A public static agreement key based cryptography for secure data transmission in WSN based smart environment application

被引:0
|
作者
Kumar, M. Satheesh [1 ]
Kumar, P. Ganesh [1 ]
机构
[1] KLN Coll Engn, Dept Informat Technol, Pottapalaiyam 630612, Tamil Nadu, India
关键词
WSN; Public static agreement key based cryptography; Red fox optimization; Fuzzy rules; Secure data transmission; Smart environment; ROUTING PROTOCOL; EFFICIENT;
D O I
10.1016/j.eswa.2024.123184
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Wireless Sensor Networks (WSN) is an emerging networking technology that allows for the low-cost, unattended monitoring of a variety of environments, thus WSN technologies have become increasingly important. Simultaneously, lack of security and poor energy efficiency is considered the major concerns in many routing protocols in various existing WSN protocols. Security and energy efficiency concerns are mainly due to the emergence of various kinds of malicious attacks because of advancements in networking technology. To mitigate these issues secured transmission is essential in any routing protocol. In order to provide safe data transfer in WSN-based smart environment applications, the TABEESR protocol (Trust Analysis Based Energy Efficient and Safe Routing) was developed. The proposed routing protocol encompasses four phases such as network creation and node deployment, grading for trust evaluation, route identification process and data transmission. The trust evaluation is performed with the aid of sensor packet features to categorize the positive nodes and negative nodes. The path identification process includes two processes such as cluster head selection through red fox optimization and relay node selection using a fuzzy interference system for energy efficient and secure path selection. A public static agreement key based cryptography technique is introduced for secure data transmission. The proposed TABEESR is tested with MATLAB software to validate its performance. SMEER, SHER, SRPA and AFSA are the prior routing protocols in WSN that are considered to compare the performance of the proposed routing protocol. The proposed TABEESR algorithm attained 95(%) of Average Residual Energy, 91 (%) of packet delivery ratio, 1350 (sec) network lifetime, 0.131 (Mbps) of throughput and 7(%) Packet Loss. Moreover, the proposed PSAKC algorithm attained 5.8 (%) information loss, 3.8 (sec) encryption time, 2.3 (sec) decryption time, 6 (sec) execution time, and 6.5 (J) energy consumption which is better than the prior methods. The proposed routing algorithm is applicable for providing security in both server to device and device to device in various smart applications.
引用
收藏
页数:15
相关论文
共 50 条
  • [41] On bluetooth repairing: Key agreement based on symmetric-key cryptography
    Vaudenay, S
    INFORMATION SECURITY AND CRYPTOLOGY, PROCEEDINGS, 2005, 3822 : 1 - 9
  • [42] An Energy Efficient and Secure IoT-Based WSN Framework: An Application to Smart Agriculture
    Haseeb, Khalid
    Din, Ikram Ud
    Almogren, Ahmad
    Islam, Naveed
    SENSORS, 2020, 20 (07)
  • [43] Public key cryptography based on Moufang loops
    Chee, Wing Loon
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2022, 25 (08): : 2411 - 2427
  • [44] Secure Hybrid Data Transmission Protocol for WSN with Key Management and Message Authentication
    A Sharmila
    Vinay Rishiwal
    Pramod Kumar
    Mano Yadav
    Preeti Yadav
    SN Computer Science, 6 (5)
  • [45] A Secure Data Getting/Transmitting protocol for WSN in IoT Using Revocable Storage Identity Based Cryptography
    Lavanya, P.
    Sangeetha, A.
    Kumar, K. Raj
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON COMMUNICATION AND ELECTRONICS SYSTEMS (ICCES 2018), 2018, : 1164 - 1170
  • [46] Public key cryptography based on semigroup actions
    Maze, Gerard
    Monico, Chris
    Rosenthal, Joachim
    ADVANCES IN MATHEMATICS OF COMMUNICATIONS, 2007, 1 (04) : 489 - 507
  • [47] A Secure Authentication and Key Agreement Scheme for IoT-Based Cloud Computing Environment
    Yu, Yicheng
    Hu, Liang
    Chu, Jianfeng
    SYMMETRY-BASEL, 2020, 12 (01):
  • [48] Secure distributed framework based on seamless key session for smart home environment
    Khan, Muhammad Mehran Arshad
    Wang, Chengliang
    Zou, Minhui
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2018, 14 (12):
  • [49] A novel secure cryptography model for data transmission based on Rotor64 technique
    Obeidat, Ibrahim
    Mughaid, Ala
    AlZu'bi, Shadi
    AL-Arjan, Ahmed
    AL-Amrat, Rula
    AL-Ajmi, Rathaa
    AL-Hayajneh, Razan
    Abuhaija, Belal
    Abualigah, Laith
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 83 (13) : 37295 - 37314
  • [50] A novel secure cryptography model for data transmission based on Rotor64 technique
    Ibrahim Obeidat
    Ala Mughaid
    Shadi AlZu’bi
    Ahmed AL-Arjan
    Rula AL-Amrat
    Rathaa AL-Ajmi
    Razan AL-Hayajneh
    Belal Abuhaija
    Laith Abualigah
    Multimedia Tools and Applications, 2024, 83 : 37295 - 37314