A Comparison of Lightweight Cryptographic Protocols for Energy-Efficient and Sustainable IoMT Authentication

Authors

  • Hayder Yasir Naser Department of Electrical Engineering, University of Basrah, Iraq
  • Ali K. Mattar Computer Science Department, Shatt Al-Arab University College, Basra, Iraq
  • Murtaja Ali Saare Department of Computer Science, College of Computer Science and Information, University of Basrah, Iraq
  • Mohammed Amin Almaiah King Abdullah the II IT School, Department of Computer Science, The University of Jordan, Amman, Jordan
  • Rami Shehab Vice-Presidency for Postgraduate Studies and Scientific Research, King Faisal University, Al-Ahsa, Saudi Arabia
Volume: 15 | Issue: 4 | Pages: 25746-25756 | August 2025 | https://doi.org/10.48084/etasr.12204

Abstract

The Internet of Medical Things (IoMT) supports health monitoring and data access and exchange in real time, but devices constrained in terms of energy, memory, and processing resources make traditional cryptographic protocols not applicable. This work presents a lightweight authentication framework that compares three symmetric encryption algorithms, TinyAES, SPECK, and PRESENT, designed for resource-limited IoMT systems. The method consists of four standalone phases: user registration, login authentication, session key exchange, and secure data transfer. The proposed approach was evaluated on the ESP32 and Raspberry Pi platforms, demonstrating up to 56% execution gain, 58% energy reduction, and 42% memory savings over ECC-based schemes. TinyAES achieves the best trade-off among all compared algorithms and is recommended for secure and sustainable medical IoT applications.

Keywords:

sustainable IoT security, tinyAES, SPECK, PRESENT, Internet of Medical Things (IoMT), lightweight cryptography, resource-constrained devices

Downloads

Download data is not yet available.

References

R. Dwivedi, D. Mehrotra, and S. Chandra, "Potential of Internet of Medical Things (IoMT) applications in building a smart healthcare system: A systematic review," Journal of Oral Biology and Craniofacial Research, vol. 12, no. 2, pp. 302–318, Mar. 2022. DOI: https://doi.org/10.1016/j.jobcr.2021.11.010

C. V. Mahamuni, "Improving Cardiopulmonary Resuscitation (CPR): Integrating Internet of Medical Things (IoMT) and Machine Learning (ML) - A Review," Recent Research Reviews Journal, vol. 3, no. 1, pp. 70–87, May 2024. DOI: https://doi.org/10.36548/rrrj.2024.1.005

B. A. Mohammed, M. A. Al-Shareeda, Z. G. Al-Mekhlafi, J. S. Alshudukhi, and K. A. Al-Dhlan, "HAFC: Handover Authentication Scheme Based on Fog Computing for 5G-Assisted Vehicular Blockchain Networks," IEEE Access, vol. 12, pp. 6251–6261, 2024. DOI: https://doi.org/10.1109/ACCESS.2024.3351278

T. Nusairat, M. M. Saudi, and A. B. Ahmad, "A Recent Assessment for the Ransomware Attacks Against the Internet of Medical Things (IoMT): A Review," in 2023 IEEE 13th International Conference on Control System, Computing and Engineering (ICCSCE), Penang, Malaysia, Aug. 2023, pp. 238–242. DOI: https://doi.org/10.1109/ICCSCE58721.2023.10237161

F. Majeed, M. Nazir, and J. Schneider, "ISA: Internet of Medical Things (IoMT) in Smart Healthcare and its Applications: A Review," in 2023 3rd International Conference on Artificial Intelligence (ICAI), Islamabad, Pakistan, Feb. 2023, pp. 129–135. DOI: https://doi.org/10.1109/ICAI58407.2023.10136661

H. Alotaibi, R. Alaklab, and M. M. H. Rahman, "The Use of Blockchain in Internet of Medical Things (IoMT)," International Journal on Perceptive and Cognitive Computing, vol. 11, no. 1, pp. 1–8, Jan. 2025. DOI: https://doi.org/10.31436/ijpcc.v11i1.513

A. A. Almazroi, M. A. Alqarni, M. A. Al-Shareeda, and S. Manickam, "L-CPPA: Lattice-based conditional privacy-preserving authentication scheme for fog computing with 5G-enabled vehicular system," PLOS ONE, vol. 18, no. 10, 2023, Art. no. e0292690. DOI: https://doi.org/10.1371/journal.pone.0292690

