8568-Article Text-9599-1-10-20231108
8568-Article Text-9599-1-10-20231108
Abstract—Security is an indispensable aspect in every transaction happening in the network transmissions. Wireless Sensor
Networks are pretty vulnerable to the security attacks. Hence a highly efficient architectural model is very much essential in
designing the sensor networks. Cryptographic algorithms play a vital role in providing encryption and decryption to the data
being transmitted consequently with which security is offered in an elegant manner. In this paper, a reliable design comprising
three pioneering algorithms enabled with symmetric key is architected for secure communication in wireless sensor networks
from a node to the base station. The design involves two phases. In the former phase two algorithms which are effective in all
perspectives are used for data transmission from node to cluster head and in the latter phase another proficient algorithm is used
for communication between cluster head to base station. The three algorithms used are Data Encryption Standard (DES),
Advanced Encryption Standard (AES) and RC4. Both block and stream cipher algorithms are used to fine tune the performance;
and in addition, the data has been compressed with unprecedented techniques to reduce the burden on encryption. This led to an
amazing performance in terms of security parameters.
Keywords-Security in wireless sensor networks, Hybrid techniques in WSN security, Secure and fast transmission in wireless
sensor networks, DAR security model.
717
IJRITCC | October 2023, Available @ http://www.ijritcc.org
International Journal on Recent and Innovation Trends in Computing and Communication
ISSN: 2321-8169 Volume: 11 Issue: 10
Article Received: 10 August 2023 Revised: 28 September 2023 Accepted: 20 October 2023
___________________________________________________________________________________________________________________
designated identity and path is said to be the Sender distances, they can communicate to their respective cluster
authentication. Failing to authorize an entity may lead to heads and in turn the cluster heads communicate to the base
impersonation which otherwise means that the data may be station. However, this approach can take a lofty advantage only
originated from a duplicate node masquerading the original if clustering is well performed. There are numerous clustering
node due to which wrong data may be sent to mislead the entire techniques proposed by researchers which exhibited
application. All the above characteristics are to be retained with fascinating performance. We also designed an elegant
appropriate protocols so that right data reaches the right user in clustering technique [8] using GMM which is deployed in
right time. building the network topology. Due to effective clustering the
energy efficiency is preserved impeccably.
May it be a confidentiality preserving algorithm, an
authentication algorithm or integrity preserving algorithm they One more critical feature of WSN security is that the
should be designed in productive manner. Fragile design of formulated approach must be attack resistant. There are
protocols results in major loss and make the network delicate. different forms of attacks such as ‘‘Brute Force attack”, ‘‘Sybil
Attack”, ‘‘Denial of Service (DoS)”, ‘‘Node Capture attack”
In this paper all the specifications of a wireless network design and so on [9].
are reviewed and our focus is on designing an effective solution
for secure transmission of data besides being energy efficient. We conceived a wireless sensor network methodology aiming
Although several researchers explored various approaches for at improving the security and energy efficiency in which a
providing security, data encryption is considered as an effective hybrid cryptographic technique is used. In this section the
and widely used method. Data encryption refers to the introduction has been given. In the next section related
conversion of data said as plain text to another form which is literature is reviewed and the proposed work is mentioned in
said as cipher. In this conversion data gets scrambled from the subsequent section. Finally, the conclusions are given in the
which the original data could be retrieved only by the legitimate last section.
user. There are various techniques introduced by distinguished
researchers among which Data Encryption Standard (DES), 2. Literature Survey:
Advanced Encryption Standard (AES), Blow Fish, RC4, RSA,
ECC [2][3][4][5][6][7] are few. Each algorithm has its own Several researchers rendered their contributions in the field of
importance and used in certain applications. Later on few wireless sensor networks and that too specifically on security
researchers combined the basic algorithms and came up with in WSNs. To fine tune our study we had gone through them
hybrid algorithms and geared up the performance and strength among which few were cited here which makes us understand
of security. the vitality of the research.
