0% found this document useful (0 votes)
17 views12 pages

8568-Article Text-9599-1-10-20231108

Uploaded by

sreenivasu6581
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views12 pages

8568-Article Text-9599-1-10-20231108

Uploaded by

sreenivasu6581
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

International Journal on Recent and Innovation Trends in Computing and Communication

ISSN: 2321-8169 Volume: 11 Issue: 10


Article Received: 10 August 2023 Revised: 28 September 2023 Accepted: 20 October 2023
___________________________________________________________________________________________________________________

DAR Model: A Novel Symmetric Key Enabled


Security architecture for reliable data transfer in
Wireless Sensor Networks
Seelamanthula Sreenivasu1, Prof.James Stephen Meka2
1. Research Scholar, Department of Computer Sciences & Systems Engineering,
A.U.College of Engineering, Andhra University, Visakhapatnam,
Andhra Pradesh, India.
2. Dr. B. R. Ambedkar Chair Professor, Dean, A.U. TDR-HUB,
Andhra University, Visakhapatnam, Andhra Pradesh, India.

Abstract—Security is an indispensable aspect in every transaction happening in the network transmissions. Wireless Sensor
Networks are pretty vulnerable to the security attacks. Hence a highly efficient architectural model is very much essential in
designing the sensor networks. Cryptographic algorithms play a vital role in providing encryption and decryption to the data
being transmitted consequently with which security is offered in an elegant manner. In this paper, a reliable design comprising
three pioneering algorithms enabled with symmetric key is architected for secure communication in wireless sensor networks
from a node to the base station. The design involves two phases. In the former phase two algorithms which are effective in all
perspectives are used for data transmission from node to cluster head and in the latter phase another proficient algorithm is used
for communication between cluster head to base station. The three algorithms used are Data Encryption Standard (DES),
Advanced Encryption Standard (AES) and RC4. Both block and stream cipher algorithms are used to fine tune the performance;
and in addition, the data has been compressed with unprecedented techniques to reduce the burden on encryption. This led to an
amazing performance in terms of security parameters.

Keywords-Security in wireless sensor networks, Hybrid techniques in WSN security, Secure and fast transmission in wireless
sensor networks, DAR security model.

1. Introduction Security and Energy efficiency are the paramount of


The prominence and usage of wireless sensor networks in performance.
distinguished domains is accelerating day by day. An equally
significant factor that is multiplying in line, is the security WSN Security is encompassed of four core dimensions namely
aspect. Although the complication is being addressed, still there confidentiality, data availability, integrity, and authenticity. In
are problems arising. other words, those are the security goals as defined [1]. Data
confidentiality is the property that the data must be kept secret
A Wireless Sensor Network comprises several nodes that are and only the authorized recipients should be able to extract the
spread over a region topographically and they sense the information. To do so there must be a set of rules in the form of
environment specific to a task. They transmit the information an algorithm that could hide the data from illegitimate users
to the base station which further processes for the defined accessing it. Message integrity is the property of data not
purpose. Every node is located at some position and has its own getting tampered or there is no loss in the data. Changing the
energy source that keeps it active. The predominant issue with original data intentionally by any unauthorized entity is referred
a sensor node is that it should retain its energy levels to increase to as data tampering and is an impermissible act. Authentication
its life time. Also, WSNs must deal with different types of data is the process of verifying the credentials and confirming the
and they must be fault tolerant. Not only the mentioned ones validity of user so that the user could be designated as an
but most importantly quality of service and security are of authorized one. Determining whether the data is being sent by
prime features. Whichever application a WSN is intended for, a legitimate sender whose credentials match with the

717
IJRITCC | October 2023, Available @ http://www.ijritcc.org
International Journal on Recent and Innovation Trends in Computing and Communication
ISSN: 2321-8169 Volume: 11 Issue: 10
Article Received: 10 August 2023 Revised: 28 September 2023 Accepted: 20 October 2023
___________________________________________________________________________________________________________________

