Journal of Cybersecurity and Information Management

Journal DOI

https://doi.org/10.54216/JCIM

Submit Your Paper

2690-6775ISSN (Online) 2769-7851ISSN (Print)

Volume 12 , Issue 1 , PP: 08-18, 2023 | Cite this article as | XML | Html | PDF | Full Length Article

A Concentrated Energy Consumption Wireless Sensor Network by Symmetric Encryption and Attribute Based Encryption Technique

Anita Soni 1 *

  • 1 CSE Department, IES University Bhopal, India - (anita.soni@iesuniversity.ac.in)
  • Doi: https://doi.org/10.54216/JCIM.120101

    Received: November 25, 2022 Revised: January 25, 2023 Accepted: March 18, 2023
    Abstract

    Wireless sensor networks (WSNs) are increasingly used in a wide variety of settings, including defence, industry, healthcare, and education. Hundreds or even thousands of sensor nodes are spread out across a given area and linked to a central Base Station (BS) in order to keep tabs on the environment. The BS then sends the data out to the users over the internet. The sensor network's adaptability, portability, dependability, and quickness are driving its widespread use across industries. The suggested SHS evaluates the efficiency of well-established symmetric algorithms to see where it stands in the spectrum of security. The Blowfish encryption algorithm was proven to require the least amount of processing power after extensive benchmarking. Therefore, the Blowfish algorithm is selected to protect sensitive medical information. The medical database receives the encrypted health records. Only those with proper permissions should be able to access them. Therefore, the CP-ABE is implemented to regulate access to patient records. The SHS's results on the dataset are compared to those of other existing systems. With SHS, health data may be transmitted to doctors rapidly and securely because it requires less computing time and energy. In addition to these benefits, SHS also offers privacy, authentication, and authorization.

    Keywords :

    Encryption , Symmetric Encryption , WSN , Energy Consumption

    References

    [1]. Alemdar, H &Ersoy, C 2010, „Wireless sensor networks for healthcare: A Survey‟, Computer Networks, vol. 54, no. 15, pp. 2688-2710.

    [2]. Alkhatib, AAA &Baicher, GS 2012, „Wireless Sensor Network Architecture‟, Proceedings of International Conference on Computer Networks and Communication Systems, pp. 11-15.

    [3]. Alonso, JV, Matencio, PL, Castano, FJG, Hellin, HN, Guirao, PJB, Martinez, FJP, Alvarez, RPM, Jimenez, DG, Castineira, FG & Fernandez, RD 2010, „Ambient Intelligence Systems for Personalized Sport Training‟, Sensors, vol. 10, no. 3, pp. 2359-2385.

    [4]. Alrajeh, NA, Khan, S & Shams, B 2013, „Intrusion Detection System in Wireless Sensor Networks‟, International Journal of Distributed Sensor Networks, pp. 1-7.

    [5]. Doshi, N &Jinwala, D 2012, Constant Ciphertext Length in CP-ABE, IACR Cryptology ePrint Archive.

    [6]. Duche, RN &Sarwade, NP 2014, „Sensor Node Failure Detection Based on Round Trip Delay and Paths in WSNs‟, IEEE Sensors Journal, vol. 14, no. 2, pp. 455-464.

    [7]. Parmod Kumar, AnupamBaliyan, K. Ramalingeswara Prasad, N. Sreekanth, Parag Jawarkar, Vandana Roy, Enoch TettehAmoatey, "Machine Learning Enabled Techniques for Protecting Wireless Sensor Networks by Estimating Attack Prevalence and Device Deployment Strategy for 5G Networks", Wireless Communications and Mobile Computing, vol. 2022, Article ID 5713092, 15 pages, 2022. https://doi.org/10.1155/2022/5713092.

    [8]. McKay, KA, Bassham, LE, Turan, MS &Mouha, NW 2017, „Report on Lightweight Cryptography‟, National Institute of Standards and Technology, pp. 1-27.

    [9]. Qiao, Z, Liang, S, Davis, S & Jiang, H 2014, „Survey of Attribute Based Encryption‟, IEEE International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/ Distributed Computing, pp. 1-6.

    [10]. Raja Rajeswari, S &Seenivasagam, V 2016, „Comparative Study on Various Authentication Protocols in Wireless Sensor Networks‟, The Scientific World Journal, vol. 2016.

    [11]. Rekha, R, GayathriMathambigai, T &Vidhyapriya, R 2012, „Secure Medical Data Transmission in Body Area Sensor Networks Using Dynamic Biometrics and Steganography‟, Bonfring International Journal of Software Engineering and Soft Computing vol. 2, no. 1, pp. 5-11.

    [12]. Roshan, S, Miche, Y, Akusok, A &Lendasse, A 2018, „Adaptive and online network intrusion detection system using clustering and Extreme Learning Machines‟, Journal of the Franklin Institute, vol. 355, no. 4, pp. 1752-1779.

    [13]. C. Wei, “Application of data encryption technology in computer network security,” Journal of Physics: Conference Series, vol. 1237, no. 23, Article ID 022049, 2019.

    [14] A. Sultan, X. Yang, and A. A. E. Hajomer, “Chaotic constellation mapping for physical-layer data encryption in OFDM-PON,” IEEE Photonics Technology Letters, vol. 99, no. 4, p. 1, 2018.