Pooja et.al. in [10] proposed a three phase hybrid algorithm
When security is incorporated into wireless sensor network, it that enforces security in wireless sensor network which is well
increases the overhead on a node or cluster head due to which designed. The three algorithms AES, DES and m-RSA are
energy becomes expensive and energy efficiency comes down. executed parallel on the data. Here the data is divided into three
As security algorithms are instrumental in maintaining data fragments which are encrypted using the respective algorithm.
secrecy, their usage is mandatory and at the same time energy The results are promising when data size is less compared to
efficiency is also crucial. To address this issue, solutions are to others. Moreover energy efficiency and other such factors were
be designed in such a way that they provide robust security and not discussed.
at the same time the energy efficiency is preserved to an
optimum level. Urooj et.al. [11] proposed a hybrid algorithm which is a
combination of AES and ECC along with LEACH clustering
Computation, memory and power are the resources which are technique so as to improve the energy efficiency, network
limited in the nodes of Wireless sensor networks. longevity and security. Although the approach proved to be
Computational inexpensiveness, memory and power savings resisting side channel attacks and other security threats and
make the WSN long-lasting. If the network topology is properly even better than various techniques, the time consumption seem
planned, the entire process could be run optimal with which to be a bit high.
meet the design parameters of a WSN. Clustering is a cogent
approach in which the entire operational WSN area is divided Mahlake et.al. [12] came up with a lightweight security
into regions called clusters and each cluster is headed by a algorithm to address the resource constraints in IoT networks
specific node called as cluster head. Instead of nodes which is a combination of SIT and SPINS [13] protocols. The
communicating directly to the base station which is at farther proposed Light weight security algorithm LSA, reduced the
718
IJRITCC | October 2023, Available @ http://www.ijritcc.org
International Journal on Recent and Innovation Trends in Computing and Communication
ISSN: 2321-8169 Volume: 11 Issue: 10
Article Received: 10 August 2023 Revised: 28 September 2023 Accepted: 20 October 2023
___________________________________________________________________________________________________________________
power consumption keeping the performance high. SPINS has link compute their degrees and broadcasts the route request
the Security Network Encryption [14]and the µTESLA message. In the last phase the intra cluster communications
protocols as its building blocks for key distribution. However happen and the cryptographic algorithm implemented is
the algorithm is to be implemented and results are to be intended to provide security. Even though the proposed
compared with other approaches. technique performs better in terms of delay, energy efficiency,
throughput, packet delivery and loss rates; there is a room for
Sharmila et.al. [15] in their article proposed a hybrid secure improvement by adding an authentication layer to prevent from
key management scheme using ECC and a hash function that designated attacks. Also, artificial intelligence techniques
generates key pre-distribution keys in wireless sensor could be employed to improve the performance further.
networks. So as to achieve mutual authentication among the
sensor nodes this hybrid approach is useful and it possesses less Kumar [20] proposed an efficient and secure user
computational complexity. Key establishment happens in authentication protocol for Wireless sensor networks which
broadcasting mode and it is done using node identity. Although employed a hash function. The protocol’s security level is
the scheme offers 30.67% of energy conservation and 13.07% tested using AVISPA and its performance was analyzed in
broadcast delay yet it suffers from the latency in determining terms of various parameters. It is also tested in various attack
the rekeying material that preserves the energy consumption formats. Nevertheless, the protocol could be further improved
and improves the network lifetime. in reducing the computational as well energy consumption
costs and could be deployed in various applications.
Sampradeepraj et.al. [16] introduced a cryptographic
technique that functions by employing AES and RSA in two
Ebadati et.al. [21] proposed a novel hybrid secure approach
phases which are symmetric and asymmetric cryptographic
for WSNs which first encodes the data, splits the data into
methods respectively. Although the two-phase technique
blocks and applies encryption, authentication and integrity
proposed offers better execution time, security is still to be
related algorithms in two stages. Later the encrypted blocks are
enhanced.
combined and forwarded. The algorithms used are RSA,
Uras et.al. [17] considering the security level and bit error rate ECDH, SHA 256 and ECDSA. Eight algorithms are used in
in wireless sensor networks and to provide safety, proposed an performing these tasks which offered promising results in terms
efficient protocol which used reserved bits of FC field in Zigbee of security. But the approach consumed more time and the
MAC header in identifying secure vs insecure nodes. They used authors as part of their future work mentioned to make use of
RECTANGLE, Camellia and Fantomas techniques in devising compression algorithms which reduces not only storage but
the scheme and proved its effectiveness by comparing with also time and energy during the transmissions.
