Cyber resilience of smart PPE: an algorithmic method for preventing occupational injuries
Abstract
Purpose. This study aims to resolve the scientific and technical contradiction between the need for cryptographic protection of communication channels in Smart PPE systems and the limited power resources of autonomous microcontrollers. The purpose of this article is to justify and develop an energy-efficient algorithmic method for ensuring the integrity of telemetric data, which allows for the integration of cyber resilience mechanisms into the industrial security framework without compromising the autonomy of the protection measures.
Methodology. The study employs an analysis of threat vectors to cyber-physical industrial safety systems (modeling of Man-in-the-Middle attack scenarios); a comparative analysis of the overhead of standard Industrial Internet of Things (IIoT) data transmission protocols; mathematical modeling of the data verification procedure based on the SipHash-2-4 lightweight cryptography algorithm; and a computational assessment of the time complexity and energy efficiency of the proposed method compared to existing AES-CMAC and HMAC-SHA256 standards. The subject of this study is the transmission and verification of telemetry data within a personnel safety monitoring system. This approach allows for a logical integration of data integrity with its ultimate purpose—the protection of human life.
Theoretical Value. The study deepens the understanding of the priority inversion within the information security triad (CIA) in occupational safety systems (prioritizing integrity over confidentiality). The theoretical feasibility of using lightweight hash functions as a sufficient protection measure for field-level devices (Level 0-1 according to IEC 62443) is proven; this enables the integration of cybersecurity mechanisms into the safety loop without inducing critical latency in emergency signal transmission.
Practical Value. The proposed algorithm mitigates the risks of concealing real hazards (the "False Negative" scenario) and generating false alarms, ensuring that dispatch services receive reliable information for evacuation decision-making. Calculations confirm that the autonomous battery life of Smart PPE can be extended by 15–20% compared to traditional encryption methods, thereby ensuring reliable continuous monitoring throughout a full work shift.
Type of Article. Scientific and practical.
Downloads
References
Alatawi, M. (2025). Optimizing security and energy efficiency in IoT-Based health monitoring systems for wireless body area networks. Scientific Reports, 15. https://doi.org/10.1038/s41598-025-11253-x.
Alomari, M., Al-Andoli, M., Ghaleb, M., Thabit, R., Alkawsi, G., Alsayaydeh, J., & Gaid, A. (2025). Security of Smart Grid: Cybersecurity Issues, Potential Cyberattacks, Major Incidents, and Future Directions. Energies. https://doi.org/10.3390/en18010141.
Bhagat, V., Kumar, S., Gupta, S., & Chaube, M. (2022). Lightweight cryptographic algorithms based on different model architectures: A systematic review and futuristic applications. Concurrency and Computation: Practice and Experience, 35. https://doi.org/10.1002/cpe.7425.
Chin, K., & Ahmed, N. (2022). Cyber-Physical Safety and Data Integrity in Industry 5.0. IEEE Systems Journal, 16(4).
Gao, T., & Wang, X. (2020). Cyber Threats in Industrial IoT and Protective Wearables. IEEE Internet of Things Journal, 7(6).
Grand View Research. (2024). Smart Personal Protective Equipment Market Size & Trends Report, 2024-2030. Grand View Research. https://www.grandviewresearch.com/industry-analysis/smart-personal-protective-equipment-market-report
Haiduk, O., & Zverev, V. (2024). Analysis of cyber threats in the context of rapid development of information technology. Cybersecurity: Education, Science, Technique. https://doi.org/10.28925/2663-4023.2024.23.225236.
Hussien, Z., Abdulmalik, H., Hussain, M., Nyangaresi, V., J., Abduljabbar, Z., & Abduljaleel, I. (2023). Lightweight Integrity Preserving Scheme for Secure Data Exchange in Cloud-Based IoT Systems. Applied Sciences. https://doi.org/10.3390/app13020691.