D. K. Nishad and D. R. Tripathi, "Internet of medical things (IOMT): applications and challenges," Turkish Journal of Computer and Mathematics Education (TURCOMAT), vol. 11, no. 3, pp. 2885–2889, 2020. DOI: https://doi.org/10.61841/turcomat.v11i3.14654

A. S. Rajawat, S. B. Goyal, P. Bedi, T. Jan, M. Whaiduzzaman, and M. Prasad, "Quantum Machine Learning for Security Assessment in the Internet of Medical Things (IoMT)," Future Internet, vol. 15, no. 8, Aug. 2023, Art. no. 271. DOI: https://doi.org/10.3390/fi15080271

T. Ahmed Alhaj et al., "A Survey: To Govern, Protect, and Detect Security Principles on Internet of Medical Things (IoMT)," IEEE Access, vol. 10, pp. 124777–124791, 2022. DOI: https://doi.org/10.1109/ACCESS.2022.3225038

A. A. Almazroi, M. H. Alkinani, M. A. Al-Shareeda, and S. Manickam, "A Novel DDoS Mitigation Strategy in 5G-Based Vehicular Networks Using Chebyshev Polynomials," Arabian Journal for Science and Engineering, vol. 49, no. 9, pp. 11991–12004, Sep. 2024. DOI: https://doi.org/10.1007/s13369-023-08535-9

L. Khan and F. Kabir, "In-depth Analysis on Secure and Privacy-Preserving Smart Care Homes based on Internet of Medical Things (IoMT)," in 2024 IEEE International Conference on Interdisciplinary Approaches in Technology and Management for Social Innovation (IATMSI), Gwalior, India, Mar. 2024, pp. 1–6. DOI: https://doi.org/10.1109/IATMSI60426.2024.10503242

T. Kang, N. Woo, and J. Ryu, "Enhanced Lightweight Medical Sensor Networks Authentication Scheme Based on Blockchain," IEEE Access, vol. 12, pp. 35612–35629, 2024. DOI: https://doi.org/10.1109/ACCESS.2024.3373879

V. P. Yanambaka, A. Abdelgawad, and K. Yelamarthi, "PIM: A PUF-Based Host Tracking Protocol for Privacy Aware Contact Tracing in Crowded Areas," IEEE Consumer Electronics Magazine, vol. 10, no. 4, pp. 90–98, Jul. 2021. DOI: https://doi.org/10.1109/MCE.2021.3065215

R. H. Razzaq, M. Al-Zubaidie, and R. G. Atiyah, "Intermediary Decentralized Computing and Private Blockchain Mechanisms for Privacy Preservation in the Internet of Medical Things," Mesopotamian Journal of CyberSecurity, vol. 4, no. 3, pp. 152–165, Dec. 2024. DOI: https://doi.org/10.58496/MJCS/2024/020

Q. Xie, Y. Zhao, Q. Xie, X. Li, D. He, and K. Chen, "A Multiserver Authentication Protocol With Integrated Monitoring for IoMT-Based Healthcare System," IEEE Internet of Things Journal, vol. 12, no. 2, pp. 2265–2278, Jan. 2025. DOI: https://doi.org/10.1109/JIOT.2024.3469629

Y. Otoum, Y. Wan, and A. Nayak, "Federated Transfer Learning-Based IDS for the Internet of Medical Things (IoMT)," in 2021 IEEE Globecom Workshops (GC Wkshps), Madrid, Spain, Dec. 2021, pp. 1–6. DOI: https://doi.org/10.1109/GCWkshps52748.2021.9682118

M. A. Al-Shareeda, T. Gaber, M. A. Alqarni, M. H. Alkinani, A. A. Almazroey, and A. A. Almazroi, "Chebyshev Polynomial Based Emergency Conditions with Authentication Scheme for 5G-Assisted Vehicular Fog Computing," IEEE Transactions on Dependable and Secure Computing, pp. 1–18, 2025. DOI: https://doi.org/10.1109/TDSC.2025.3553868

M. Jammula, V. M. Vakamulla, and S. K. Kondoju, "Secure and Scalable Internet of Medical Things using Ensemble Lightweight Cryptographic Model," in 2023 International Conference on Sustainable Computing and Smart Systems (ICSCSS), Coimbatore, India, Jun. 2023, pp. 982–987. DOI: https://doi.org/10.1109/ICSCSS57650.2023.10169857