AES in terms of performance metrics such as delay, power
consumption, throughput and memory. Kumar et.al. [22] and Nidarsh et.al. [23] made their efforts in
working with chaotic maps in providing security for wireless
Hudhaifa et.al. [18] proposed a hybrid security scheme sensor networks. The former research team improved a user
intended to provide effective security parameter avoiding authentication scheme in which the secret keys are made using
computation and memory constraints. Blowfish, MD5 and large integers rather than large prime numbers which made the
ECDH are combined to compose the hybrid technique so as to operations faster. Cryptanalysis is performed with various
offer security services. They experimented using two attack relays and confirmed that the scheme is attack resistant.
computers and obtained the results which exhibited better Further it could be improved in terms of computational and
performance by reducing the text size and decrease in storage costs. The latter team proposed a chaotic encryption
encryption (19.6%) and decryption (41.1%) times when with LEACH algorithm which resulted in less power
compared to other algorithms. consumption and security.
Heon Jeong et.al. [19] in their research focussed on health care Rawya et.al. [24] proposed a notable hybrid technique that
and proposed a secure routing technique SecAODV a provide security with minimized key maintenance for image
heterogeneous WBSN. It operates in three phases namely data in wireless sensor networks. They used AES and ECC for
bootstrapping, routing and communication security. During the encryption, XOR-DUAL RSA for authentication and MD5 for
first phase, the memory of sensor nodes are loaded with system maintaining data integrity. All the performance measures are
parameters and encryption functions by the base station. In the satisfactory and the technique is robust to attacks in case of
next phase the cluster head nodes, basing on various parameters image encryption. They have done correlation analysis of the
such as distance, residual energy, hop count and quality of the images before and after encryption to determine the efficiency
719
IJRITCC | October 2023, Available @ http://www.ijritcc.org
International Journal on Recent and Innovation Trends in Computing and Communication
ISSN: 2321-8169 Volume: 11 Issue: 10
Article Received: 10 August 2023 Revised: 28 September 2023 Accepted: 20 October 2023
___________________________________________________________________________________________________________________
of the application. However there lies a scope for improvement 3. Proposed work:
in terms of other parameters such as time consumption energy Security is an indispensable aspect in every transaction
efficiency and so on. happening in the network transmissions. Wireless Sensor
Networks are quite vulnerable to the security attacks. Hence a
Ren et.al. [28] using RSA and DES formulated a hybrid highly efficient architectural model is very much essential in
approach for Bluetooth communication. Their approach designing the sensor networks. Cryptographic algorithms play
infused security in the communication besides the technique a vital role in providing encryption and decryption to the data
being simple and efficient. being transmitted consequently with which security is offered
in an elegant manner. As the third part of architecting our
Subasree et.al. [26] proposed a hybrid technique which wireless sensor networks, secure design is of major concern in
encompasses ECC, Dual-RSA AND MD5 algorithms to which three algorithms are used. Both block and stream cipher
incorporate confidentiality, authentication and integrity algorithms are used due to which the potentiality has been
respectively. improved. The three encryption/decryption algorithms Data
Encryption Standard (DES), Advanced Encryption Standard
Murugan et.al. [25] proposed a security algorithm which (AES) and RC4 are the part of trio model “DAR” proposed in
maximizes key lifetime and security levels besides reducing this paper.
power consumption level.