designated identity and path is said to be the Sender distances, they can communicate to their respective cluster
authentication. Failing to authorize an entity may lead to heads and in turn the cluster heads communicate to the base
impersonation which otherwise means that the data may be station. However, this approach can take a lofty advantage only
originated from a duplicate node masquerading the original if clustering is well performed. There are numerous clustering
node due to which wrong data may be sent to mislead the entire techniques proposed by researchers which exhibited
application. All the above characteristics are to be retained with fascinating performance. We also designed an elegant
appropriate protocols so that right data reaches the right user in clustering technique [8] using GMM which is deployed in
right time. building the network topology. Due to effective clustering the
energy efficiency is preserved impeccably.
May it be a confidentiality preserving algorithm, an
authentication algorithm or integrity preserving algorithm they One more critical feature of WSN security is that the
should be designed in productive manner. Fragile design of formulated approach must be attack resistant. There are
protocols results in major loss and make the network delicate. different forms of attacks such as ‘‘Brute Force attack”, ‘‘Sybil
Attack”, ‘‘Denial of Service (DoS)”, ‘‘Node Capture attack”
In this paper all the specifications of a wireless network design and so on [9].
are reviewed and our focus is on designing an effective solution
for secure transmission of data besides being energy efficient. We conceived a wireless sensor network methodology aiming
Although several researchers explored various approaches for at improving the security and energy efficiency in which a
providing security, data encryption is considered as an effective hybrid cryptographic technique is used. In this section the
and widely used method. Data encryption refers to the introduction has been given. In the next section related
conversion of data said as plain text to another form which is literature is reviewed and the proposed work is mentioned in
said as cipher. In this conversion data gets scrambled from the subsequent section. Finally, the conclusions are given in the
which the original data could be retrieved only by the legitimate last section.
user. There are various techniques introduced by distinguished
researchers among which Data Encryption Standard (DES), 2. Literature Survey:
Advanced Encryption Standard (AES), Blow Fish, RC4, RSA,
ECC [2][3][4][5][6][7] are few. Each algorithm has its own Several researchers rendered their contributions in the field of
importance and used in certain applications. Later on few wireless sensor networks and that too specifically on security
researchers combined the basic algorithms and came up with in WSNs. To fine tune our study we had gone through them
hybrid algorithms and geared up the performance and strength among which few were cited here which makes us understand
of security. the vitality of the research.
Pooja et.al. in [10] proposed a three phase hybrid algorithm
When security is incorporated into wireless sensor network, it that enforces security in wireless sensor network which is well
increases the overhead on a node or cluster head due to which designed. The three algorithms AES, DES and m-RSA are
energy becomes expensive and energy efficiency comes down. executed parallel on the data. Here the data is divided into three
As security algorithms are instrumental in maintaining data fragments which are encrypted using the respective algorithm.
secrecy, their usage is mandatory and at the same time energy The results are promising when data size is less compared to
efficiency is also crucial. To address this issue, solutions are to others. Moreover energy efficiency and other such factors were
be designed in such a way that they provide robust security and not discussed.
at the same time the energy efficiency is preserved to an
optimum level. Urooj et.al. [11] proposed a hybrid algorithm which is a
combination of AES and ECC along with LEACH clustering
Computation, memory and power are the resources which are technique so as to improve the energy efficiency, network
limited in the nodes of Wireless sensor networks. longevity and security. Although the approach proved to be
Computational inexpensiveness, memory and power savings resisting side channel attacks and other security threats and
make the WSN long-lasting. If the network topology is properly even better than various techniques, the time consumption seem
planned, the entire process could be run optimal with which to be a bit high.
meet the design parameters of a WSN. Clustering is a cogent
approach in which the entire operational WSN area is divided Mahlake et.al. [12] came up with a lightweight security
into regions called clusters and each cluster is headed by a algorithm to address the resource constraints in IoT networks
specific node called as cluster head. Instead of nodes which is a combination of SIT and SPINS [13] protocols. The
communicating directly to the base station which is at farther proposed Light weight security algorithm LSA, reduced the

718
IJRITCC | October 2023, Available @ http://www.ijritcc.org
International Journal on Recent and Innovation Trends in Computing and Communication
ISSN: 2321-8169 Volume: 11 Issue: 10
Article Received: 10 August 2023 Revised: 28 September 2023 Accepted: 20 October 2023
___________________________________________________________________________________________________________________

power consumption keeping the performance high. SPINS has link compute their degrees and broadcasts the route request
the Security Network Encryption [14]and the µTESLA message. In the last phase the intra cluster communications
protocols as its building blocks for key distribution. However happen and the cryptographic algorithm implemented is
the algorithm is to be implemented and results are to be intended to provide security. Even though the proposed
compared with other approaches. technique performs better in terms of delay, energy efficiency,
throughput, packet delivery and loss rates; there is a room for
Sharmila et.al. [15] in their article proposed a hybrid secure improvement by adding an authentication layer to prevent from
key management scheme using ECC and a hash function that designated attacks. Also, artificial intelligence techniques
generates key pre-distribution keys in wireless sensor could be employed to improve the performance further.
networks. So as to achieve mutual authentication among the
sensor nodes this hybrid approach is useful and it possesses less Kumar [20] proposed an efficient and secure user
computational complexity. Key establishment happens in authentication protocol for Wireless sensor networks which
broadcasting mode and it is done using node identity. Although employed a hash function. The protocol’s security level is
the scheme offers 30.67% of energy conservation and 13.07% tested using AVISPA and its performance was analyzed in
broadcast delay yet it suffers from the latency in determining terms of various parameters. It is also tested in various attack
the rekeying material that preserves the energy consumption formats. Nevertheless, the protocol could be further improved
and improves the network lifetime. in reducing the computational as well energy consumption
costs and could be deployed in various applications.
Sampradeepraj et.al. [16] introduced a cryptographic
technique that functions by employing AES and RSA in two
Ebadati et.al. [21] proposed a novel hybrid secure approach
phases which are symmetric and asymmetric cryptographic
for WSNs which first encodes the data, splits the data into
methods respectively. Although the two-phase technique
blocks and applies encryption, authentication and integrity
proposed offers better execution time, security is still to be
related algorithms in two stages. Later the encrypted blocks are
enhanced.
combined and forwarded. The algorithms used are RSA,
Uras et.al. [17] considering the security level and bit error rate ECDH, SHA 256 and ECDSA. Eight algorithms are used in
in wireless sensor networks and to provide safety, proposed an performing these tasks which offered promising results in terms
efficient protocol which used reserved bits of FC field in Zigbee of security. But the approach consumed more time and the
MAC header in identifying secure vs insecure nodes. They used authors as part of their future work mentioned to make use of
RECTANGLE, Camellia and Fantomas techniques in devising compression algorithms which reduces not only storage but
the scheme and proved its effectiveness by comparing with also time and energy during the transmissions.
AES in terms of performance metrics such as delay, power
consumption, throughput and memory. Kumar et.al. [22] and Nidarsh et.al. [23] made their efforts in
working with chaotic maps in providing security for wireless
Hudhaifa et.al. [18] proposed a hybrid security scheme sensor networks. The former research team improved a user
intended to provide effective security parameter avoiding authentication scheme in which the secret keys are made using
computation and memory constraints. Blowfish, MD5 and large integers rather than large prime numbers which made the
ECDH are combined to compose the hybrid technique so as to operations faster. Cryptanalysis is performed with various
offer security services. They experimented using two attack relays and confirmed that the scheme is attack resistant.
computers and obtained the results which exhibited better Further it could be improved in terms of computational and
performance by reducing the text size and decrease in storage costs. The latter team proposed a chaotic encryption
encryption (19.6%) and decryption (41.1%) times when with LEACH algorithm which resulted in less power
compared to other algorithms. consumption and security.

