1
Faculty of Computer Information System, Higher Colleges of Technology, UAE
(ratassi@hct.ac.ae)
2
IEEE Senior Member, Post-Doc Fellow, Intelligent Cryptographic systems/IOT-Cloud in Robotics, Nazarbayev University, Kazakhstan ;Department of Computer Science, School of Engineering and Digital Sciences
(aditi11121986@gmail.com)
Abstract :
Replacement of physical labor and repetitive tasks by the agents is an attractive issue in the Smart Environment (SE). SE is distinguished by its ability to be controlled from a distance, to facilitate the connection between devices through middleware, to gather and share data from sensors, to improve the intelligence of devices, and to make decisions. To be effective, SE design must make use of information and networks that already exist in the actual world. Effective SE design is complicated by several difficulties, including monitoring, data collecting, assessment, evaluation, prediction of important data, and meaningful presentation. For SE, the most important step is gathering information from a variety of sensors in various locations. Wireless sensor networks provide an underlying architecture for the coordinated collection of data from many sensors that have common characteristics (WSN). An essential aspect of sensor networks is their inability to function in the currently complicated environment for wireless network security. In the realm of remote sensor businesses, cryptology is an essential part of safety measures. Several of the prevalent cryptographic methods have significant flaws that prevent them from being fully reliable. In this paper, we provide a unified, three-stage cryptographic procedure that combines public-key and secret-key techniques for maximum security. Due to consideration of Public-key management and high degree of security, Rijndael Encryption Approach (REA), Horst Feistel's Encryption Approach (HFEA), and the more sophisticated Rivest-Shamir-Adleman (e-RSA). Time spent in both execution and decoding of the suggested approach was utilized to rank the quality of displays. The suggested set of rules uses a single evaluation boundary or computation time, which is different from the methodologies used before. Low Encryption Time (LET) and Low Unscrambling Time (LDT) values of 1.12 and 1.26 were observed on texts ranging in size from 6 to 184 MB, respectively. Comparisons show that the suggested hybrid form is 2.9% more efficient than AES+RSA, 1.36 times more efficient than ECC+RSA+MD-5, 1.36 times more efficient than AES+ECC, and 1.36 times more efficient than AES+ECC+RSA+MD-5.
Keywords :
Wireless Sensor Networks (WSN); Rijndael encryption approach; Horst Feistel’s encryption approach; Enhanced RSA
References :
[1] H. Hu and W. Chang, "On the Mitigation of Controllable Event Triggering Attack in WSNs,"
2020 29th International Conference on Computer Communications and Networks (ICCCN),
2020, pp. 1-6, doi: 10.1109/ICCCN49398.2020.9209613.
[2] R. Chanana, A. K. Singh, R. Killa, S. Agarwal and P. S. Mehra, "Blockchain Based Secure Model
for Sensor Data in Wireless Sensor Network," 2020 6th International Conference on Signal
Processing and Communication (ICSC), 2020, pp. 288-293, doi:
10.1109/ICSC48311.2020.9182776.
[3] G. Xu, F. Wang, M. Zhang and J. Peng, "Efficient and Provably Secure Anonymous User
Authentication Scheme for Patient Monitoring Using Wireless Medical Sensor Networks," in
IEEE Access, vol. 8, pp. 47282-47294, 2020, doi: 10.1109/ACCESS.2020.2978891.
[4] Y. Zhan, B. Wang and R. Lu, "Cryptanalysis and Improvement of a Pairing-Free Certificateless
Aggregate Signature in Healthcare Wireless Medical Sensor Networks," in IEEE Internet of
Things Journal, vol. 8, no. 7, pp. 5973-5984, 1 April1, 2021, doi: 10.1109/JIOT.2020.3033337.
[5] S. Hassayoun, S. Lahouar and K. Besbes, "SDR Bridge for a Secure Wireless Sensor Network
(WSN)," 2020 IEEE International Conference on Design & Test of Integrated Micro & Nano-
Systems (DTS), 2020, pp. 1-5, doi: 10.1109/DTS48731.2020.9196201.