3.1 Architecture:
The above cited contributions reveal that wireless sensor The model’s functionality comprises two phases. In the primary
network researchers made their efforts in accelerating the phase, encryption is applied on the data being transmitted from
technology to an advance level not only in theoretical sensor nodes to cluster heads and in the further phase, the
dimension but also in various applications. Also, security plays encrypted data in the earlier phase would again be encrypted
a lead role in making the WSNs widely useful. However, the and transmitted from the cluster head to the sink. Moreover, the
contributions left an impression that there is a scope for data which is being encrypted undergoes phase wise
enhancing the performance in various facets. Most importantly compression so that the data transmission becomes more secure
AES seems to be an efficient algorithm due to its capability and and fast. The architecture of proposed security model is as
its inclusion is unavoidable in most security applications of shown in figure 1. The application of 2 phase compression
wireless sensor networks. Security applications with single mechanism and its advantage had already been articulated in
algorithm may not yield good results. Hence hybrid techniques our earlier research article [30]. In extension to the study made,
are the prevailing ones. The design aspects of the techniques we performed mentioned efforts and the network diagram is as
indicate that the security parameters such as confidentiality, shown in figure 2.
integrity and authentication must be preserved. And at the same It could be observed from fig that the first phase activities
time the challenges of sensor networks viz. energy and other happen in a node and then the data is transmitted to Cluster
resource constraints, network life time, inexpensive head. In the cluster head the second phase activities take place
computational complexity must be addressed. In [21] it is after which the data is transmitted to the base station. In the
mentioned that usage of effective compression algorithms may base station the reverse actions of phase 1 and 2 are applied
reduce time consumption which leads the network to be energy with which the original data is retrieved. During the first phase
efficient. Considering all the leads for an efficient algorithm we the data which is to be transmitted is first divided into two parts
made our efforts towards our proposed contribution which is in which the first part contains 1/3rd of bits (r bits) to be
presented in the next section. transmitted and the other part contains 2/3rd (n-r) of bits. The
first part is encrypted using DES while the other part is
encrypted using AES. On the other hand, the data from cluster
head to base station is encrypted using RC4. Decryption
happens at Base station.
720
IJRITCC | October 2023, Available @ http://www.ijritcc.org
International Journal on Recent and Innovation Trends in Computing and Communication
ISSN: 2321-8169 Volume: 11 Issue: 10
Article Received: 10 August 2023 Revised: 28 September 2023 Accepted: 20 October 2023
___________________________________________________________________________________________________________________
721
IJRITCC | October 2023, Available @ http://www.ijritcc.org
International Journal on Recent and Innovation Trends in Computing and Communication
ISSN: 2321-8169 Volume: 11 Issue: 10
Article Received: 10 August 2023 Revised: 28 September 2023 Accepted: 20 October 2023
___________________________________________________________________________________________________________________
3.2 Encryption and Decryption processes in DAR model: which is to be sent to the base station. Now the compressed data
The security process involves encryption & decryption as well is divided into two parts (1/3rd and 2/3rd), among which first part
compression & decompression processes at different levels is encrypted with DES and the next part is encrypted with AES;
which are described below. The data input originates in the in the next step respective number of bits are identified for each
node and supplied as 𝑋𝑘 for the further steps. encryption algorithm. bDES & bAES are the data supplied to
DES & AES respectively for which 𝐶𝑘1 & 𝐶𝑘2 are outputted as
Encryption at Node level (between node and cluster head): ciphers. The ciphers are next compressed in the node using
Wk 𝐹𝐸𝐿𝐴𝐶𝑆𝑁𝑗𝑘𝐶𝐻𝑘 (Xk) LZMA technique which output 𝐶𝑘3 . Upon receiving 𝐶𝑘3 ,
bk num_bits(Wk) Cluster head further encrypts the received data using RC4
if (bk = 3m) //(∵ m∈z+) algorithm which outputs 𝐶𝑘3 as the cipher obtained. This cipher
{ shall be sent to the base station. At base station the reverse of
bDES = b1 to bk/3 the above procedures i.e., Deciphering and Decompression
bAES = bk/3 + 1 to bk takes place so that the original input messages are obtained. The
} terms 𝐸𝐷𝐸𝑆𝑘 , 𝐸𝐴𝐸𝑆𝑘 , 𝐸𝑅𝐶4𝑘 , 𝐷𝐷𝐸𝑆𝑘 , 𝐷𝐴𝐸𝑆𝑘 ,
1 2 3 1 2
else if (bk = 3m-2) 𝐷𝑅𝐶4𝑘3 represents the Encryption and Decryption procedures
{
using DES, AES, RC4 with the keys k1, k2 and k3 respectively.
