International Journal of Wireless and Ad Hoc Communication

Journal DOI

https://doi.org/10.54216/IJWAC

Submit Your Paper

2692-4056ISSN (Online)

Volume 6 , Issue 2 , PP: 08-17, 2023 | Cite this article as | XML | Html | PDF | Full Length Article

An Efficient and Secured Triple-Layered Wireless Sensor Network with Machine Learning Techniques

Reem Atassi 1 * , Aditi Sharma 2

  • 1 Faculty of Computer Information System, Higher Colleges of Technology, UAE - (ratassi@hct.ac.ae)
  • 2 IEEE Senior Member, Post-Doc Fellow, Intelligent Cryptographic systems/IOT-Cloud in Robotics, Nazarbayev University, Kazakhstan ;Department of Computer Science, School of Engineering and Digital Sciences - (aditi11121986@gmail.com)
  • Doi: https://doi.org/10.54216/IJWAC.060201

    Received: September 03, 2022 Accepted: November 18, 2022
    Abstract

    Replacement of physical labor and repetitive tasks by the agents is an attractive issue in the Smart Environment (SE). SE is distinguished by its ability to be controlled from a distance, to facilitate the connection between devices through middleware, to gather and share data from sensors, to improve the intelligence of devices, and to make decisions. To be effective, SE design must make use of information and networks that already exist in the actual world. Effective SE design is complicated by several difficulties, including monitoring, data collecting, assessment, evaluation, prediction of important data, and meaningful presentation. For SE, the most important step is gathering information from a variety of sensors in various locations. Wireless sensor networks provide an underlying architecture for the coordinated collection of data from many sensors that have common characteristics (WSN). An essential aspect of sensor networks is their inability to function in the currently complicated environment for wireless network security. In the realm of remote sensor businesses, cryptology is an essential part of safety measures. Several of the prevalent cryptographic methods have significant flaws that prevent them from being fully reliable. In this paper, we provide a unified, three-stage cryptographic procedure that combines public-key and secret-key techniques for maximum security. Due to consideration of Public-key management and high degree of security, Rijndael Encryption Approach (REA), Horst Feistel's Encryption Approach (HFEA), and the more sophisticated Rivest-Shamir-Adleman (e-RSA). Time spent in both execution and decoding of the suggested approach was utilized to rank the quality of displays. The suggested set of rules uses a single evaluation boundary or computation time, which is different from the methodologies used before. Low Encryption Time (LET) and Low Unscrambling Time (LDT) values of 1.12 and 1.26 were observed on texts ranging in size from 6 to 184 MB, respectively. Comparisons show that the suggested hybrid form is 2.9% more efficient than AES+RSA, 1.36 times more efficient than ECC+RSA+MD-5, 1.36 times more efficient than AES+ECC, and 1.36 times more efficient than AES+ECC+RSA+MD-5.

    Keywords :

    Wireless Sensor Networks (WSN) , Rijndael encryption approach , Horst Feistel&rsquo , s encryption approach , Enhanced RSA

    References

    [1]    H. Hu and W. Chang, "On the Mitigation of Controllable Event Triggering Attack in WSNs," 2020 29th International Conference on Computer Communications and Networks (ICCCN), 2020, pp. 1-6, doi: 10.1109/ICCCN49398.2020.9209613. 

    [2]         R. Chanana, A. K. Singh, R. Killa, S. Agarwal and P. S. Mehra, "Blockchain Based Secure Model for Sensor Data in Wireless Sensor Network," 2020 6th International Conference on Signal Processing and Communication (ICSC), 2020, pp. 288-293, doi: 10.1109/ICSC48311.2020.9182776.

    [3]     G. Xu, F. Wang, M. Zhang and J. Peng, "Efficient and Provably Secure Anonymous User Authentication Scheme for Patient Monitoring Using Wireless Medical Sensor Networks," in IEEE Access, vol. 8, pp. 47282-47294, 2020, doi: 10.1109/ACCESS.2020.2978891.

    [4]    Y. Zhan, B. Wang and R. Lu, "Cryptanalysis and Improvement of a Pairing-Free Certificateless Aggregate Signature in Healthcare Wireless Medical Sensor Networks," in IEEE Internet of Things Journal, vol. 8, no. 7, pp. 5973-5984, 1 April1, 2021, doi: 10.1109/JIOT.2020.3033337.

