A public static agreement key based cryptography for secure data transmission in WSN based smart environment application

被引:0
|
作者
Kumar, M. Satheesh [1 ]
Kumar, P. Ganesh [1 ]
机构
[1] KLN Coll Engn, Dept Informat Technol, Pottapalaiyam 630612, Tamil Nadu, India
关键词
WSN; Public static agreement key based cryptography; Red fox optimization; Fuzzy rules; Secure data transmission; Smart environment; ROUTING PROTOCOL; EFFICIENT;
D O I
10.1016/j.eswa.2024.123184
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Wireless Sensor Networks (WSN) is an emerging networking technology that allows for the low-cost, unattended monitoring of a variety of environments, thus WSN technologies have become increasingly important. Simultaneously, lack of security and poor energy efficiency is considered the major concerns in many routing protocols in various existing WSN protocols. Security and energy efficiency concerns are mainly due to the emergence of various kinds of malicious attacks because of advancements in networking technology. To mitigate these issues secured transmission is essential in any routing protocol. In order to provide safe data transfer in WSN-based smart environment applications, the TABEESR protocol (Trust Analysis Based Energy Efficient and Safe Routing) was developed. The proposed routing protocol encompasses four phases such as network creation and node deployment, grading for trust evaluation, route identification process and data transmission. The trust evaluation is performed with the aid of sensor packet features to categorize the positive nodes and negative nodes. The path identification process includes two processes such as cluster head selection through red fox optimization and relay node selection using a fuzzy interference system for energy efficient and secure path selection. A public static agreement key based cryptography technique is introduced for secure data transmission. The proposed TABEESR is tested with MATLAB software to validate its performance. SMEER, SHER, SRPA and AFSA are the prior routing protocols in WSN that are considered to compare the performance of the proposed routing protocol. The proposed TABEESR algorithm attained 95(%) of Average Residual Energy, 91 (%) of packet delivery ratio, 1350 (sec) network lifetime, 0.131 (Mbps) of throughput and 7(%) Packet Loss. Moreover, the proposed PSAKC algorithm attained 5.8 (%) information loss, 3.8 (sec) encryption time, 2.3 (sec) decryption time, 6 (sec) execution time, and 6.5 (J) energy consumption which is better than the prior methods. The proposed routing algorithm is applicable for providing security in both server to device and device to device in various smart applications.
引用
收藏
页数:15
相关论文
共 50 条
  • [21] A cancelable biometric based secure session key agreement protocol employing elliptic curve cryptography
    Sarkar, Arpita
    Singh, Binod
    INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT, 2019, 10 (05) : 1023 - 1042
  • [22] Grid-Based Routing Model for Energy Efficient and Secure Data Transmission in WSN for Smart Building Applications
    Sivasankarareddy, V
    Sundari, G.
    Reddy, Ch Rami
    Aymen, Flah
    Bortoni, Edson C.
    APPLIED SCIENCES-BASEL, 2021, 11 (22):
  • [23] Exceptional key based node validation for secure data transmission using asymmetric cryptography in wireless sensor networks
    Valluri, Bhanu Priyanka
    Sharma, Nitin
    Measurement: Sensors, 2024, 33
  • [24] Towards application of biometrically based methods for secure transmission of spatial data using elliptic curve cryptography
    Martin, Chris
    Vert, Gregory
    WMSCI 2005: 9th World Multi-Conference on Systemics, Cybernetics and Informatics, Vol 2, 2005, : 325 - 329
  • [25] Secure transmission of video on an end system multicast using public key cryptography
    Akkus, Istemi Ekin
    Ozkasap, Oznur
    Civanlar, M. Reha
    MULTIMEDIA CONTENT REPRESENTATION, CLASSIFICATION AND SECURITY, 2006, 4105 : 603 - 610
  • [26] ECC based threshold cryptography for secure data forwarding and secure key exchange in MANET (I)
    Ertaul, L
    Lu, WM
    NETWORKING 2005: NETWORKING TECHNOLOGIES, SERVICES, AND PROTOCOLS; PERFORMANCE OF COMPUTER AND COMMUNICATION NETWORKS; MOBILE AND WIRELESS COMMUNICATIONS SYSTEMS, 2005, 3462 : 102 - 113
  • [27] Secure Data Transmission in Heterogeneous Smart Meter Environment
    Senthil, P.
    Sivadarshini, S.
    Sandanalakshmi, R.
    2019 INNOVATIONS IN POWER AND ADVANCED COMPUTING TECHNOLOGIES (I-PACT), 2019,
  • [28] Efficient key revocation in WSN with lattice-based cryptography
    Khan, Ihtiram Raza
    Gupta, Neha
    Hundekari, Sheela
    Bansal, Ashish
    Mahajan, Rupali Atul
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2024, 27 (2A): : 339 - 348
  • [29] Secure Data Transmission Scheme Based on Elliptic Curve Cryptography for Internet of Things
    Harbi, Yasmine
    Aliouat, Zibouda
    Harous, Saad
    Bentaleb, Abdelhak
    MODELLING AND IMPLEMENTATION OF COMPLEX SYSTEMS, 2019, 64 : 34 - 46
  • [30] A Robust Smart Card based Authentication and Key Agreement Scheme for WSN using Fuzzy Extractor
    Rituparna Paul
    Shanvendra Rai
    Subhasish Banerjee
    Preetisudha Meher
    Peer-to-Peer Networking and Applications, 2024, 17 : 432 - 450