bDES = b1 to bk/3 + 1
bAES = bk/3 + 2 to bk
3.3 Results and Discussion:
}
With the infused additional flavour of security by introducing
else
“DAR” hybrid algorithm to the existing data compression
{
proposed [8] in our earlier module of our research, we could
bDES = b1 to bk/3 – 1
derive three benefits security, speed and energy efficiency
bAES = bk/3 to bk
which are detailed in this sub section. The Clustering, Cluster
}
head selection, Compression and Security algorithms are
𝐶𝑘1 𝐸𝐷𝐸𝑆𝑘1 (bDES )
implemented in an i5 machine using python.
𝐶𝑘2 𝐸𝐴𝐸𝑆𝑘2 (bAES ) a) Security:
The DAR model is designed in such a way that the encryption
Encryption at Cluster head level (between cluster head and provides high security. DAR model is a combination of three
base station): algorithms viz., Data Encryption Standard (DES), Advanced
Yk 𝐿𝑍𝑀𝐴𝐶𝐻𝑘𝐵𝑆 (𝐶𝑘1 || 𝐶𝑘2 ) // LZMA Compression Encryption Standard (AES) and RC4. Among these algorithms,
of 𝐶𝑘1 || 𝐶𝑘2 DES & AES are block ciphers while the RC4 is a stream cipher.
𝐶𝑘3 𝐸𝑅𝐶4𝑘3 (Yk ) To bring novelty in the model, the block cipher algorithms are
used in one phase and the stream cipher algorithm is used in
another phase. While transferring the data from node to cluster
Data Retrieval at Base station:
head block ciphers are used. It makes the data strong and as
Yk 𝐷𝑅𝐶4𝑘3 (𝐶𝑘3 )
stream cipher is more advantageous than block ciphers, RC4 is
𝐶𝑘1 || 𝐶𝑘2 𝑑𝑒𝑐𝑜𝑚𝑝𝑟𝑒𝑠𝑠𝐿𝑍𝑀𝐴 ( Yk ) // LZMA employed to transfer data from cluster head to base station
Decompression of Yk which surges the security. RC4 offers fast and strong
bDES 𝐷𝐷𝐸𝑆𝑘 (𝐶𝑘1 ) encryption besides DES & AES being the potential ciphers.
1
bAES 𝐷𝐴𝐸𝑆𝑘2 (𝐶𝑘2 ) Thus, the security offered by the trio becomes robust.
Wk bDES ∥ bAES The performance of proposed model “DAR” proves to be
Xk 𝑑𝑒𝑐𝑜𝑚𝑝𝑟𝑒𝑠𝑠𝐹𝐸𝐿𝐴𝐶𝑆 ( Wk ) // FELACS superior when compared to few hybrid algorithms used in
Decompression providing security for wireless sensor network transmissions.
The performance is depicted in table 1.
In the above algorithmic procedures, firstly Xk is compressed
using FELACS and produces Xk as the output of the message
722
IJRITCC | October 2023, Available @ http://www.ijritcc.org
International Journal on Recent and Innovation Trends in Computing and Communication
ISSN: 2321-8169 Volume: 11 Issue: 10
Article Received: 10 August 2023 Revised: 28 September 2023 Accepted: 20 October 2023
___________________________________________________________________________________________________________________
+, ++ and +++ indicates the feature offered and levels of strength of the feature
Encryption strength, confidentiality, Authentication and Data IV1, IV2, IV3 – Initial Vectors
integrity are the measures of strength of any Security model. It T – Time
could be observed from the above table that among the hybrid D - Date
algorithms proposed by various researchers, there are IP – IP Address
Symmetric and Asymmetric encryption algorithms. Symmetric The three keys K1, K2 and K3 used for the respective algorithms
algorithms offer confidentiality to most extent while DES, AES and RC4 are designed in a simple and effective
authentication and data integrity to moderate extent. On the manner. K1 is generated using three values; a 64 bit random
other hand, asymmetric algorithms provide confidentiality and value, the date and time of the encryption which are XORed
authentication mostly and moderate data integrity. Usage of and is applied to only one part of data. AES on the other hand
Hash algorithms and Authentication codes improves the data uses the key value K2 built using an XOR operation applied on
integrity and Authentication. When compared to the other 128 bit random value and IP address of the node. This AES
algorithms, the proposed algorithm has three symmetric algorithm is used to encrypt remaining part of the data.
