Securing wireless sensor networks with novel hybrid lightweight cryptographic protocols

被引:0
|
作者
Goyal, Dinesh [1 ]
Kumar, Anil [2 ]
Gandhi, Yatin [3 ]
Khetani, Vinit [4 ]
机构
[1] Poornima Inst Engn & Technol, Dept Comp Engn, Jaipur, Rajasthan, India
[2] Poornima Inst Engn & Technol, Dept Comp Sci & Engn, Jaipur, Rajasthan, India
[3] Competent Softwares, Pune, Maharashtra, India
[4] Cybrix Technol, Nagpur, Maharashtra, India
关键词
WSN; Lightweight cryptographic protocols; Hybrid security protocol; Security strength; Energy efficiency; AUTHENTICATION; SCHEME;
D O I
10.47974/JDMSC-1921
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
WSN are essential in the Internet of Things (IoT) framework as they enable the gathering and transmission of data in different fields. The limited resources of sensor nodes in these networks require security protocols that are lightweight, striking a balance between data protection and efficiency. This research paper introduces a new hybrid cryptographic protocol called AES-128-CCM + Diffie-Hellman (ACDH), which aims to tackle the security issues encountered by WSN. Here present thorough assessment of the ACDH protocol, with a specific emphasis on critical factors including Security Strength, Energy Efficiency and Communication Overhead. The comparative study examines the ACDH protocol in relation to three well-established lightweight cryptographic protocols like Lightweight IPSec, BLAKE2, and Simon. We analyze and highlight the differences between these protocols. These protocols function as standards for evaluating the efficiency of ACDH in a practical WSN setting. The evaluation unequivocally showcases the supremacy of the proposed ACDH model across various crucial aspects. ACDH demonstrates exceptional Security Strength, guaranteeing strong resilience against established cryptographic attacks and providing a high degree of data safeguarding. It demonstrates exceptional Energy Efficiency, enabling sensor nodes to preserve energy resources while upholding a high standard of security ACDH reduces Resource Utilization, optimizing the utilization of memory and processing power. The protocol's Communication Overhead is significantly minimal, guaranteeing the most efficient utilization of restricted bandwidth. The ACDH hybrid model consistently surpasses its counterparts in performance, making it the optimal selection for securing WSNs while adhering to the resource limitations of sensor nodes. The results of our research highlight the capability of ACDH as an innovative solution for developing lightweight cryptographic protocols that can improve the security and efficiency of Wireless Sensor Networks in the growing IoT environment.
引用
收藏
页码:703 / 714
页数:12
相关论文
共 50 条
  • [21] Cryptographic Protocols to Fight Sinkhole Attacks on Tree-based Routing in Wireless Sensor Networks
    Papadimitriou, Anthonis
    Le Fessant, Fabrice
    Viana, Aline Carneiro
    Sengul, Cigdem
    [J]. 2009 5TH IEEE WORKSHOP ON SECURE NETWORK PROTOCOLS, 2009, : 43 - +
  • [22] Design and evaluation of novel hybrid quantum resistant cryptographic system for enhancing security in wireless body sensor networks
    Surla, Govindu
    Lakshmi, R.
    [J]. OPTICAL AND QUANTUM ELECTRONICS, 2023, 55 (14)
  • [23] Cryptographic Techniques for Wireless Sensor Networks: A Survey
    Faquih, Aiman
    Kadam, Priyanka
    Saquib, Zia
    [J]. 2015 IEEE BOMBAY SECTION SYMPOSIUM (IBSS), 2015,
  • [24] Agent Platform for Wireless Sensor Network with Support for Cryptographic Protocols
    Pecho, Peter
    Zboril, Frantisek, Jr.
    Drahansky, Martin
    Hanacek, Petr
    [J]. JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2009, 15 (05) : 992 - 1006
  • [25] Securing wireless sensor networks from node clone attack: A lightweight message authentication algorithm
    Mohindru V.
    Singh Y.
    Bhatt R.
    [J]. International Journal of Information and Computer Security, 2020, 12 (2-3): : 217 - 233
  • [26] Hybrid online protocols for source location privacy in wireless sensor networks
    Bradbury, Matthew
    Jhumka, Arshad
    Leeke, Matthew
    [J]. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2018, 115 : 67 - 81
  • [27] Design and Implementation of Hybrid Broadcast Authentication Protocols in Wireless Sensor Networks
    Zhao Xin
    Wang Xiao-dong
    [J]. FGCN: PROCEEDINGS OF THE 2008 SECOND INTERNATIONAL CONFERENCE ON FUTURE GENERATION COMMUNICATION AND NETWORKING, VOLS 1 AND 2, 2008, : 824 - 828
  • [28] Hybrid Energy-Efficient Clustering Protocols for Wireless Sensor Networks
    Chen, Shuo
    Shen, Maiying
    Cao, Qi
    [J]. PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON SOFT COMPUTING IN INFORMATION COMMUNICATION TECHNOLOGY, 2014, : 78 - 82
  • [29] Monitoring Improvement on Reactive, Proactive and Hybrid Protocols of Wireless Sensor Networks
    Del-Valle-Soto, Carolina
    Velazquez, Ramiro
    Gutierrez, Carlos A.
    Valdivia, Leonardo J.
    Del Puerto-Flores, J. A.
    [J]. 2019 IEEE 39TH CENTRAL AMERICA AND PANAMA CONVENTION (CONCAPAN XXXIX), 2019, : 136 - 141
  • [30] Securing wireless sensor networks: Security architectures
    Boyle, David
    Newe, Thomas
    [J]. Journal of Networks, 2008, 3 (01) : 65 - 77