L. Sushama, K. Sridhar, and M. Roberts, "Deep Learning-based Precision Diagnosis of Lung Diseases on the Internet of Medical Things (IoMT)," Proceedings of the Bulgarian Academy of Sciences, vol. 76, no. 10, pp. 1536–1543, Oct. 2023. DOI: https://doi.org/10.7546/CRABS.2023.10.07

A. Kumar, K. Chatterjee, and B. Mondal, "A Strong PUF-based Authentication for Medical IoT," in 2023 IEEE 2nd International Conference on Industrial Electronics: Developments & Applications (ICIDeA), Imphal, India, Sep. 2023, pp. 281–285. DOI: https://doi.org/10.1109/ICIDeA59866.2023.10295174

Z. Ghaleb Al-Mekhlafi et al., "Oblivious Transfer-Based Authentication and Privacy-Preserving Protocol for 5G-Enabled Vehicular Fog Computing," IEEE Access, vol. 12, pp. 100152–100166, 2024. DOI: https://doi.org/10.1109/ACCESS.2024.3429179

M. Masud et al., "A Lightweight and Robust Secure Key Establishment Protocol for Internet of Medical Things in COVID-19 Patients Care," IEEE Internet of Things Journal, vol. 8, no. 21, pp. 15694–15703, Aug. 2021. DOI: https://doi.org/10.1109/JIOT.2020.3047662

S. Yu and Y. Park, "A Robust Authentication Protocol for Wireless Medical Sensor Networks Using Blockchain and Physically Unclonable Functions," IEEE Internet of Things Journal, vol. 9, no. 20, pp. 20214–20228, Jul. 2022. DOI: https://doi.org/10.1109/JIOT.2022.3171791

B. A. Mohammed et al., "Efficient Blockchain-Based Pseudonym Authentication Scheme Supporting Revocation for 5G-Assisted Vehicular Fog Computing," IEEE Access, vol. 12, pp. 33089–33099, 2024. DOI: https://doi.org/10.1109/ACCESS.2024.3372390

L. M. S. Dias, J. F. C. B. Ramalho, T. Silvério, L. Fu, R. A. S. Ferreira, and P. S. André, "Smart Optical Sensors for Internet of Things: Integration of Temperature Monitoring and Customized Security Physical Unclonable Functions," IEEE Access, vol. 10, pp. 24433–24443, 2022. DOI: https://doi.org/10.1109/ACCESS.2022.3153051

T. F. Lee, X. Ye, and S. H. Lin, "Anonymous Dynamic Group Authenticated Key Agreements Using Physical Unclonable Functions for Internet of Medical Things," IEEE Internet of Things Journal, vol. 9, no. 16, pp. 15336–15348, Dec. 2022. DOI: https://doi.org/10.1109/JIOT.2022.3149117

G. Dhamodharan, "An Enhanced and Dynamic Key AES Algorithm for Internet of Things Data Security," Journal of Advanced Zoology, vol. 44, no. S6, pp. 1323–1332, Dec. 2023. DOI: https://doi.org/10.17762/jaz.v44iS6.2444

Z. G. Al-Mekhlafi et al., "Lattice-Based Cryptography and Fog Computing Based Efficient Anonymous Authentication Scheme for 5G-Assisted Vehicular Communications," IEEE Access, vol. 12, pp. 71232–71247, 2024. DOI: https://doi.org/10.1109/ACCESS.2024.3402336

S. Chhabra and K. Lata, "Hardware Obfuscation of AES IP Core Using PUFs and PRNG: A Secure Cryptographic Key Generation Solution for Internet-of-Things Applications," SN Computer Science, vol. 3, no. 4, May 2022, Art. no. 303. DOI: https://doi.org/10.1007/s42979-022-01194-x

M. Al-Mashhadani and M. Shujaa, "IoT Security Using AES Encryption Technology based ESP32 Platform," The International Arab Journal of Information Technology, vol. 19, no. 2, 2022. DOI: https://doi.org/10.34028/iajit/19/2/8

R. R. Maulana, Moch. Zen Samsono Hadi, and A. Sudarsono, "Internet of Things and Data Encryption in the Agricultural Sector using the AES Cryptosystem," in 2022 International Electronics Symposium (IES), Surabaya, Indonesia, Aug. 2022, pp. 176–181. DOI: https://doi.org/10.1109/IES55876.2022.9888283

