507 495

Title

An Efficient and Secured Triple-Layered Wireless Sensor Network with Machine Learning Techniques

  Reem Atassi 1 * ,   Aditi Sharma 2

1  Faculty of Computer Information System, Higher Colleges of Technology, UAE
    (ratassi@hct.ac.ae)

2  IEEE Senior Member, Post-Doc Fellow, Intelligent Cryptographic systems/IOT-Cloud in Robotics, Nazarbayev University, Kazakhstan ;Department of Computer Science, School of Engineering and Digital Sciences
    (aditi11121986@gmail.com)


Doi   :   https://doi.org/10.54216/IJWAC.060201

Received: September 03, 2022 Accepted: November 18, 2022

Abstract :

Replacement of physical labor and repetitive tasks by the agents is an attractive issue in the Smart Environment (SE). SE is distinguished by its ability to be controlled from a distance, to facilitate the connection between devices through middleware, to gather and share data from sensors, to improve the intelligence of devices, and to make decisions. To be effective, SE design must make use of information and networks that already exist in the actual world. Effective SE design is complicated by several difficulties, including monitoring, data collecting, assessment, evaluation, prediction of important data, and meaningful presentation. For SE, the most important step is gathering information from a variety of sensors in various locations. Wireless sensor networks provide an underlying architecture for the coordinated collection of data from many sensors that have common characteristics (WSN). An essential aspect of sensor networks is their inability to function in the currently complicated environment for wireless network security. In the realm of remote sensor businesses, cryptology is an essential part of safety measures. Several of the prevalent cryptographic methods have significant flaws that prevent them from being fully reliable. In this paper, we provide a unified, three-stage cryptographic procedure that combines public-key and secret-key techniques for maximum security. Due to consideration of Public-key management and high degree of security, Rijndael Encryption Approach (REA), Horst Feistel's Encryption Approach (HFEA), and the more sophisticated Rivest-Shamir-Adleman (e-RSA). Time spent in both execution and decoding of the suggested approach was utilized to rank the quality of displays. The suggested set of rules uses a single evaluation boundary or computation time, which is different from the methodologies used before. Low Encryption Time (LET) and Low Unscrambling Time (LDT) values of 1.12 and 1.26 were observed on texts ranging in size from 6 to 184 MB, respectively. Comparisons show that the suggested hybrid form is 2.9% more efficient than AES+RSA, 1.36 times more efficient than ECC+RSA+MD-5, 1.36 times more efficient than AES+ECC, and 1.36 times more efficient than AES+ECC+RSA+MD-5.

Keywords :

Wireless Sensor Networks (WSN); Rijndael encryption approach; Horst Feistel’s encryption approach; Enhanced RSA

References :

[1] H. Hu and W. Chang, "On the Mitigation of Controllable Event Triggering Attack in WSNs,"

2020 29th International Conference on Computer Communications and Networks (ICCCN),

2020, pp. 1-6, doi: 10.1109/ICCCN49398.2020.9209613.

[2] R. Chanana, A. K. Singh, R. Killa, S. Agarwal and P. S. Mehra, "Blockchain Based Secure Model

for Sensor Data in Wireless Sensor Network," 2020 6th International Conference on Signal

Processing and Communication (ICSC), 2020, pp. 288-293, doi:

10.1109/ICSC48311.2020.9182776.

[3] G. Xu, F. Wang, M. Zhang and J. Peng, "Efficient and Provably Secure Anonymous User

Authentication Scheme for Patient Monitoring Using Wireless Medical Sensor Networks," in

IEEE Access, vol. 8, pp. 47282-47294, 2020, doi: 10.1109/ACCESS.2020.2978891.

[4] Y. Zhan, B. Wang and R. Lu, "Cryptanalysis and Improvement of a Pairing-Free Certificateless

Aggregate Signature in Healthcare Wireless Medical Sensor Networks," in IEEE Internet of

Things Journal, vol. 8, no. 7, pp. 5973-5984, 1 April1, 2021, doi: 10.1109/JIOT.2020.3033337.

[5] S. Hassayoun, S. Lahouar and K. Besbes, "SDR Bridge for a Secure Wireless Sensor Network

(WSN)," 2020 IEEE International Conference on Design & Test of Integrated Micro & Nano-

Systems (DTS), 2020, pp. 1-5, doi: 10.1109/DTS48731.2020.9196201.