    [5]        S. Hassayoun, S. Lahouar and K. Besbes, "SDR Bridge for a Secure Wireless Sensor Network (WSN)," 2020 IEEE International Conference on Design & Test of Integrated Micro & Nano-Systems (DTS), 2020, pp. 1-5, doi: 10.1109/DTS48731.2020.9196201.

    [6]    J. Kar, K. Naik and T. Abdelkader, "A Secure and Lightweight Protocol for Message Authentication in Wireless Sensor Networks," in IEEE Systems Journal, vol. 15, no. 3, pp. 3808-3819, Sept. 2021, doi: 10.1109/JSYST.2020.3015424.

    [7]     K. -A. Shim, "Cryptanalysis of Two Signature Schemes for IoT-Based Mobile Payments and Healthcare Wireless Medical Sensor Networks," in IEEE Access, vol. 8, pp. 167203-167208, 2020, doi: 10.1109/ACCESS.2020.3023093.

    [8]        S. Li et al., "A Secure Scheme Based on One-Way Associated Key Management Model in Wireless Sensor Networks," in IEEE Internet of Things Journal, vol.s 8, no. 4, pp. 2920-2930, 15 Feb.15, 2021, doi: 10.1109/JIOT.2020.3021740.

    [9]       P. Arpaia, F. Bonavolontà and A. Cioffi, "Security vulnerability in Internet of Things sensor networks protected by Advanced Encryption Standard," 2020 IEEE International Workshop on Metrology for Industry 4.0 & IoT, 2020, pp. 452-457, doi: 10.1109/MetroInd4.0IoT48571.2020.9138236.

    [10]  An Braeken, "Symmetric Key‐Based Authentication with an Application to Wireless Sensor Networks," in IoT Security: Advances in Authentication , Wiley, 2020, pp.65-84, doi: 10.1002/9781119527978.ch3.

    [11]  X. Lin, M. Guizani, X. Du, C. -K. Chu and Y. Yu, "Advances of Security and Privacy Techniques in Emerging Wireless Networks," in IEEE Wireless Communications, vol. 27, no. 3, pp. 8-9, June 2020, doi: 10.1109/MWC.2020.9116080. 

    [12] J. Shen, Z. Gui, X. Chen, J. Zhang and Y. Xiang, "Lightweight and Certificateless Multi-Receiver Secure Data Transmission Protocol for Wireless Body Area Networks," in IEEE Transactions on Dependable and Secure Computing, doi: 10.1109/TDSC.2020.3025288.

    [13]  X. Zhu, Y. Li and Y. Lei, "A Forwarding Secrecy Based Lightweight Authenticastion Scheme for Intelligent Logistics," 2020 IEEE International Conference on Advances in Electrical Engineering and Computer Applications( AEECA), 2020, pp. 356-360, doi: 10.1109/AEECA49918.2020.9213520.

    [14]   Jothi AA, Srinivasan B. “A Hybrid Ciphertext-Policy With Hierarchical Attribute-Based Ring Signcryption To Enhance Security And Privacy In Body Area Networks”. 2016 International Journal of Advanced Research in Computer Science. May 1;7(3).

    [15]   Zhong S, Zhong H, Huang X, Yang P, Shi J, Xie L, Wang K. “Connecting Things to Things in Physical-World: Security and Privacy Issues in Mobile Sensor Networks. In Security and Privacy for Next-Generation Wireless Networks” 2019 (pp. 135-160). Springer, Cham.

    [16]   B. T. Asare, K. Quist-Aphetsi and L. Nana, "A Hybrid Lightweight Cryptographic Scheme For Securing Node Data Based On The Feistel sCipher And MD5 Hash Algorithm In A Local IoT Network," 2019 International Conference on Mechatronics, Remote Ssensing, Information Systems and Industrial Information Technologies (ICMRSISIIT), 2019, pp. 1-5, doi: 10.1109/ICMRSISIIT46373.2020.9405869.

    [17]   Pooja, Chauhan RK. “Triple phase hybrid cryptography technique in a wireless sensor network”. International Journal of Computers and Applications. 2020 Jan 8:1-6.

