Securing wireless sensor networks with novel hybrid lightweight cryptographic protocols

被引:0
|
作者
Goyal, Dinesh [1 ]
Kumar, Anil [2 ]
Gandhi, Yatin [3 ]
Khetani, Vinit [4 ]
机构
[1] Poornima Inst Engn & Technol, Dept Comp Engn, Jaipur, Rajasthan, India
[2] Poornima Inst Engn & Technol, Dept Comp Sci & Engn, Jaipur, Rajasthan, India
[3] Competent Softwares, Pune, Maharashtra, India
[4] Cybrix Technol, Nagpur, Maharashtra, India
关键词
WSN; Lightweight cryptographic protocols; Hybrid security protocol; Security strength; Energy efficiency; AUTHENTICATION; SCHEME;
D O I
10.47974/JDMSC-1921
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
WSN are essential in the Internet of Things (IoT) framework as they enable the gathering and transmission of data in different fields. The limited resources of sensor nodes in these networks require security protocols that are lightweight, striking a balance between data protection and efficiency. This research paper introduces a new hybrid cryptographic protocol called AES-128-CCM + Diffie-Hellman (ACDH), which aims to tackle the security issues encountered by WSN. Here present thorough assessment of the ACDH protocol, with a specific emphasis on critical factors including Security Strength, Energy Efficiency and Communication Overhead. The comparative study examines the ACDH protocol in relation to three well-established lightweight cryptographic protocols like Lightweight IPSec, BLAKE2, and Simon. We analyze and highlight the differences between these protocols. These protocols function as standards for evaluating the efficiency of ACDH in a practical WSN setting. The evaluation unequivocally showcases the supremacy of the proposed ACDH model across various crucial aspects. ACDH demonstrates exceptional Security Strength, guaranteeing strong resilience against established cryptographic attacks and providing a high degree of data safeguarding. It demonstrates exceptional Energy Efficiency, enabling sensor nodes to preserve energy resources while upholding a high standard of security ACDH reduces Resource Utilization, optimizing the utilization of memory and processing power. The protocol's Communication Overhead is significantly minimal, guaranteeing the most efficient utilization of restricted bandwidth. The ACDH hybrid model consistently surpasses its counterparts in performance, making it the optimal selection for securing WSNs while adhering to the resource limitations of sensor nodes. The results of our research highlight the capability of ACDH as an innovative solution for developing lightweight cryptographic protocols that can improve the security and efficiency of Wireless Sensor Networks in the growing IoT environment.
引用
收藏
页码:703 / 714
页数:12
相关论文
共 50 条
  • [1] Hybrid Cryptographic Technique For Heterogeneous Wireless Sensor Networks
    Kavitha, R. J.
    Caroline, B. Elizabeth
    [J]. 2015 INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND SIGNAL PROCESSING (ICCSP), 2015, : 1016 - 1020
  • [2] Implementation of a Novel Cryptographic Algorithm in Wireless Sensor Networks
    AnandaKrishna, B.
    Madhuri, N.
    Rao, M. Koteswara
    VijaySekar, B.
    [J]. 2018 CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATION ENGINEERING SYSTEMS (SPACES), 2018, : 149 - 153
  • [3] Implementation and analysis of new lightweight cryptographic algorithm suitable for wireless sensor networks
    Koo, Woo Kwon
    Lee, Hwaseong
    Kim, Yong Ho
    Lee, Dong Hoon
    [J]. PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND ASSURANCE, 2008, : 73 - 76
  • [4] A Lightweight Hybrid Security Framework for Wireless Sensor Networks
    Sedjelmaci, Hichem
    Senouci, Sidi Mohammed
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2014, : 3636 - 3641
  • [5] Securing wireless sensor networks
    Yi, Xun
    Faulkner, Mike
    Okamoto, Eiji
    [J]. ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 497 - +
  • [6] Compiling and securing cryptographic protocols
    Chevalier, Yannick
    Rusinowitch, Michael
    [J]. INFORMATION PROCESSING LETTERS, 2010, 110 (03) : 116 - 122
  • [7] A Novel Algorithm for Securing Data Aggregation in Wireless Sensor Networks
    Hayouni, Haythem
    Hamdi, Mohamed
    [J]. AD-HOC, MOBILE, AND WIRELESS NETWORKS, ADHOC-NOW 2016, 2016, 9724 : 263 - 276
  • [8] Performance Analysis of Postquantum Cryptographic Schemes for Securing Large-Scale Wireless Sensor Networks
    Senor, Jaime
    Portilla, Jorge
    Portela-Garcia, Marta
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2024, : 12339 - 12349
  • [9] TinyPairing: A Fast and Lightweight Pairing-based Cryptographic Library for Wireless Sensor Networks
    Xiong, Xiaokang
    Wong, Duncan S.
    Deng, Xiaotie
    [J]. 2010 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC 2010), 2010,
  • [10] A Symmetric Cryptographic Construct for Securing Wireless Sensor Network Communications
    Adekunle, A. A.
    [J]. 2015 INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2015, : 935 - 940