An Energy-Efficient Multi-Layer Secure Routing Protocol for Post-Quantum Cryptographic Networks in Internet of Medical Things (IoMT)
DOI:
https://doi.org/10.64137/XXXXXXXX/IJMST-V1I1P101Keywords:
IoMT, Post-quantum cryptography, Energy efficiency, Secure routing, Multi-layer security, Lattice-based cryptography, Healthcare networksAbstract
With IoMT, healthcare is being changed rapidly by allowing data from patients to be monitored and managed remotely. But the fact that IoMT devices have weak resources, need strict timing and send sensitive data makes it challenging to secure and operate efficiently. As quantum computers are almost ready to break conventional cryptography, it is important to create post-quantum cryptographic methods for the IoMT. The paper introduces an Energy-Saving, Layered and Safe Routing Protocol (EEMSRP) for use in post-quantum cryptographic networks in the IoMT. It includes several layers of security, using lattice-based post-quantum cryptography and improved routing methods to cut back on energy use. The framework uses hierarchical architecture to organize devices, adopts clustering and relies on lightweight algorithms for post-quantum key exchange. Results from simulations find that EEMSRP is able to save up to 30% of the energy used by existing quantum-resistant protocols, but still remains secure against eavesdropping, man-in-the-middle attacks and quantum-based cryptanalysis. Because of its multi-layer defense, the protocol guarantees the privacy, accuracy and continued accessibility of IoMT data. This research provides a base for upcoming secure and power-efficient communication standards in the post-quantum world, which is important for guarding private medical details and guaranteeing reliable IoMT use
References
[1] Roman, R., Najera, P., & Lopez, J. (2011). Securing the internet of things. Computer, 44(9), 51-58.
[2] Sfar, A. R., Natalizio, E., Challal, Y., & Chtourou, Z. (2018). A roadmap for security challenges in the Internet of Things. Digital Communications and Networks, 4(2), 118-137.
[3] Rana, M., Mamun, Q., & Islam, R. (2022). Lightweight cryptography in IoT networks: A survey. Future Generation Computer Systems, 129, 77-89.
[4] Bernstein, D. J., Lange, T., & Peters, C. (2008, October). Attacking and defending the McEliece cryptosystem. In International Workshop on Post-Quantum Cryptography (pp. 31-46). Berlin, Heidelberg: Springer Berlin Heidelberg.
[5] Peikert, C. (2016). A decade of lattice cryptography. Foundations and trends® in theoretical computer science, 10(4), 283-424.
[6] Alkim, E., Ducas, L., Pöppelmann, T., & Schwabe, P. (2016). Post-quantum key {Exchange—A} new hope. In 25th USENIX Security Symposium (USENIX Security 16) (pp. 327-343).
[7] Chen, L., Chen, L., Jordan, S., Liu, Y. K., Moody, D., Peralta, R., ... & Smith-Tone, D. (2016). Report on post-quantum cryptography (Vol. 12). Gaithersburg, MD, USA: US Department of Commerce, National Institute of Standards and Technology.
[8] Heinzelman, W. R., Chandrakasan, A., & Balakrishnan, H. (2000, January). Energy-efficient communication protocol for wireless microsensor networks. In Proceedings of the 33rd annual Hawaii international conference on system sciences (pp. 10-pp). IEEE.
[9] Lindsey, S., Raghavendra, C., & Sivalingam, K. M. (2002). Data gathering algorithms in sensor networks using energy metrics. IEEE Transactions on parallel and distributed systems, 13(9), 924-935.
[10] Younis, O., & Fahmy, S. (2004). HEED: a hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks. IEEE Transactions on mobile computing, 3(4), 366-379.
[11] Akyildiz, I. F., & Kasimoglu, I. H. (2004). Wireless sensor and actor networks: research challenges. Ad hoc networks, 2(4), 351-367.
[12] Khan, W., Wang, H., Anwar, M. S., Ayaz, M., Ahmad, S., & Ullah, I. (2019). A multi-layer cluster based energy efficient routing scheme for UWSNs. IEEE Access, 7, 77398-77410.
[13] Lipare, A., Edla, D. R., & Dharavath, R. (2020). Energy efficient routing structure to avoid energy hole problem in multi-layer network model. Wireless Personal Communications, 112(4), 2575-2596.
[14] Koutras, D., Stergiopoulos, G., Dasaklis, T., Kotzanikolaou, P., Glynos, D., & Douligeris, C. (2020). Security in IoMT communications: A survey. Sensors, 20(17), 4828.
[15] Schurgers, C., & Srivastava, M. B. (2001, October). Energy efficient routing in wireless sensor networks. In 2001 MILCOM proceedings communications for network-centric operations: creating the information force (Cat. No. 01CH37277) (Vol. 1, pp. 357-361). IEEE.
[16] Chang, R. S., & Kuo, C. J. (2006, April). An energy efficient routing mechanism for wireless sensor networks. In 20th International Conference on Advanced Information Networking and Applications-Volume 1 (AINA'06) (Vol. 2, pp. 5-pp). IEEE.
[17] S. Bama, P. K. Maroju, S. Banala, S. Kumar Sehrawat, M. Kommineni and D. Kodi, "Development of Web Platform for Home Screening of Neurological Disorders Using Artificial Intelligence," 2025 First International Conference on Advances in Computer Science, Electrical, Electronics, and Communication Technologies (CE2CT), Bhimtal, Nainital, India, 2025, pp. 995-999, doi: 10.1109/CE2CT64011.2025.10939414.
[18] Muniraju Hullurappa, Sudheer Panyaram, “Quantum Computing for Equitable Green Innovation Unlocking Sustainable Solutions,” in Advancing Social Equity Through Accessible Green Innovation, IGI Global, USA, pp. 387- 402, 2025.
[19] Mohanarajesh, Kommineni (2024). Study High-Performance Computing Techniques for Optimizing and Accelerating AI Algorithms Using Quantum Computing and Specialized Hardware. International Journal of Innovations in Applied Sciences and Engineering 9 (`1):48-59.
[20] Agarwal S. “Multi-Modal Deep Learning for Unified Search-Recommendation Systems in Hybrid Content Platforms”. IJAIBDCMS [International Journal of AI, BigData, Computational and Management Studies]. 2025 May 30 [cited 2025 Jun. 4]; 4(3):30-39. Available from: https://ijaibdcms.org/index.php/ijaibdcms/article/view/154