    [18]   J. Ryu, H. Kim, Y. Lee and D. Won, "Cryptanalysis of Protocol for Heterogeneous Wireless Sensor Networks for the Internet of Things Environment," 2020 14th International Conference on Ubiquitous Information Management and Communication (IMCOM), 2020, pp. 1-4, doi: 10.1109/IMCOM48794.2020.9001674.

    [19]    V. Gatate and J. Agarkhed, "Spectrum Aware Cryptography (SAC)n Wirelesss Cognitive Radio Sensor Networks for Delay Sensitive Applications," 2020 International Conference for Emerging Technology (INCET), 2020, pp. 1-7, doi: 10.1109/INCET49848.2020.9154027.

    [20]  S. Shin and T. Kwon, "A Privacy-Preserving Authentication, Authorization, and Key Agreement Scheme for Wireless Sensor Networks in 5G-Integrated Internet of Things," in IEEE Access, vol. 8, pp. 67555-67571, 2020, doi: 10.1109/ACCESS.2020.2985719.

    [21]  H. A. Babaeer and S. A. Al-Ahmadi, "Efficient and Secure Data Transmission and Sinkhole Detection in a Multi-Clustering Wireless Sensor Network Based on Homomorphic Encryption and Watermarking," in IEEE Access, vol. 8, pp. 92098-92109, 2020, doi: 10.1109/ACCESS.2020.2994587. 

    [22]  S. Reshma, K. Shaila and K. R. Venugopal, "DEAVD - Data Encryption and Aggregation using Voronoi Diagram for Wireless Sensor Networks," 2020 Fourth World Conference on Smart Trends in Systems, Security and Sustainability (WorldS4), 2020, pp. 635-638, doi: 10.1109/WorldS450073.2020.9210316.

    [23]    C. Meshram, C. Lee, S. G. Meshram and A. Meshram, "OOS-SSS: An Efficient Online/Offline Subtree-Based Short Signature Scheme Using Chebyshev Chaotic Maps for Wireless Sensor Network," in IEEE Access, vol. 8, pp. 80063-80073, 2020, doi: 10.1109/ACCESS.2020.2991348.

    [24]  R. Kumar, S. Tripathi and R. Agrawal, "A Review On Security in Wireless Sensor Network," 2020 International Conference on Emerging Smart Computing and Informatics (ESCI), 2020, pp. 304-308, doi: 10.1109/ESCI48226.2020.9167610.

    [25] M. Griotti, F. Gandino and M. Rebaudengo, "Transitory Master Key Transport Layer Security for WSNs," in IEEE Access, vol. 8, pp. 20304-20312, 2020, doi: 10.1109/ACCESS.2020.2969050.

    Cite This Article As :
    Atassi, Reem. , Sharma, Aditi. An Efficient and Secured Triple-Layered Wireless Sensor Network with Machine Learning Techniques. International Journal of Wireless and Ad Hoc Communication, vol. , no. , 2023, pp. 08-17. DOI: https://doi.org/10.54216/IJWAC.060201
    Atassi, R. Sharma, A. (2023). An Efficient and Secured Triple-Layered Wireless Sensor Network with Machine Learning Techniques. International Journal of Wireless and Ad Hoc Communication, (), 08-17. DOI: https://doi.org/10.54216/IJWAC.060201
    Atassi, Reem. Sharma, Aditi. An Efficient and Secured Triple-Layered Wireless Sensor Network with Machine Learning Techniques. International Journal of Wireless and Ad Hoc Communication , no. (2023): 08-17. DOI: https://doi.org/10.54216/IJWAC.060201
    Atassi, R. , Sharma, A. (2023) . An Efficient and Secured Triple-Layered Wireless Sensor Network with Machine Learning Techniques. International Journal of Wireless and Ad Hoc Communication , () , 08-17 . DOI: https://doi.org/10.54216/IJWAC.060201
    Atassi R. , Sharma A. [2023]. An Efficient and Secured Triple-Layered Wireless Sensor Network with Machine Learning Techniques. International Journal of Wireless and Ad Hoc Communication. (): 08-17. DOI: https://doi.org/10.54216/IJWAC.060201
    Atassi, R. Sharma, A. "An Efficient and Secured Triple-Layered Wireless Sensor Network with Machine Learning Techniques," International Journal of Wireless and Ad Hoc Communication, vol. , no. , pp. 08-17, 2023. DOI: https://doi.org/10.54216/IJWAC.060201