Heon Jeong et.al. [19] in their research focussed on health care Rawya et.al. [24] proposed a notable hybrid technique that
and proposed a secure routing technique SecAODV a provide security with minimized key maintenance for image
heterogeneous WBSN. It operates in three phases namely data in wireless sensor networks. They used AES and ECC for
bootstrapping, routing and communication security. During the encryption, XOR-DUAL RSA for authentication and MD5 for
first phase, the memory of sensor nodes are loaded with system maintaining data integrity. All the performance measures are
parameters and encryption functions by the base station. In the satisfactory and the technique is robust to attacks in case of
next phase the cluster head nodes, basing on various parameters image encryption. They have done correlation analysis of the
such as distance, residual energy, hop count and quality of the images before and after encryption to determine the efficiency

719
IJRITCC | October 2023, Available @ http://www.ijritcc.org
International Journal on Recent and Innovation Trends in Computing and Communication
ISSN: 2321-8169 Volume: 11 Issue: 10
Article Received: 10 August 2023 Revised: 28 September 2023 Accepted: 20 October 2023
___________________________________________________________________________________________________________________

of the application. However there lies a scope for improvement 3. Proposed work:
in terms of other parameters such as time consumption energy Security is an indispensable aspect in every transaction
efficiency and so on. happening in the network transmissions. Wireless Sensor
Networks are quite vulnerable to the security attacks. Hence a
Ren et.al. [28] using RSA and DES formulated a hybrid highly efficient architectural model is very much essential in
approach for Bluetooth communication. Their approach designing the sensor networks. Cryptographic algorithms play
infused security in the communication besides the technique a vital role in providing encryption and decryption to the data
being simple and efficient. being transmitted consequently with which security is offered
in an elegant manner. As the third part of architecting our
Subasree et.al. [26] proposed a hybrid technique which wireless sensor networks, secure design is of major concern in
encompasses ECC, Dual-RSA AND MD5 algorithms to which three algorithms are used. Both block and stream cipher
incorporate confidentiality, authentication and integrity algorithms are used due to which the potentiality has been
respectively. improved. The three encryption/decryption algorithms Data
Encryption Standard (DES), Advanced Encryption Standard
Murugan et.al. [25] proposed a security algorithm which (AES) and RC4 are the part of trio model “DAR” proposed in
maximizes key lifetime and security levels besides reducing this paper.
power consumption level.
3.1 Architecture:
The above cited contributions reveal that wireless sensor The model’s functionality comprises two phases. In the primary
network researchers made their efforts in accelerating the phase, encryption is applied on the data being transmitted from
technology to an advance level not only in theoretical sensor nodes to cluster heads and in the further phase, the
dimension but also in various applications. Also, security plays encrypted data in the earlier phase would again be encrypted
a lead role in making the WSNs widely useful. However, the and transmitted from the cluster head to the sink. Moreover, the
contributions left an impression that there is a scope for data which is being encrypted undergoes phase wise
enhancing the performance in various facets. Most importantly compression so that the data transmission becomes more secure
AES seems to be an efficient algorithm due to its capability and and fast. The architecture of proposed security model is as
its inclusion is unavoidable in most security applications of shown in figure 1. The application of 2 phase compression
wireless sensor networks. Security applications with single mechanism and its advantage had already been articulated in
algorithm may not yield good results. Hence hybrid techniques our earlier research article [30]. In extension to the study made,
are the prevailing ones. The design aspects of the techniques we performed mentioned efforts and the network diagram is as
indicate that the security parameters such as confidentiality, shown in figure 2.
integrity and authentication must be preserved. And at the same It could be observed from fig that the first phase activities
time the challenges of sensor networks viz. energy and other happen in a node and then the data is transmitted to Cluster
resource constraints, network life time, inexpensive head. In the cluster head the second phase activities take place
computational complexity must be addressed. In [21] it is after which the data is transmitted to the base station. In the
mentioned that usage of effective compression algorithms may base station the reverse actions of phase 1 and 2 are applied
reduce time consumption which leads the network to be energy with which the original data is retrieved. During the first phase
efficient. Considering all the leads for an efficient algorithm we the data which is to be transmitted is first divided into two parts
made our efforts towards our proposed contribution which is in which the first part contains 1/3rd of bits (r bits) to be
presented in the next section. transmitted and the other part contains 2/3rd (n-r) of bits. The
first part is encrypted using DES while the other part is
encrypted using AES. On the other hand, the data from cluster
head to base station is encrypted using RC4. Decryption
happens at Base station.