S. Majumder, S. Ray, D. Sadhukhan, M. K. Khan, and M. Dasgupta, "ECC-CoAP: Elliptic Curve Cryptography Based Constraint Application Protocol for Internet of Things," Wireless Personal Communications, vol. 116, no. 3, pp. 1867–1896, Feb. 2021. DOI: https://doi.org/10.1007/s11277-020-07769-2

S. K. Mousavi, A. Ghaffari, S. Besharat, and H. Afshari, "Security of Internet of Things using RC4 and ECC Algorithms (Case Study: Smart Irrigation Systems)," Wireless Personal Communications, vol. 116, no. 3, pp. 1713–1742, Feb. 2021. DOI: https://doi.org/10.1007/s11277-020-07758-5

Z. G. Al-Mekhlafi et al., "Coherent Taxonomy of Vehicular Ad Hoc Networks (VANETs) Enabled by Fog Computing: A Review," IEEE Sensors Journal, vol. 24, no. 19, pp. 29575–29602, Jul. 2024. DOI: https://doi.org/10.1109/JSEN.2024.3436612

S. Majumder, S. Ray, D. Sadhukhan, M. Dasgupta, A. K. Das, and Y. Park, "ECC-PDGPP: ECC-Based Parallel Dependency RFID-Grouping-Proof Protocol Using Zero-Knowledge Property in the Internet of Things Environment," IEEE Open Journal of the Computer Society, vol. 5, pp. 329–342, 2024. DOI: https://doi.org/10.1109/OJCS.2024.3406142

A. A. Abbood et al., "Benchmarking Bilinear Pair Cryptography for Resource-Constrained Platforms Using Raspberry Pi," WSEAS Transactions on Information Science and Applications, vol. 22, pp. 245–257, Feb. 2025. DOI: https://doi.org/10.37394/23209.2025.22.21

J. M. H. Altmemi et al., "A Software-Centric Evaluation of the VEINS Framework in Vehicular Ad-Hoc Networks," Journal of Robotics and Control (JRC), vol. 6, no. 2, pp. 822–845, Apr. 2025. DOI: https://doi.org/10.18196/jrc.v6i2.25839

M. K. Hasan et al., "Lightweight Encryption Technique to Enhance Medical Image Security on Internet of Medical Things Applications," IEEE Access, vol. 9, pp. 47731–47742, 2021. DOI: https://doi.org/10.1109/ACCESS.2021.3061710

A. A. Almazroi, M. A. Alqarni, M. A. Al-Shareeda, M. H. Alkinani, A. A. Almazroey, and T. Gaber, "FCA-VBN: Fog computing-based authentication scheme for 5G-assisted vehicular blockchain network," Internet of Things, vol. 25, Apr. 2024, Art. no. 101096 DOI: https://doi.org/10.1016/j.iot.2024.101096

K. Kim, J. Ryu, Y. Lee, and D. Won, "An Improved Lightweight User Authentication Scheme for the Internet of Medical Things," Sensors, vol. 23, no. 3, Jan. 2023, Art. no. 1122. DOI: https://doi.org/10.3390/s23031122

M. Wazid, J. Singh, A. K. Das, S. Shetty, M. K. Khan, and J. J. P. C. Rodrigues, "ASCP-IoMT: AI-Enabled Lightweight Secure Communication Protocol for Internet of Medical Things," IEEE Access, vol. 10, pp. 57990–58004, 2022. DOI: https://doi.org/10.1109/ACCESS.2022.3179418

B. Singh and C. Kaunert, "Aroma of Highly Smart Internet of Medical Things (IoMT) and Lightweight EdgeTrust Expansion Medical Care Facilities for Electronic Healthcare Systems: Fortified-Chain Architecture for Remote Patient Monitoring and Privacy Protection Beyond Imagination," in Lightweight Digital Trust Architectures in the Internet of Medical Things (IoMT), IGI Global Scientific Publishing, 2024, pp. 196–212. DOI: https://doi.org/10.4018/979-8-3693-2109-6.ch011

V. M. Kapse, M. Joshi, M. P. Karthikeyan, and D. Choudhary, "A 5G-Enabled intelligent healthcare sector with deep learning assistance," Multidisciplinary Science Journal, vol. 6, Jul. 2024. DOI: https://doi.org/10.31893/multiscience.2024ss0306

