Key Cryptosystems. In International Conference on Advanced Computer Science Applications and Technologies (ACSAT), Palace of the Golden Horses, Kuala Lumpur, Malaysia.","DOI":"10.1109\/ACSAT.2012.44"},{"key":"IJEHMC.2019100101-12","first-page":"67","article-title":"Serial vs.","author":"A.Gutub","year":"2013","journal-title":"Parallel Elliptic Curve Crypto Processor Designs. In IADIS International Conference: Applied Computing"},{"key":"IJEHMC.2019100101-13","unstructured":"Gutub, A., & Tahhan, H. (2008, March). Efficient Adders To Speedup Modular Multiplication For Cryptography. In 5th IEEE International Workshop on Signal Processing and its Applications (WoSPA), University of Sharjah, UAE."},{"key":"IJEHMC.2019100101-14","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1109\/SERVICES.2015.12","article-title":"Towards an analysis of security issues, challenges, and open problems in the internet of things.","author":"M. M.Hossain","year":"2015","journal-title":"IEEE World Congress on Services (SERVICES)"},{"issue":"4","key":"IJEHMC.2019100101-15","first-page":"31","article-title":"A comprehensive survey on evaluation of lightweight symmetric ciphers: Hardware and software implementation.","volume":"5","author":"J.Hosseinzadeh","year":"2016","journal-title":"International Journal of Advances in Computer Science"},{"key":"IJEHMC.2019100101-16","doi-asserted-by":"crossref","first-page":"302","DOI":"10.1016\/j.protcy.2016.08.111","article-title":"Where AES is for Internet, SIMON could be for IoT.","volume":"25","author":"R.Nithya","year":"2016","journal-title":"Procedia Technology Journal"},{"key":"IJEHMC.2019100101-17","doi-asserted-by":"crossref","first-page":"214","DOI":"10.1016\/j.jbi.2017.01.006","article-title":"Hiding clinical information in medical images: A new high capacity and reversible data hiding technique.","volume":"66","author":"S. A.Parah","year":"2017","journal-title":"Journal of Biomedical Informatics"},{"issue":"3","key":"IJEHMC.2019100101-18","doi-asserted-by":"crossref","first-page":"3943","DOI":"10.1007\/s11042-016-4196-2","article-title":"A New Reversible and high capacity data hiding technique for E-healthcare applications.","volume":"76","author":"S. A.Parah","year":"2017","journal-title":"Multimedia Tools and Applications"},{"key":"IJEHMC.2019100101-19","first-page":"1","article-title":"A high capacity data hiding scheme based on edge detection and even-odd plane separation.","author":"S. A.Parah","year":"2015","journal-title":"Annual IEEE India Conference (INDICON)"},{"issue":"8","key":"IJEHMC.2019100101-20","doi-asserted-by":"crossref","first-page":"10599","DOI":"10.1007\/s11042-015-3127-y","article-title":"Information hiding in medical images: A robust medical image watermarking system for E-healthcare.","volume":"76","author":"S. A.Parah","year":"2017","journal-title":"Multimedia Tools and Applications"},{"key":"IJEHMC.2019100101-21","first-page":"1","article-title":"Information hiding in edges: A high capacity information hiding technique using hybrid edge detection.","author":"S. A.Parah","year":"2016","journal-title":"Multimedia Tools and Applications"},{"key":"IJEHMC.2019100101-22","first-page":"51","article-title":"On the realization of a spatial domain data hiding technique based on intermediate significant bit plane embedding (ISBPE) and Post Embedding Pixel Adjustment (PEPA).","author":"S. A.Parah","year":"2013","journal-title":"IEEE International Conference on Multimedia, Signal Processing and Communication Technologies (IMPACT)"},{"issue":"13","key":"IJEHMC.2019100101-23","first-page":"107","article-title":"Data hiding in color images: A high capacity data hiding technique for covert communication.","volume":"4","author":"S. A.Parah","year":"2013","journal-title":"Computer Engineering and Intelligent Systems"},{"key":"IJEHMC.2019100101-24","first-page":"1","article-title":"Fragility evaluation of intermediate significant bit embedding (ISBE) based digital image watermarking scheme for content authentication.","author":"S. A.Parah","year":"2014","journal-title":"IEEE International Conference on Advances in Electronics, Computers and Communications (ICAECC)"},{"issue":"4","key":"IJEHMC.2019100101-25","doi-asserted-by":"crossref","first-page":"80","DOI":"10.4018\/JGIM.2017100106","article-title":"Realization of a New Robust and Secure Watermarking Technique Using DC Coefficient Modification in Pixel Domain and Chaotic Encryption.","volume":"25","author":"S. A.Parah","year":"2017","journal-title":"Journal of Global Information Management"},{"key":"IJEHMC.2019100101-26","first-page":"1","article-title":"January). Performance trade-offs of encryption algorithms for Wireless Sensor Networks.","author":"A.Trad","year":"2014","journal-title":"IEEE World Congress on Computer Applications and Information Systems (WCCAIS)"},{"key":"IJEHMC.2019100101-27","unstructured":"Wu, M., Lu, T. J., Ling, F. Y., Sun, J., & Du, H. Y. (2010, August). Research on the architecture of Internet of things. In IEEE 3rd International Conference on Advanced Computer Theory and Engineering (ICACTE)."},{"issue":"5","key":"IJEHMC.2019100101-28","doi-asserted-by":"crossref","first-page":"644","DOI":"10.15837\/ijccc.2014.5.661","article-title":"A knowledge-based telemonitoring platform for application in remote healthcare.","volume":"9","author":"W.Zhang","year":"2014","journal-title":"International Journal of Computers, Communications & Control"}],"container-title":["International Journal of E-Health and Medical Communications"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=235437","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T20:58:44Z","timestamp":1651870724000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJEHMC.2019100101"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2019,10,1]]},"references-count":29,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2019,10]]}},"URL":"https:\/\/doi.org\/10.4018\/ijehmc.2019100101","relation":{},"ISSN":["1947-315X","1947-3168"],"issn-type":[{"type":"print","value":"1947-315X"},{"type":"electronic","value":"1947-3168"}],"subject":[],"published":{"date-parts":[[2019,10,1]]}}}