[6] J. Kar, K. Naik and T. Abdelkader, "A Secure and Lightweight Protocol for Message
Authentication in Wireless Sensor Networks," in IEEE Systems Journal, vol. 15, no. 3, pp. 3808-
3819, Sept. 2021, doi: 10.1109/JSYST.2020.3015424.
[7] K. -A. Shim, "Cryptanalysis of Two Signature Schemes for IoT-Based Mobile Payments and
Healthcare Wireless Medical Sensor Networks," in IEEE Access, vol. 8, pp. 167203-167208,
2020, doi: 10.1109/ACCESS.2020.3023093.
[8] S. Li et al., "A Secure Scheme Based on One-Way Associated Key Management Model in
Wireless Sensor Networks," in IEEE Internet of Things Journal, vol.s 8, no. 4, pp. 2920-2930, 15
Feb.15, 2021, doi: 10.1109/JIOT.2020.3021740.
[9] P. Arpaia, F. Bonavolontà and A. Cioffi, "Security vulnerability in Internet of Things sensor
networks protected by Advanced Encryption Standard," 2020 IEEE International Workshop on
Metrology for Industry 4.0 & IoT, 2020, pp. 452-457, doi:
10.1109/MetroInd4.0IoT48571.2020.9138236.
[10] An Braeken, "Symmetric Key‐Based Authentication with an Application to Wireless Sensor
Networks," in IoT Security: Advances in Authentication , Wiley, 2020, pp.65-84, doi:
10.1002/9781119527978.ch3.
[11] X. Lin, M. Guizani, X. Du, C. -K. Chu and Y. Yu, "Advances of Security and Privacy Techniques
in Emerging Wireless Networks," in IEEE Wireless Communications, vol. 27, no. 3, pp. 8-9, June
2020, doi: 10.1109/MWC.2020.9116080.
[12] J. Shen, Z. Gui, X. Chen, J. Zhang and Y. Xiang, "Lightweight and Certificateless Multi-Receiver
Secure Data Transmission Protocol for Wireless Body Area Networks," in IEEE Transactions on
Dependable and Secure Computing, doi: 10.1109/TDSC.2020.3025288.
[13] X. Zhu, Y. Li and Y. Lei, "A Forwarding Secrecy Based Lightweight Authenticastion Scheme for
Intelligent Logistics," 2020 IEEE International Conference on Advances in Electrical Engineering
and Computer Applications( AEECA), 2020, pp. 356-360, doi:
10.1109/AEECA49918.2020.9213520.
[14] Jothi AA, Srinivasan B. “A Hy ri Ciphertext-Policy With Hierarchical Attribute-Based Ring
Signcryption To Enhance Security An Privacy In Bo y Area etworks”. 2016 International
Journal of Advanced Research in Computer Science. May 1;7(3).
[15] Zhong S, Zhong H, Huang X, Yang P, Shi J, Xie L, Wang K. “Connecting Things to Things in
Physical-World: Security and Privacy Issues in Mobile Sensor Networks. In Security and Privacy
for Next-Generation Wireless etworks” 2019 (pp. 135-160). Springer, Cham.
[16] B. T. Asare, K. Quist-Aphetsi and L. Nana, "A Hybrid Lightweight Cryptographic Scheme For
Securing Node Data Based On The Feistel sCipher And MD5 Hash Algorithm In A Local IoT
Network," 2019 International Conference on Mechatronics, Remote Ssensing, Information
Systems and Industrial Information Technologies (ICMRSISIIT), 2019, pp. 1-5, doi:
10.1109/ICMRSISIIT46373.2020.9405869.
[17] Pooja, Chauhan RK. “Triple phase hy ri cryptography technique in a wireless sensor network”.
International Journal of Computers and Applications. 2020 Jan 8:1-6.
[18] J. Ryu, H. Kim, Y. Lee and D. Won, "Cryptanalysis of Protocol for Heterogeneous Wireless
Sensor Networks for the Internet of Things Environment," 2020 14th International Conference on
Ubiquitous Information Management and Communication (IMCOM), 2020, pp. 1-4, doi:
10.1109/IMCOM48794.2020.9001674.