720
IJRITCC | October 2023, Available @ http://www.ijritcc.org
International Journal on Recent and Innovation Trends in Computing and Communication
ISSN: 2321-8169 Volume: 11 Issue: 10
Article Received: 10 August 2023 Revised: 28 September 2023 Accepted: 20 October 2023
___________________________________________________________________________________________________________________

Fig 1: Architecture of the proposed DAR model

Fig 2: DAR Security WSN diagram

721
IJRITCC | October 2023, Available @ http://www.ijritcc.org
International Journal on Recent and Innovation Trends in Computing and Communication
ISSN: 2321-8169 Volume: 11 Issue: 10
Article Received: 10 August 2023 Revised: 28 September 2023 Accepted: 20 October 2023
___________________________________________________________________________________________________________________

3.2 Encryption and Decryption processes in DAR model: which is to be sent to the base station. Now the compressed data
The security process involves encryption & decryption as well is divided into two parts (1/3rd and 2/3rd), among which first part
compression & decompression processes at different levels is encrypted with DES and the next part is encrypted with AES;
which are described below. The data input originates in the in the next step respective number of bits are identified for each
node and supplied as 𝑋𝑘 for the further steps. encryption algorithm. bDES & bAES are the data supplied to
DES & AES respectively for which 𝐶𝑘1 & 𝐶𝑘2 are outputted as
Encryption at Node level (between node and cluster head): ciphers. The ciphers are next compressed in the node using
Wk  𝐹𝐸𝐿𝐴𝐶𝑆𝑁𝑗𝑘𝐶𝐻𝑘 (Xk) LZMA technique which output 𝐶𝑘3 . Upon receiving 𝐶𝑘3 ,
bk  num_bits(Wk) Cluster head further encrypts the received data using RC4
if (bk = 3m) //(∵ m∈z+) algorithm which outputs 𝐶𝑘3 as the cipher obtained. This cipher
{ shall be sent to the base station. At base station the reverse of
bDES = b1 to bk/3 the above procedures i.e., Deciphering and Decompression
bAES = bk/3 + 1 to bk takes place so that the original input messages are obtained. The
} terms 𝐸𝐷𝐸𝑆𝑘 , 𝐸𝐴𝐸𝑆𝑘 , 𝐸𝑅𝐶4𝑘 , 𝐷𝐷𝐸𝑆𝑘 , 𝐷𝐴𝐸𝑆𝑘 ,
1 2 3 1 2
else if (bk = 3m-2) 𝐷𝑅𝐶4𝑘3 represents the Encryption and Decryption procedures
{
using DES, AES, RC4 with the keys k1, k2 and k3 respectively.
bDES = b1 to bk/3 + 1
bAES = bk/3 + 2 to bk
3.3 Results and Discussion:
}
With the infused additional flavour of security by introducing
else
“DAR” hybrid algorithm to the existing data compression
{
proposed [8] in our earlier module of our research, we could
bDES = b1 to bk/3 – 1
derive three benefits security, speed and energy efficiency
bAES = bk/3 to bk
which are detailed in this sub section. The Clustering, Cluster
}
head selection, Compression and Security algorithms are
𝐶𝑘1  𝐸𝐷𝐸𝑆𝑘1 (bDES )
implemented in an i5 machine using python.
𝐶𝑘2  𝐸𝐴𝐸𝑆𝑘2 (bAES ) a) Security:
The DAR model is designed in such a way that the encryption
Encryption at Cluster head level (between cluster head and provides high security. DAR model is a combination of three
base station): algorithms viz., Data Encryption Standard (DES), Advanced
Yk  𝐿𝑍𝑀𝐴𝐶𝐻𝑘𝐵𝑆 (𝐶𝑘1 || 𝐶𝑘2 ) // LZMA Compression Encryption Standard (AES) and RC4. Among these algorithms,
of 𝐶𝑘1 || 𝐶𝑘2 DES & AES are block ciphers while the RC4 is a stream cipher.
𝐶𝑘3  𝐸𝑅𝐶4𝑘3 (Yk ) To bring novelty in the model, the block cipher algorithms are
used in one phase and the stream cipher algorithm is used in
another phase. While transferring the data from node to cluster
Data Retrieval at Base station:
head block ciphers are used. It makes the data strong and as
Yk  𝐷𝑅𝐶4𝑘3 (𝐶𝑘3 )
stream cipher is more advantageous than block ciphers, RC4 is
𝐶𝑘1 || 𝐶𝑘2  𝑑𝑒𝑐𝑜𝑚𝑝𝑟𝑒𝑠𝑠𝐿𝑍𝑀𝐴 ( Yk ) // LZMA employed to transfer data from cluster head to base station
Decompression of Yk which surges the security. RC4 offers fast and strong
bDES  𝐷𝐷𝐸𝑆𝑘 (𝐶𝑘1 ) encryption besides DES & AES being the potential ciphers.
1
bAES  𝐷𝐴𝐸𝑆𝑘2 (𝐶𝑘2 ) Thus, the security offered by the trio becomes robust.
Wk  bDES ∥ bAES The performance of proposed model “DAR” proves to be
Xk  𝑑𝑒𝑐𝑜𝑚𝑝𝑟𝑒𝑠𝑠𝐹𝐸𝐿𝐴𝐶𝑆 ( Wk ) // FELACS superior when compared to few hybrid algorithms used in
Decompression providing security for wireless sensor network transmissions.
The performance is depicted in table 1.
In the above algorithmic procedures, firstly Xk is compressed
using FELACS and produces Xk as the output of the message

