A public static agreement key based cryptography for secure data transmission in WSN based smart environment application

被引:0
|
作者
Kumar, M. Satheesh [1 ]
Kumar, P. Ganesh [1 ]
机构
[1] KLN Coll Engn, Dept Informat Technol, Pottapalaiyam 630612, Tamil Nadu, India
关键词
WSN; Public static agreement key based cryptography; Red fox optimization; Fuzzy rules; Secure data transmission; Smart environment; ROUTING PROTOCOL; EFFICIENT;
D O I
10.1016/j.eswa.2024.123184
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Wireless Sensor Networks (WSN) is an emerging networking technology that allows for the low-cost, unattended monitoring of a variety of environments, thus WSN technologies have become increasingly important. Simultaneously, lack of security and poor energy efficiency is considered the major concerns in many routing protocols in various existing WSN protocols. Security and energy efficiency concerns are mainly due to the emergence of various kinds of malicious attacks because of advancements in networking technology. To mitigate these issues secured transmission is essential in any routing protocol. In order to provide safe data transfer in WSN-based smart environment applications, the TABEESR protocol (Trust Analysis Based Energy Efficient and Safe Routing) was developed. The proposed routing protocol encompasses four phases such as network creation and node deployment, grading for trust evaluation, route identification process and data transmission. The trust evaluation is performed with the aid of sensor packet features to categorize the positive nodes and negative nodes. The path identification process includes two processes such as cluster head selection through red fox optimization and relay node selection using a fuzzy interference system for energy efficient and secure path selection. A public static agreement key based cryptography technique is introduced for secure data transmission. The proposed TABEESR is tested with MATLAB software to validate its performance. SMEER, SHER, SRPA and AFSA are the prior routing protocols in WSN that are considered to compare the performance of the proposed routing protocol. The proposed TABEESR algorithm attained 95(%) of Average Residual Energy, 91 (%) of packet delivery ratio, 1350 (sec) network lifetime, 0.131 (Mbps) of throughput and 7(%) Packet Loss. Moreover, the proposed PSAKC algorithm attained 5.8 (%) information loss, 3.8 (sec) encryption time, 2.3 (sec) decryption time, 6 (sec) execution time, and 6.5 (J) energy consumption which is better than the prior methods. The proposed routing algorithm is applicable for providing security in both server to device and device to device in various smart applications.
引用
收藏
页数:15
相关论文
共 50 条
  • [31] A Robust Smart Card based Authentication and Key Agreement Scheme for WSN using Fuzzy Extractor
    Paul, Rituparna
    Rai, Shanvendra
    Banerjee, Subhasish
    Meher, Preetisudha
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2024, 17 (01) : 432 - 450
  • [32] Ruzicka Indexed Regressive Homomorphic Ephemeral Key Benaloh Cryptography for Secure Data Aggregation in WSN
    Pichumani, Saravanakumar
    Sundararajan, T. V. P.
    Dhanaraj, Rajesh Kumar
    Nam, Yunyoung
    Kadry, Seifedine
    JOURNAL OF INTERNET TECHNOLOGY, 2021, 22 (06): : 1287 - 1297
  • [33] A Novel Bi-Key Computational Algorithm for Secure Data Transmission in Smart Meter Environment
    Bagri D.
    Rathore S.
    Recent Advances in Computer Science and Communications, 2022, 15 (08) : 1052 - 1058
  • [34] A new provably secure authentication and key agreement mechanism for SIP using certificateless public-key cryptography
    Wang, Fengjiao
    Zhang, Yuqing
    COMPUTER COMMUNICATIONS, 2008, 31 (10) : 2142 - 2149
  • [35] A new provably secure authentication and key agreement mechanism for SIP using certificateless public-key cryptography
    Wang, Fengjiao
    Zhang, Yuqing
    CIS: 2007 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PROCEEDINGS, 2007, : 809 - 814
  • [36] Implementation of Secure Key Distribution Based On Quantum Cryptography
    Elboukhari, Mohamed
    Azizi, Abdelmalek
    Azizi, Mostafa
    2009 INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS (ICMCS 2009), 2009, : 361 - +
  • [37] Lightweight and secure PUF-based authenticated key agreement scheme for smart grid
    Tahavori, Mahdi
    Moazami, Farokhlagha
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2020, 13 (05) : 1616 - 1628
  • [38] Lightweight and secure PUF-based authenticated key agreement scheme for smart grid
    Mahdi Tahavori
    Farokhlagha Moazami
    Peer-to-Peer Networking and Applications, 2020, 13 : 1616 - 1628
  • [39] A key based secure threshold cryptography for secret image
    Naskar, Prabir Kr.
    Khan, Hari Narayan
    Chaudhuri, Atal
    International Journal of Network Security, 2016, 18 (01) : 68 - 81
  • [40] A secure password-based authentication and key agreement scheme using smart cards
    Mishra, Dheerendra
    Das, Ashok Kumar
    Chaturvedi, Ankita
    Mukhopadhyay, Sourav
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2015, 23 : 28 - 43