    [15] Y. Zhang, W. Yang, and Z. Zhang, “Application strategy of data encryption technology in computer network security,” Electronics Research and Applications, vol. 2, no. 5, pp. 4–10, 2018.

    [16] Y. Shi, “Research on implementation method of key management based on data encryption technology,” IOP Conference Series: Materials Science and Engineering, vol. 677, no. 4, Article ID 042018, 2019.

    [17]. Idrees, B.; Zafar, S.; Rashid, T.; Gao, W. Image encryption algorithm using S-box and dynamic Hénon bit level permutation. Multimed. Tools Appl. 2020, 79, 6135–6162.

    [18]. Liu, H.; Zhao, B.; Huang, L. Quantum image encryption scheme using Arnold transform and S-box scrambling. Entropy 2019, 21, 343.

    [19]. Rehman, A.U.; Firdous, A.; Iqbal, S.; Abbas, Z.; Shahid, M.M.A.; Wang, H.; Ullah, F. A Color Image Encryption Algorithm Based on One Time Key, Chaos Theory, and Concept of Rotor Machine. IEEE Access 2020, 8, 172275–172295.

    [20]. S. Bera, S. Misra, S. Kumar Roy, and M. S. Obaidat, “Soft-WSN: software-defined WSN management system for IoT applications,” IEEE Systems Journal, vol. 12, no. 3, pp. 2074–2081, 2016.

    [21]. A. N. Alvi, S. H. Bouk, S. H. Ahmed, M. A. Yaqub, M. Sarka, and H. Song, “BEST-MAC: bitmap-assisted efficient and scalable TDMA based WSN MAC protocol for smart cities,” IEEE Access, vol. 4, no. 1, pp. 312–322, 2016.

    [22]. X. Yuan, M. Elhoseny, H. K. E-Minir, and A. M. Riad, “A genetic algorithm-based, dynamic clustering method towards improved WSN longevity,” Journal of Network and Systems Management, vol. 25, no. 1, pp. 1–26, 2016.

    [23]. C. Zhang, T. Xie, K. Yang et al., “Positioning optimisation based on particle quality prediction in wireless sensor networks,” IET Networks, vol. 8, no. 2, pp. 107–113, 2019.

    [24]. V. Bapat, P. Kale, V. Shinde, N. Deshpande, and A. Shaligram, “WSN application for crop protection to divert animal intrusions in the agricultural land,” Computers and Electronics in Agriculture, vol. 133, pp. 88–96, 2017.

    [25]. H. Grichi, O. Mosbahi, M. Khalgui, and Z. Li, “RWiN: new methodology for the development of reconfigurable WSN,” IEEE Transactions on Automation Science and Engineering, vol. 14, no. 1, pp. 109–125, 2017.

    [26]. Y. He, Z. Zhang, F. R. Yu et al., “Deep reinforcement learning-based optimization for cache-enabled opportunistic interference alignment wireless networks,” IEEE Transactions on Vehicular Technology, vol. 66, no. 11, pp. 10433–10445, 2017.

    [27]. Y. He, N. Zhao, and H. Yin, “Integrated networking, caching, and computing for connected vehicles: a deep reinforcement learning approach,” IEEE Transactions on Vehicular Technology, vol. 67, no. 1, pp. 44–55, 2018.

    [28]. H. Mostafaei, M. U. Chowdhury, and M. S. Obaidat, “Border surveillance with WSN systems in a distributed manner,” IEEE Systems Journal, vol. 8, no. 4, pp. 1–10, 2018.

    [29]. N. E. Rachkidy, A. Guitton, and M. Misson, “Avoiding routing loops in a multi-stack WSN,” Journal of Communications, vol. 8, no. 3, pp. 151–160, 2018.

     

    Cite This Article As :
    Soni, Anita. A Concentrated Energy Consumption Wireless Sensor Network by Symmetric Encryption and Attribute Based Encryption Technique. Journal of Cybersecurity and Information Management, vol. , no. , 2023, pp. 08-18. DOI: https://doi.org/10.54216/JCIM.120101
    Soni, A. (2023). A Concentrated Energy Consumption Wireless Sensor Network by Symmetric Encryption and Attribute Based Encryption Technique. Journal of Cybersecurity and Information Management, (), 08-18. DOI: https://doi.org/10.54216/JCIM.120101
    Soni, Anita. A Concentrated Energy Consumption Wireless Sensor Network by Symmetric Encryption and Attribute Based Encryption Technique. Journal of Cybersecurity and Information Management , no. (2023): 08-18. DOI: https://doi.org/10.54216/JCIM.120101
    Soni, A. (2023) . A Concentrated Energy Consumption Wireless Sensor Network by Symmetric Encryption and Attribute Based Encryption Technique. Journal of Cybersecurity and Information Management , () , 08-18 . DOI: https://doi.org/10.54216/JCIM.120101
    Soni A. [2023]. A Concentrated Energy Consumption Wireless Sensor Network by Symmetric Encryption and Attribute Based Encryption Technique. Journal of Cybersecurity and Information Management. (): 08-18. DOI: https://doi.org/10.54216/JCIM.120101
    Soni, A. "A Concentrated Energy Consumption Wireless Sensor Network by Symmetric Encryption and Attribute Based Encryption Technique," Journal of Cybersecurity and Information Management, vol. , no. , pp. 08-18, 2023. DOI: https://doi.org/10.54216/JCIM.120101