722
IJRITCC | October 2023, Available @ http://www.ijritcc.org
International Journal on Recent and Innovation Trends in Computing and Communication
ISSN: 2321-8169 Volume: 11 Issue: 10
Article Received: 10 August 2023 Revised: 28 September 2023 Accepted: 20 October 2023
___________________________________________________________________________________________________________________

Table 1: Comparison of various security parameters with other contributions

Hybrid algorithm Encryption Confide Authenti Data


Algorithm/s used
proposed by strength ntiality cation Integrity
Dual RSA, ECC &
Subasree et.al. [26] ++ +++ ++ +
MD5
Kumar et.al. [27] AES & ECC ++ ++ ++ +
Ren et.al. [28] DES & RSA ++ ++ + +
AES, RSA &
Ramaraj et.al. [29] ++ ++ ++ +
SHA 512
Shabana et.al. [11] AES & ECC ++ ++ ++ +
DES, AES, RC4,
Proposed +++ +++ ++ ++
SHA 256 & HMAC

+, ++ and +++ indicates the feature offered and levels of strength of the feature

Encryption strength, confidentiality, Authentication and Data IV1, IV2, IV3 – Initial Vectors
integrity are the measures of strength of any Security model. It T – Time
could be observed from the above table that among the hybrid D - Date
algorithms proposed by various researchers, there are IP – IP Address
Symmetric and Asymmetric encryption algorithms. Symmetric The three keys K1, K2 and K3 used for the respective algorithms
algorithms offer confidentiality to most extent while DES, AES and RC4 are designed in a simple and effective
authentication and data integrity to moderate extent. On the manner. K1 is generated using three values; a 64 bit random
other hand, asymmetric algorithms provide confidentiality and value, the date and time of the encryption which are XORed
authentication mostly and moderate data integrity. Usage of and is applied to only one part of data. AES on the other hand
Hash algorithms and Authentication codes improves the data uses the key value K2 built using an XOR operation applied on
integrity and Authentication. When compared to the other 128 bit random value and IP address of the node. This AES
algorithms, the proposed algorithm has three symmetric algorithm is used to encrypt remaining part of the data.
algorithms, a hash algorithm and an authentication code due to Depending on the length of IP address the same IP value is
which the encryption strength goes high consequently the concatenated multiple times to reach the length 128 bit. To be
confidentiality. In addition, the authentication and data more clear, if the length is 32 bit (IPv4), 4 times the
integrity offered is high. Due to its features the proposed concatenation happens while if the length is 128 bit (IPv6) no
security model seems to be robust and substantial in terms of concatenation is required. For the third algorithm RC4 which
efficacy. is used to further encrypt the previously encrypted data using
DES & AES, the key K3 is used in which an initial random fixed
b) Efficient Key Management: value and a dynamic nonce are generated and supplied to
Keys play a major defensive role in providing security for HMAC which operates with SHA 256 digest. From the above
wireless sensor networks. In [31] various key management it could be understood that the key management is
schemes were discussed and among the discussed ones, the computationally inexpensive and dynamic with which we can
features of Energy Efficient Dynamic Key Management uphold that the proposed model constitutes Efficient key
technique seem to be promising and similar featured key management.
management process is followed in this article. The keys
involved in proposed security model are made up of nimble and c) Attack resistance:
computational inexpensive featured attributes and operations, Due to various algorithms being used, the overall key size is
the key management is energy efficient as well dynamic in between 232 bits to 2240 bits. Hence launching brute force
nature. The key computations are depicted below. attack is highly difficult. As the node’s IP address is involved
𝐷𝐸𝑆𝐾 1 = IV1 ⊕ T ⊕ D in key formation, sensor node’s anonymity attack, password
𝐴𝐸𝑆𝐾 2 = IV2 ⊕ IP guessing, and impersonation attacks [20] are also at a distance.
𝑅𝐶4𝐾 3 = HMAC(SHA256(IV3, nonce,)) Due to the usage of compression and encryption mechanisms
Traffic analysis attack and routing attacks such as spoofed
routing attack, sybil attack, so on could be resisted.