[19] V. Gatate and J. Agarkhed, "Spectrum Aware Cryptography (SAC) in Wirelesss Cognitive Radio
Sensor Networks for Delay Sensitive Applications," 2020 International Conference for Emerging
Technology (INCET), 2020, pp. 1-7, doi: 10.1109/INCET49848.2020.9154027.
[20] S. Shin and T. Kwon, "A Privacy-Preserving Authentication, Authorization, and Key Agreement
Scheme for Wireless Sensor Networks in 5G-Integrated Internet of Things," in IEEE Access, vol.
8, pp. 67555-67571, 2020, doi: 10.1109/ACCESS.2020.2985719.
[21] H. A. Babaeer and S. A. Al-Ahmadi, "Efficient and Secure Data Transmission and Sinkhole
Detection in a Multi-Clustering Wireless Sensor Network Based on Homomorphic Encryption
and Watermarking," in IEEE Access, vol. 8, pp. 92098-92109, 2020, doi:
10.1109/ACCESS.2020.2994587.
[22] S. Reshma, K. Shaila and K. R. Venugopal, "DEAVD - Data Encryption and Aggregation using
Voronoi Diagram for Wireless Sensor Networks," 2020 Fourth World Conference on Smart
Trends in Systems, Security and Sustainability (WorldS4), 2020, pp. 635-638, doi:
10.1109/WorldS450073.2020.9210316.
[23] C. Meshram, C. Lee, S. G. Meshram and A. Meshram, "OOS-SSS: An Efficient Online/Offline
Subtree-Based Short Signature Scheme Using Chebyshev Chaotic Maps for Wireless Sensor
Network," in IEEE Access, vol. 8, pp. 80063-80073, 2020, doi: 10.1109/ACCESS.2020.2991348.
[24] R. Kumar, S. Tripathi and R. Agrawal, "A Review On Security in Wireless Sensor Network,"
2020 International Conference on Emerging Smart Computing and Informatics (ESCI), 2020, pp.
304-308, doi: 10.1109/ESCI48226.2020.9167610.
[25] M. Griotti, F. Gandino and M. Rebaudengo, "Transitory Master Key Transport Layer Security for
WSNs," in IEEE Access, vol. 8, pp. 20304-20312, 2020, doi: 10.1109/ACCESS.2020.2969050.
Style | # |
---|---|
MLA | Reem Atassi, Aditi Sharma. "An Efficient and Secured Triple-Layered Wireless Sensor Network with Machine Learning Techniques." International Journal of Wireless and Ad Hoc Communication, Vol. 6, No. 2, 2023 ,PP. 08-17 (Doi : https://doi.org/10.54216/IJWAC.060201) |
APA | Reem Atassi, Aditi Sharma. (2023). An Efficient and Secured Triple-Layered Wireless Sensor Network with Machine Learning Techniques. Journal of International Journal of Wireless and Ad Hoc Communication, 6 ( 2 ), 08-17 (Doi : https://doi.org/10.54216/IJWAC.060201) |
Chicago | Reem Atassi, Aditi Sharma. "An Efficient and Secured Triple-Layered Wireless Sensor Network with Machine Learning Techniques." Journal of International Journal of Wireless and Ad Hoc Communication, 6 no. 2 (2023): 08-17 (Doi : https://doi.org/10.54216/IJWAC.060201) |
Harvard | Reem Atassi, Aditi Sharma. (2023). An Efficient and Secured Triple-Layered Wireless Sensor Network with Machine Learning Techniques. Journal of International Journal of Wireless and Ad Hoc Communication, 6 ( 2 ), 08-17 (Doi : https://doi.org/10.54216/IJWAC.060201) |
Vancouver | Reem Atassi, Aditi Sharma. An Efficient and Secured Triple-Layered Wireless Sensor Network with Machine Learning Techniques. Journal of International Journal of Wireless and Ad Hoc Communication, (2023); 6 ( 2 ): 08-17 (Doi : https://doi.org/10.54216/IJWAC.060201) |
IEEE | Reem Atassi, Aditi Sharma, An Efficient and Secured Triple-Layered Wireless Sensor Network with Machine Learning Techniques, Journal of International Journal of Wireless and Ad Hoc Communication, Vol. 6 , No. 2 , (2023) : 08-17 (Doi : https://doi.org/10.54216/IJWAC.060201) |