TY - EJOU AU - Elsayed, Sara H. AU - Abdelsalam, Rodaina AU - Shoman, Mahmoud A. Ismail AU - Alotaibi, Raed AU - Reyad, Omar TI - Secure IoT Data Transmission Using MPEG Derived Motion Vectors and Dual Encryption Techniques T2 - Computers, Materials \& Continua PY - VL - IS - SN - 1546-2226 AB - In today’s digitally connected world, where cyber threats are becoming increasingly complex, finding modern and secure text encryption solutions that maintain maximum runtime performance while offering high-level protection is more crucial. The deployment of sophisticated security paradigms is often accompanied by a significant escalation in computational overhead. Thus, the fundamental objective resides in the mitigation of computational overhead while maintaining an uncompromising security posture. Internet of Things (IoT) devices require strong security measures for data transmission. Also, protecting communication channels against illegal access and eavesdropping has become crucial due to the exponential expansion of the IoT. The IoT implementations frequently have weak, unencrypted data streams that are susceptible to manipulation and interception. In order to overcome this, the proposed work incorporates lightweight protection using Moving Picture Experts Group (MPEG) derived motion vectors and dual encryption techniques to guarantee message confidentiality and integrity via limited IoT networks. The proposed method starts with resizing MPEG video frames to dimensions [1080, 1920]. After extracting motion vectors from two successive video frames, scale the obtained vectors to 1000. The exclusive OR (XOR) procedure is applied to the combined motion vectors. A one-dimensional (1D) vector is then produced. The initial elliptic curve Diffie-Hellman (ECDH) private key is created using a mapping of a hash function. The public keys, shared secret keys, and a second private key are also created. The shared secret key is used to generate the Advanced Encryption Standard (AES) main key. After that, the created AES is used to encrypt and decrypt text messages ranging in length from 10 to 300 bytes. Several evaluation metrics, including mean square error (MSE), peak signal to noise ratio (PSNR), correlation coefficient (CC), avalanche Effect (AE), and compression ratio (CR) values, are evaluated between the original and ciphertext. The presented method has demonstrated optimal performance in terms of encryption and decryption times as well as public and private key generation. Thus, improving the IoT application’s overall security condition by guaranteeing that only authorized endpoints can decrypt and read the data, and showing minimal latency overhead as compared to insecure transmission. This suggests that it is a highly effective solution for secure text communication, offering lightweight encryption suitable for a wide range of resource-constrained and real-time applications. KW - MPEG; motion vectors; encryption; decryption; IoT; ECDH; AES; MES; PSNR; CC; AE; CR DO - 10.32604/cmc.2026.079018