723
IJRITCC | October 2023, Available @ http://www.ijritcc.org
International Journal on Recent and Innovation Trends in Computing and Communication
ISSN: 2321-8169 Volume: 11 Issue: 10
Article Received: 10 August 2023 Revised: 28 September 2023 Accepted: 20 October 2023
___________________________________________________________________________________________________________________

d) Speed: Table 2: Comparison of Time consumption (seconds)


Another vital facet of wireless sensor network is the speed at
which data is transmitted to the base station. Usually, the data Time Time
originates at a sensor node and needs to be transmitted to the Type of data consumption consumption
base station. If clustering is implemented then the data must for 256 bits for 512 bits
first be transmitted to Cluster head and from cluster head the
Uncompressed data
data shall be transmitted to the base station. Although clustering 0.256 0.512
(UC)
is a overhead, for efficient and organized transmission the
solution is acceptable. Undeniably Security is an essential Encrypted data (C-
0.224 0.376
factor in data transmission; but if incorporated it consumes E-E)
time. Compressed data
0.108 0.136
To handle this, efficient techniques must be chosen in providing (C-E-C-E)
high security with minimal time consumption. Such optimal
solutions could be devised only with judicial implementation. Figure 3: Time consumption for uncompressed, encrypted
In this research as compression and encryption are jointly and compressed data
ventured, both security and speed are preserved. In providing a
secure solution the placement of encryption algorithms has
been wisely done.
Security is provided by combining DES, AES and RC4
algorithms as described. The time complexity of all the three
algorithms which are symmetric ciphers is O(n). The
compression algorithms also have an order of time complexity
O(n). Hence the overall time complexity of the proposed hybrid
approach seems to be O(n).

As the node handles less data when compared to a cluster head,


two algorithms are used to encrypt the data between node and
cluster head. Between cluster head and base station the data is
encrypted using one algorithm which is simple, strong and
efficient. The former two algorithms used are DES & AES
which consumes more time than the later used algorithm RC4.
This led to an innovative secured combination preserving the
speed. As encryption alone would consume more time, data is It is observed from the above figures that both Compression
compressed and submitted to the encryption so that the data and Encryption when jointly used is offering significant results.
which is to be encrypted becomes less consequently the
Moreover, the proposed model DAR when compared with
encryption time gets reduced. This procedure is implemented
contributions of other researchers performed extremely well in
in both the phases and it significantly impacts the time
terms of time consumption. The results are presented in the
consumption which is depicted in table 2 and figure 3.
table 4 and figure 5.

The time consumption for processing data at various stages


Table 3: Encryption time comparison (sec)
could be observed from the above presentation which makes us
understand that the uncompressed (UC) data takes much time,
Compressed (C) – Encrypted (E) – Encrypted (E) data Uncompress
Data length Compressed data
consumes less time than UC. The data which is encrypted after ed data
(bits) (C-E-C-E)
compression followed by compression and encryption (C-E-C- (UC)
E) consumes less significant time. Similarly, the time 192 0.192 0.188
consumption of UC and C-E-C-E data for various lengths of
data is depicted in table 3 and figure 4 which reveals the same. 256 0.126 0.224

512 0.512 0.376

768 0.768 0.512

1216 1.216 0.772 724


IJRITCC | October 2023, Available @ http://www.ijritcc.org
International Journal on Recent and Innovation Trends in Computing and Communication
ISSN: 2321-8169 Volume: 11 Issue: 10
Article Received: 10 August 2023 Revised: 28 September 2023 Accepted: 20 October 2023
___________________________________________________________________________________________________________________

Figure 4: Uncompressed vs Compressed -encrypted process e) Energy Consumption:


time comparision For longevity of a sensor node, energy of the node is a prime
factor. In other words, Energy consumption for various
activities of a node determines the life of a node due to which
the performance of a wireless sensor network becomes
influential. The prudent choice of algorithms for a node
subsequently the network activity impacts the energy
efficiency. The security model implemented in this research
offered security as well it seems to be energy efficient. It could
be observed from the following results depicted in table 5 and
figure 6 that Energy consumption is promising.

The security model is experimented and the energy


consumption for various lengths of data being encrypted are
considered. The above results depict that the model yields in
pleasing performance in terms of energy efficiency. Not only
energy efficiency but also its performance is remarkable in
terms of security, key management and time consumption.

Table 4: Encryption times of various contributions

Hybrid algorithm Time for Encryption – Time for Encryption – Time for Encryption –
proposed by in sec (192 bits) in sec (768 bits) in sec (1216 bits)
Subasree et.al. [33] 2.1 2.3 2.1
Kumar et.al. [34] 4 3.2 6
Ren et.al. [35] 1.3 1.8 2.3
Ramaraj et.al. [36] 3 2.7 4.9
Shabana et.al. [37] 0.9 2 3
Proposed 0.188 0.512 0.772
Figure5:Comparison of encryption times of various contributions

725
IJRITCC | October 2023, Available @ http://www.ijritcc.org
International Journal on Recent and Innovation Trends in Computing and Communication
ISSN: 2321-8169 Volume: 11 Issue: 10
Article Received: 10 August 2023 Revised: 28 September 2023 Accepted: 20 October 2023
___________________________________________________________________________________________________________________

Table 5: Energy consumption comparison

Data length Uncompressed Compressed data


(bits) data (UC) (C-E-C-E)