IBM Security. (2024). Cost of a Data Breach Report 2024. IBM Corporation. https://www.ibm.com/reports/data-breach
International Labour Organization. (2023). A Call for Safer and Healthier Working Environments. ILO. https://www.ilo.org/sites/default/files/wcmsp5/groups/public/@ed_protect/@protrav/@safework/documents/publication/wcms_903140.pdf
Kumar, S., & Singh, A. (2021). Lightweight Cryptography for IoT-enabled Safety Devices. Ad Hoc Networks, 119, 102515.
Lisovska, L., Terebukh, А., & Hatsuk, M. (2019). Grounds of modern models and systems of organizational creativity support. Journal of Lviv Polytechnic National University. Series of Economics and Management Issues.. https://doi.org/10.23939/semi2019.03.099.
Messaoudi, A., et al. (2023). Secure Edge Intelligence for Smart Safety Systems. Future Generation Computer Systems, 139, 356–369.
Orman, A. (2025). Cyberattack Detection Systems in Industrial Internet of Things (IIoT) Networks in Big Data Environments. Applied Sciences. https://doi.org/10.3390/app15063121.
Pérez, J., & López, D. (2021). Trust Framework for Secure Industrial Wearables. IEEE Transactions on Industrial Informatics, 17(8), 5403–5414.
Rodríguez, F., et al. (2022). AI-driven Anomaly Detection in Smart PPE Data Streams. Safety Science, 155, 105877.
Sabri, O., Al-Shargabi, B., Abuarqoub, A., & Hakami, T. (2025). A Lightweight Encryption Method for IoT-Based Healthcare Applications: A Review and Future Prospects. IoT. https://doi.org/10.3390/iot6020023.
Sinha, R., & Kumar, R. (2023). Cybersecurity in Smart Personal Protective Equipment for Industry 4.0 Environments. IEEE Access.
Verma, H., & Dubba, N. (2025). Hybrid Data Integrity Verification for Real-Time IoT Systems Using AEAD and VRF with ECDSA. Journal of Information Systems Engineering and Management. https://doi.org/10.52783/jisem.v10i34s.5875.
Wang, H. (2023). Post-quantum Cryptography for IoT-based Safety Devices. Computers & Security, 132, 103548.
Zhang, Y., et al. (2022). Blockchain-enabled Data Integrity for Smart Wearables in Industrial IoT. Sensors, 22(14), 5362. https://doi.org/10.3390/s22145362.
Zhukabayeva, T., Zholshiyeva, L., Karabayev, N., Khan, S., & Alnazzawi, N. (2025). Cybersecurity Solutions for Industrial Internet of Things–Edge Computing Integration: Challenges, Threats, and Future Directions. Sensors (Basel, Switzerland), 25. https://doi.org/10.3390/s25010213.
Krainiuk, O., Buts, Yu., Barbashyn, V., Kozodoi, D., & Kozodoi, O. (2024). Intelektualni systemy upravlinnia bezpekoiu pratsi na osnovi shtuchnoho intelektu: perspektyvy intehratsii v ukrainske zakonodavstvo [Intellectual systems of occupational safety management based on artificial intelligence: prospects of integration into Ukrainian legislation]. Komunalne hospodarstvo mist, 6(187), 242–251. https://doi.org/10.33042/2522-1809-2024-6-187-242-251.
Abstract views: 0 PDF Downloads: 0
The authors agree with the following conditions:
1. Authors retain copyright and grant the journal right of first publication (Download agreement) with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
2. Authors have the right to complete individual additional agreements for the non-exclusive spreading of the journal’s published version of the work (for example, to post work in the electronic repository of the institution or to publish it as part of a monograph), with the reference to the first publication of the work in this journal.
3. Journal’s politics allows and encourages the placement on the Internet (for example, in the repositories of institutions, personal websites, SSRN, ResearchGate, MPRA, SSOAR, etc.) manuscript of the work by the authors, before and during the process of viewing it by this journal, because it can lead to a productive research discussion and positively affect the efficiency and dynamics of citing the published work (see The Effect of Open Access).