M. A. Al-Shareeda, M. A. Saare, and S. Manickam, "Unmanned aerial vehicle: a review and future directions," Indonesian Journal of Electrical Engineering and Computer Science, vol. 30, no. 2, May 2023, Art. no. 778. DOI: https://doi.org/10.11591/ijeecs.v30.i2.pp778-786

P. Sharma, S. Jain, S. Gupta, and V. Chamola, "Role of machine learning and deep learning in securing 5G-driven industrial IoT applications," Ad Hoc Networks, vol. 123, Dec. 2021, Art. no. 102685. DOI: https://doi.org/10.1016/j.adhoc.2021.102685

M. J. Almansor et al., "Vessel berthing system using internet of things (IoT) for smart port," AIP Conference Proceedings, vol. 3303, no. 1, Mar. 2025, Art. no. 080004. DOI: https://doi.org/10.1063/5.0261734

A. A. Abbood, F. K. AL-Shammri, Z. M. Alzamili, ‪Mahmood A. Al-Shareeda‬‏, M. A. Almaiah, and R. AlAli, "Investigating Quantum-Resilient Security Mechanisms for Flying Ad-Hoc Networks (FANETs)," Journal of Robotics and Control (JRC), vol. 6, no. 1, pp. 456–469, Feb. 2025.‬ DOI: https://doi.org/10.18196/jrc.v6i1.25351

M. A. Al-Shareeda, A. A. H. Ghadban, A. A. H. Glass, E. M. A. Hadi, and M. A. Almaiah, "Efficient implementation of post-quantum digital signatures on Raspberry Pi," Discover Applied Sciences, vol. 7, no. 6, Jun. 2025, Art. no. 597. DOI: https://doi.org/10.1007/s42452-025-07201-z

A. Rana, C. Chakraborty, S. Sharma, S. Dhawan, S. K. Pani, and I. Ashraf, "Internet of Medical Things-Based Secure and Energy-Efficient Framework for Health Care," Big Data, vol. 10, no. 1, pp. 18–33, Feb. 2022. DOI: https://doi.org/10.1089/big.2021.0202

S. M. Nagarajan, G. G. Deverajan, U. Kumaran, M. Thirunavukkarasan, M. D. Alshehri, and S. Alkhalaf, "Secure Data Transmission in Internet of Medical Things Using RES-256 Algorithm," IEEE Transactions on Industrial Informatics, vol. 18, no. 12, pp. 8876–8884, Sep. 2022. DOI: https://doi.org/10.1109/TII.2021.3126119

B. Mosallanezhad, M. Hajiaghaei-Keshteli, N. R. Smith Cornejo, and E. Z. Rodríguez Calvo, "An IoMT platform for an integrated sustainable energy-efficient disaster relief supply chain to prevent severity-driven disruptions during pandemics," Journal of Industrial Information Integration, vol. 35, Oct. 2023, Art. no. 100502. DOI: https://doi.org/10.1016/j.jii.2023.100502

P. Baniya, A. Agrawal, P. Nand, B. Bhushan, and P. Bhattacharya, "Blockchain-Based Security Sustainable Framework for IoMT Applications and Industry 5.0," in Soft Computing in Industry 5.0 for Sustainability, C. K. K. Reddy, T. Sithole, M. Ouaissa, Ö. ÖZER, and M. M. Hanafiah, Eds. Springer Nature Switzerland, 2024, pp. 377–406. DOI: https://doi.org/10.1007/978-3-031-69336-6_17

H. Ghayvat et al., "Digitally Enhanced Home to the Village: AIoMT-Enabled Multisource Data Fusion and Power-Efficient Sustainable Computing," IEEE Internet of Things Journal, vol. 11, no. 24, pp. 39030–39040, Sep. 2024. DOI: https://doi.org/10.1109/JIOT.2024.3411798

S. K. Khalsa, R. Kaur, and R. Kaur, "ML techniques for analyzing security threats and enhancing sustainability in medical field based on Industry 4.0," in Machine Learning for Sustainable Manufacturing in Industry 4.0, CRC Press, 2023. DOI: https://doi.org/10.1201/9781003453567-3

H. Byeon, "Vulnerability Analysis of Privacy-Preserving Four-Factor Authentication for Medical IoT Environments and Sustainable Development Goals," Journal of Lifestyle and SDGs Review, vol. 5, no. 4, Mar. 2025. DOI: https://doi.org/10.47172/2965-730X.SDGsReview.v5.n04.pe05225