192 0.01248 0.01222

256 0.01664 0.01456

512 0.03328 0.02444

768 0.04992 0.03328

1216 0.07904 0.05018

Fig 6: Uncompressed vs Compressed & Encrypted energy efficiency comparison

4. Conclusion and Future scope reveals its efficacy. Due to the novel Compression-Encryption-
Usage of wireless sensor networks has become enormous due Compression-Encryption (CECE) process, the data is
to their potentiality. However major challenges in encrypted optimally and is attack resistant. The compression
implementing WSNs include security, energy efficiency, QoS, and encryption processes happen very quickly and the data size
Scalability and others. In this paper a novel solution is gets reduced drastically giving scope to faster transmission.
architected to address the security issues while the data is being Due to higher compression ratios, the encryption sounds high
transmitted from sensor nodes to sink node. The major concerns besides preserving the energy efficiency.
while designing a security solution comprise the robustness of
solution, transmission speed and energy constraints. The DAR In this research work we focussed on providing security as well
model detailed exhibits strong encryption as three state of art its impact on preserving the energy efficiency and time
algorithms are used. In addition, the key management also consumption. As a part of future extension, more focus is to be
given on practical implementation of testing the algorithm for

726
IJRITCC | October 2023, Available @ http://www.ijritcc.org
International Journal on Recent and Innovation Trends in Computing and Communication
ISSN: 2321-8169 Volume: 11 Issue: 10
Article Received: 10 August 2023 Revised: 28 September 2023 Accepted: 20 October 2023
___________________________________________________________________________________________________________________

all types of attacks which proves the technique to be highly [11] Shabana Urooj, Sonam Lata, Shahnawaz Ahmad, Shabana
vigorous. The hybrid approach is formulated and verified for Mehfuz and S Kalathil, "Cryptographic Data Security for
textual information such as temperature, humidity, pressure and Reliable Wireless Sensor Network", Alexandria
so on. However, the approach must be equipped for Image Engineering Journal, Volume 72, 2023, Pages 37-50,
related data security. ISSN 1110-0168,
https://doi.org/10.1016/j.aej.2023.03.061.
References: [12] Mahlake, Ntebatseng, Topside E. Mathonsi, Tonderai
Muchenje and Deon Du Plessis. “A Hybrid Algorithm to
[1] Yazdinejad, M.; Nayyeri, F.; Ebadati E., O. M.; Afshari, N.
Enhance Wireless Sensor Networks security on the
(2017): Secure distributed group rekeying scheme for
IoT.” ArXiv abs/2303.14445 (2023):
cluster based wireless sensor networks using multilevel
[13] F. Ullah, T. Mehmood, M. Habib and M. Ibrahim, "SPINS:
encryption. Internet of Things: Novel Advances and
Security Protocols for Sensor Networks", 2009
Envisioned Applications, pp. 127-147.
International Conference on Machine Learning and
[2] National Institute of Standards and Technology (1979).
Computing IPCSIT, vol. 3, 2011. IACSIT Press,
“FIPS-46: Data Encryption Standard (DES).” Revised as
Singapore
FIPS 46-1:1988, FIPS 46-2:1993, FIPS 46-3:1999,
[14] L. Tobarra, D. Cazorla and F. Cuartero, "Formal Analysis
available at http://csrc.nist.gov/publications/fips/fips46-
of Sensor Network Encryption Protocol (SNEP)," 2007
3/fips46-3.pdf
IEEE International Conference on Mobile Adhoc and
[3] Dworkin, M. , Barker, E. , Nechvatal, J. , Foti, J. , Bassham,
Sensor Systems, 2007, pp. 1-6, doi:
L. , Roback, E. and Dray, J. (2001), Advanced Encryption
10.1109/MOBHOC.2007.4428763.
Standard (AES), Federal Inf. Process. Stds. (NIST FIPS),
[15] Sharmila, Kumar, P., Bhushan, S. et al. Secure Key
National Institute of Standards and Technology,
Management and Mutual Authentication Protocol for
Gaithersburg, MD, [online],
Wireless Sensor Network by Linking Edge Devices using
https://doi.org/10.6028/NIST.FIPS.197
Hybrid Approach. Wireless Pers Commun 130, 2935–
[4] De Cannière C (2005) Blowfish. In: van Tilborg HCA (ed)
2957 (2023). https://doi.org/10.1007/s11277-023-10410-
Encyclopedia of Cryptography and Security. Springer,
7
Berlin. https://doi.org/10.1007/0-387-23483-7_34
[16] Sampradeepraj T, V. Anusuya Devi. A Hybrid
[5] Fontaine, C. (2011). RC4. In: van Tilborg, H.C.A., Jajodia,
Cryptography and End-to-end Security Model for
S. (eds) Encyclopedia of Cryptography and Security.
Wireless Sensor Netwoks, 14 June 2022, PREPRINT
Springer, Boston, MA. https://doi.org/10.1007/978-1-
(Version 1) available at Research Square
4419-5906-5_365
[https://doi.org/10.21203/rs.3.rs-1619181/v1]
[6] (2006). The RSA Public-Key Encryption Algorithm. In:
[17] Uras Panahi & Cüneyt Bayılmış,"Enabling secure data
Furht, B. (eds) Encyclopedia of Multimedia. Springer,
transmission for wireless sensor networks based IoT
Boston, MA. https://doi.org/10.1007/0-387-30038-4_206
applications", Ain Shams Engineering Journal, Volume
[7] Hankerson, D., Menezes, A. (2011). Elliptic Curve
14, Issue 2,(2023) 101866, ISSN 2090-4479,
Cryptography. In: van Tilborg, H.C.A., Jajodia, S. (eds)
https://doi.org/10.1016/j.asej.2022.101866.
Encyclopedia of Cryptography and Security. Springer,
[18] Hudhaifa A. Abdulhameed, Ayoob A.
Boston, MA. https://doi.org/10.1007/978-1-4419-5906-
Abdulhameed, Mahmood F. Mosleh, Alhamzah T.
5_245
Mohammad; Lightweight security protocol for WSNs
[8] Here we need to quote first paper
using hybrid cryptography algorithm. AIP Conf. Proc. 2
[9] P.B. Hari, S.N. Singh, Security issues in wireless sensor
December 2022; 2547 (1):
networks: current research and challenges, in: Paper
060006. https://doi.org/10.1063/5.0112665
presented at the 2016 international conference on
[19] Jeong H, Lee S-W, Hussain Malik M, Yousefpoor E,
advances in computing, communication, & automation
Yousefpoor MS, Ahmed OH, Hosseinzadeh M and
(ICACCA) (Spring), 2016.
Mosavi A (2022) SecAODV: A Secure Healthcare
[10] Pooja & R. K. Chauhan (2022) Triple phase hybrid
Routing Scheme Based on Hybrid Cryptography in
cryptography technique in a wireless sensor
Wireless Body Sensor Networks. Front. Med. 9:829055.
network, International Journal of Computers and
doi: 10.3389/fmed.2022.829055
Applications, 44:2, 148-
[20] Kumar, D. A secure and efficient user authentication
153, DOI: 10.1080/1206212X.2019.1710342
protocol for wireless sensor network. Multimed Tools