[6] J. Kar, K. Naik and T. Abdelkader, "A Secure and Lightweight Protocol for Message

Authentication in Wireless Sensor Networks," in IEEE Systems Journal, vol. 15, no. 3, pp. 3808-

3819, Sept. 2021, doi: 10.1109/JSYST.2020.3015424.

[7] K. -A. Shim, "Cryptanalysis of Two Signature Schemes for IoT-Based Mobile Payments and

Healthcare Wireless Medical Sensor Networks," in IEEE Access, vol. 8, pp. 167203-167208,

2020, doi: 10.1109/ACCESS.2020.3023093.

[8] S. Li et al., "A Secure Scheme Based on One-Way Associated Key Management Model in

Wireless Sensor Networks," in IEEE Internet of Things Journal, vol.s 8, no. 4, pp. 2920-2930, 15

Feb.15, 2021, doi: 10.1109/JIOT.2020.3021740.

[9] P. Arpaia, F. Bonavolontà and A. Cioffi, "Security vulnerability in Internet of Things sensor

networks protected by Advanced Encryption Standard," 2020 IEEE International Workshop on

Metrology for Industry 4.0 & IoT, 2020, pp. 452-457, doi:

10.1109/MetroInd4.0IoT48571.2020.9138236.

[10] An Braeken, "Symmetric Key‐Based Authentication with an Application to Wireless Sensor

Networks," in IoT Security: Advances in Authentication , Wiley, 2020, pp.65-84, doi:

10.1002/9781119527978.ch3.

[11] X. Lin, M. Guizani, X. Du, C. -K. Chu and Y. Yu, "Advances of Security and Privacy Techniques

in Emerging Wireless Networks," in IEEE Wireless Communications, vol. 27, no. 3, pp. 8-9, June

2020, doi: 10.1109/MWC.2020.9116080.

[12] J. Shen, Z. Gui, X. Chen, J. Zhang and Y. Xiang, "Lightweight and Certificateless Multi-Receiver

Secure Data Transmission Protocol for Wireless Body Area Networks," in IEEE Transactions on

Dependable and Secure Computing, doi: 10.1109/TDSC.2020.3025288.

[13] X. Zhu, Y. Li and Y. Lei, "A Forwarding Secrecy Based Lightweight Authenticastion Scheme for

Intelligent Logistics," 2020 IEEE International Conference on Advances in Electrical Engineering

and Computer Applications( AEECA), 2020, pp. 356-360, doi:

10.1109/AEECA49918.2020.9213520.

[14] Jothi AA, Srinivasan B. “A Hy ri Ciphertext-Policy With Hierarchical Attribute-Based Ring

Signcryption To Enhance Security An Privacy In Bo y Area etworks”. 2016 International

Journal of Advanced Research in Computer Science. May 1;7(3).

[15] Zhong S, Zhong H, Huang X, Yang P, Shi J, Xie L, Wang K. “Connecting Things to Things in

Physical-World: Security and Privacy Issues in Mobile Sensor Networks. In Security and Privacy

for Next-Generation Wireless etworks” 2019 (pp. 135-160). Springer, Cham.

[16] B. T. Asare, K. Quist-Aphetsi and L. Nana, "A Hybrid Lightweight Cryptographic Scheme For

Securing Node Data Based On The Feistel sCipher And MD5 Hash Algorithm In A Local IoT

Network," 2019 International Conference on Mechatronics, Remote Ssensing, Information

Systems and Industrial Information Technologies (ICMRSISIIT), 2019, pp. 1-5, doi:

10.1109/ICMRSISIIT46373.2020.9405869.

[17] Pooja, Chauhan RK. “Triple phase hy ri cryptography technique in a wireless sensor network”.

International Journal of Computers and Applications. 2020 Jan 8:1-6.

[18] J. Ryu, H. Kim, Y. Lee and D. Won, "Cryptanalysis of Protocol for Heterogeneous Wireless

Sensor Networks for the Internet of Things Environment," 2020 14th International Conference on

Ubiquitous Information Management and Communication (IMCOM), 2020, pp. 1-4, doi:

10.1109/IMCOM48794.2020.9001674.