J. Svensson and A. Karlsson, ACRSES – Advanced Cryptography on a Resource Scarce Embedded System. 2023.

R. A. F. Lustro, A. M. Sison, and R. P. Medina, "Performance Analysis of Enhanced SPECK Algorithm," in Proceedings of the 4th International Conference on Industrial and Business Engineering, Jul. 2018, pp. 256–264. DOI: https://doi.org/10.1145/3288155.3288196

A. Sevin and Ü. Çavuşoğlu, "Design and Performance Analysis of a SPECK-Based Lightweight Hash Function," Electronics, vol. 13, no. 23, Jan. 2024, Art. no. 4767. DOI: https://doi.org/10.3390/electronics13234767

D. Mohammed Noori, H. Kadhim Hoomod, and I. Abid Yousif, "An image encryption based on hybrid PRESENT-SPECK algorithm," Materials Today: Proceedings, vol. 80, pp. 2668–2677, Jan. 2023. DOI: https://doi.org/10.1016/j.matpr.2021.07.011

M. AbdulRaheem, I. D. Oladipo, A. González-Briones, J. B. Awotunde, A. R. Tomori, and R. G. Jimoh, "An efficient lightweight speck technique for edge-IoT-based smart healthcare systems," in 5G IoT and Edge Computing for Smart Healthcare, A. K. Bhoi, V. H. C. de Albuquerque, S. N. Sur, and P. Barsocchi, Eds. Academic Press, 2022, pp. 139–162. DOI: https://doi.org/10.1016/B978-0-323-90548-0.00005-X

M. AbdulRaheem et al., "An Enhanced Lightweight Speck System for Cloud-Based Smart Healthcare," in Applied Informatics, 2021, pp. 363–376. DOI: https://doi.org/10.1007/978-3-030-89654-6_26

V. Mavroeidis, K. Vishi, M. D. Zych, and A. Jøsang, "The Impact of Quantum Computing on Present Cryptography," International Journal of Advanced Computer Science and Applications, vol. 9, no. 3, 2018. DOI: https://doi.org/10.14569/IJACSA.2018.090354

T. Kowsalya et al.,"Low Area PRESENT Cryptography in FPGA Using TRNG-PRNG Key Generation," Computers, Materials and Continua, vol. 68, no. 2, pp. 1447–1465, Mar. 2021. DOI: https://doi.org/10.32604/cmc.2021.014606

M. Al-Maliki, W. Hussein, M. M. Qasim, Z. A. Abduljabbar, A. A. Ahmed, and A. H. Ali, "Design and Optimization of a Multi-Core Fiber Optic Communication System for Height-Capacity Data Transmission in Iraq’s Urban Environment," Engineering, Technology & Applied Science Research, vol. 15, no. 2, pp. 21829–21837, Apr. 2025. DOI: https://doi.org/10.48084/etasr.9539

Z. S. Alzaidi, A. A. Yassin, Z. A. Abduljabbar, and V. O. Nyangaresi, "A Fog Computing and Blockchain-based Anonymous Authentication Scheme to Enhance Security in VANET Environments," Engineering, Technology & Applied Science Research, vol. 15, no. 1, pp. 19143–19153, Feb. 2025. DOI: https://doi.org/10.48084/etasr.8663

A. Mohammed, A. Salama, N. Shebka, and A. Ismail, "Enhancing Network Access Control using Multi-Modal Biometric Authentication Framework," Engineering, Technology & Applied Science Research, vol. 15, no. 1, pp. 20144–20150, Feb. 2025. DOI: https://doi.org/10.48084/etasr.9554

E. Aruna and A. Sahayadhas, "Blockchain-Inspired Lightweight Dynamic Encryption Schemes for a Secure Health Care Information Exchange System," Engineering, Technology & Applied Science Research, vol. 14, no. 4, pp. 15050–15055, Aug. 2024. DOI: https://doi.org/10.48084/etasr.7390

Downloads

How to Cite

[1]
H. Y. Naser, A. K. Mattar, M. A. Saare, M. A. Almaiah, and R. Shehab, “A Comparison of Lightweight Cryptographic Protocols for Energy-Efficient and Sustainable IoMT Authentication”, Eng. Technol. Appl. Sci. Res., vol. 15, no. 4, pp. 25746–25756, Aug. 2025.

Metrics

Abstract Views: 206
PDF Downloads: 201

Metrics Information