727
IJRITCC | October 2023, Available @ http://www.ijritcc.org
International Journal on Recent and Innovation Trends in Computing and Communication
ISSN: 2321-8169 Volume: 11 Issue: 10
Article Received: 10 August 2023 Revised: 28 September 2023 Accepted: 20 October 2023
___________________________________________________________________________________________________________________

Appl 80, 27131–27154 (2021).


https://doi.org/10.1007/s11042-021-10950-9
[21] E., Omid Mahdi Ebadati, Farshad Eshghi, and Amin
Zamani. “A Hybrid Encryption Algorithm for Security
Enhancement of Wireless Sensor Networks: A
Supervisory Approach to Pipelines.” Computer Modeling
in Engineering Sciences 122, no. 1 (2020): 323–49.
doi:10.32604/CMES.2020.08079.
[22] Kumar, D., Chand, S. & Kumar, B. Cryptanalysis and
improvement of an authentication protocol for wireless
sensor networks applications like safety monitoring in
coal mines. J Ambient Intell Human Comput 10, 641–660
(2019). https://doi.org/10.1007/s12652-018-0712-8
[23] Nidarsh M P and G Padmaja Devi, "Chaos based Secured
Communication in Energy Efficient Wireless Sensor
Networks", IRJET, Vol.05 Issue.06 (2018) pp 742-747
[24] Rawya Rizk and Yasmin Alkady, "Two-phase hybrid
cryptography algorithm for wireless sensor networks",
Journal of Electrical Systems and Information
Technology, Volume 2, Issue 3 (2015), Pages 296-313,
10.1016/j.jesit.2015.11.005.
[25] M.Senthil Murugan and Dr.T.Sasilatha, "DESIGN OF
HYBRID MODEL CRYPTOGRAPHIC ALGORITHM
FOR WIRELESS SENSOR NETWORK", International
Journal of Pure and Applied Mathematics, Vol. 117, No.
16 (2017), pp. 171-177
[26] S. Subasree, N.K. Sakthivel, Design of a new security
protocol using hybrid cryptography algorithms, IJRRAS.
2 (2) (2010) 95–103.
[27] N. Kumar, A secure communication wireless sensor
networks through hybrid (AES+ECC) algorithmk, Vol.
386, von LAP LAMBERT Academic Publishing, Koln,
Germany, 2012.
[28] W. Ren, Z. Miao, A hybrid encryption algorithm based on
DES and RSA in Bluetooth Communication, in: 2010
Second International Conference on Modeling,
Simulation and Visualization Methods, 2010, pp. 221-
225, doi:10.1109/ WMSVM.2010.48.
[29] D.E. Ramaraj, S. Karthikeyan, M. Hemalatha, A design of
security protocol using hybrid encryption technique
(AESRijndael and RSA), Int. J. Comput. Internet Manag.
17 (1) (2009) 78–86.
[30] Here we need to cite the second paper
[31] Seelamanthula Sreenivasu1 and Prof.James Stephen
Meka, “A Survey Paper on Key Management Scheme in
Wireless Sensor Network”, Journal of Engineering
Sciences, Vol 14 Issue 06,2023, pp. 1070 - 1103

728
IJRITCC | October 2023, Available @ http://www.ijritcc.org

You might also like