[19] V. Gatate and J. Agarkhed, "Spectrum Aware Cryptography (SAC) in Wirelesss Cognitive Radio

Sensor Networks for Delay Sensitive Applications," 2020 International Conference for Emerging

Technology (INCET), 2020, pp. 1-7, doi: 10.1109/INCET49848.2020.9154027.

[20] S. Shin and T. Kwon, "A Privacy-Preserving Authentication, Authorization, and Key Agreement

Scheme for Wireless Sensor Networks in 5G-Integrated Internet of Things," in IEEE Access, vol.

8, pp. 67555-67571, 2020, doi: 10.1109/ACCESS.2020.2985719.

[21] H. A. Babaeer and S. A. Al-Ahmadi, "Efficient and Secure Data Transmission and Sinkhole

Detection in a Multi-Clustering Wireless Sensor Network Based on Homomorphic Encryption

and Watermarking," in IEEE Access, vol. 8, pp. 92098-92109, 2020, doi:

10.1109/ACCESS.2020.2994587.

[22] S. Reshma, K. Shaila and K. R. Venugopal, "DEAVD - Data Encryption and Aggregation using

Voronoi Diagram for Wireless Sensor Networks," 2020 Fourth World Conference on Smart

Trends in Systems, Security and Sustainability (WorldS4), 2020, pp. 635-638, doi:

10.1109/WorldS450073.2020.9210316.

[23] C. Meshram, C. Lee, S. G. Meshram and A. Meshram, "OOS-SSS: An Efficient Online/Offline

Subtree-Based Short Signature Scheme Using Chebyshev Chaotic Maps for Wireless Sensor

Network," in IEEE Access, vol. 8, pp. 80063-80073, 2020, doi: 10.1109/ACCESS.2020.2991348.

[24] R. Kumar, S. Tripathi and R. Agrawal, "A Review On Security in Wireless Sensor Network,"

2020 International Conference on Emerging Smart Computing and Informatics (ESCI), 2020, pp.

304-308, doi: 10.1109/ESCI48226.2020.9167610.

[25] M. Griotti, F. Gandino and M. Rebaudengo, "Transitory Master Key Transport Layer Security for

WSNs," in IEEE Access, vol. 8, pp. 20304-20312, 2020, doi: 10.1109/ACCESS.2020.2969050.


Cite this Article as :
Style #
MLA Reem Atassi, Aditi Sharma. "An Efficient and Secured Triple-Layered Wireless Sensor Network with Machine Learning Techniques." International Journal of Wireless and Ad Hoc Communication, Vol. 6, No. 2, 2023 ,PP. 08-17 (Doi   :  https://doi.org/10.54216/IJWAC.060201)
APA Reem Atassi, Aditi Sharma. (2023). An Efficient and Secured Triple-Layered Wireless Sensor Network with Machine Learning Techniques. Journal of International Journal of Wireless and Ad Hoc Communication, 6 ( 2 ), 08-17 (Doi   :  https://doi.org/10.54216/IJWAC.060201)
Chicago Reem Atassi, Aditi Sharma. "An Efficient and Secured Triple-Layered Wireless Sensor Network with Machine Learning Techniques." Journal of International Journal of Wireless and Ad Hoc Communication, 6 no. 2 (2023): 08-17 (Doi   :  https://doi.org/10.54216/IJWAC.060201)
Harvard Reem Atassi, Aditi Sharma. (2023). An Efficient and Secured Triple-Layered Wireless Sensor Network with Machine Learning Techniques. Journal of International Journal of Wireless and Ad Hoc Communication, 6 ( 2 ), 08-17 (Doi   :  https://doi.org/10.54216/IJWAC.060201)
Vancouver Reem Atassi, Aditi Sharma. An Efficient and Secured Triple-Layered Wireless Sensor Network with Machine Learning Techniques. Journal of International Journal of Wireless and Ad Hoc Communication, (2023); 6 ( 2 ): 08-17 (Doi   :  https://doi.org/10.54216/IJWAC.060201)
IEEE Reem Atassi, Aditi Sharma, An Efficient and Secured Triple-Layered Wireless Sensor Network with Machine Learning Techniques, Journal of International Journal of Wireless and Ad Hoc Communication, Vol. 6 , No. 2 , (2023) : 08-17 (Doi   :  https://doi.org/10.54216/IJWAC.060201)