algorithms, a hash algorithm and an authentication code due to Depending on the length of IP address the same IP value is
which the encryption strength goes high consequently the concatenated multiple times to reach the length 128 bit. To be
confidentiality. In addition, the authentication and data more clear, if the length is 32 bit (IPv4), 4 times the
integrity offered is high. Due to its features the proposed concatenation happens while if the length is 128 bit (IPv6) no
security model seems to be robust and substantial in terms of concatenation is required. For the third algorithm RC4 which
efficacy. is used to further encrypt the previously encrypted data using
DES & AES, the key K3 is used in which an initial random fixed
b) Efficient Key Management: value and a dynamic nonce are generated and supplied to
Keys play a major defensive role in providing security for HMAC which operates with SHA 256 digest. From the above
wireless sensor networks. In [31] various key management it could be understood that the key management is
schemes were discussed and among the discussed ones, the computationally inexpensive and dynamic with which we can
features of Energy Efficient Dynamic Key Management uphold that the proposed model constitutes Efficient key
technique seem to be promising and similar featured key management.
management process is followed in this article. The keys
involved in proposed security model are made up of nimble and c) Attack resistance:
computational inexpensive featured attributes and operations, Due to various algorithms being used, the overall key size is
the key management is energy efficient as well dynamic in between 232 bits to 2240 bits. Hence launching brute force
nature. The key computations are depicted below. attack is highly difficult. As the node’s IP address is involved
𝐷𝐸𝑆𝐾 1 = IV1 ⊕ T ⊕ D in key formation, sensor node’s anonymity attack, password
𝐴𝐸𝑆𝐾 2 = IV2 ⊕ IP guessing, and impersonation attacks [20] are also at a distance.
𝑅𝐶4𝐾 3 = HMAC(SHA256(IV3, nonce,)) Due to the usage of compression and encryption mechanisms
Traffic analysis attack and routing attacks such as spoofed
routing attack, sybil attack, so on could be resisted.
723
IJRITCC | October 2023, Available @ http://www.ijritcc.org
International Journal on Recent and Innovation Trends in Computing and Communication
ISSN: 2321-8169 Volume: 11 Issue: 10
Article Received: 10 August 2023 Revised: 28 September 2023 Accepted: 20 October 2023
___________________________________________________________________________________________________________________
Hybrid algorithm Time for Encryption – Time for Encryption – Time for Encryption –
proposed by in sec (192 bits) in sec (768 bits) in sec (1216 bits)
Subasree et.al. [33] 2.1 2.3 2.1
Kumar et.al. [34] 4 3.2 6
Ren et.al. [35] 1.3 1.8 2.3
Ramaraj et.al. [36] 3 2.7 4.9
Shabana et.al. [37] 0.9 2 3
Proposed 0.188 0.512 0.772
Figure5:Comparison of encryption times of various contributions
725
IJRITCC | October 2023, Available @ http://www.ijritcc.org
International Journal on Recent and Innovation Trends in Computing and Communication
ISSN: 2321-8169 Volume: 11 Issue: 10
Article Received: 10 August 2023 Revised: 28 September 2023 Accepted: 20 October 2023
___________________________________________________________________________________________________________________
4. Conclusion and Future scope reveals its efficacy. Due to the novel Compression-Encryption-
Usage of wireless sensor networks has become enormous due Compression-Encryption (CECE) process, the data is
to their potentiality. However major challenges in encrypted optimally and is attack resistant. The compression
implementing WSNs include security, energy efficiency, QoS, and encryption processes happen very quickly and the data size
Scalability and others. In this paper a novel solution is gets reduced drastically giving scope to faster transmission.
architected to address the security issues while the data is being Due to higher compression ratios, the encryption sounds high
transmitted from sensor nodes to sink node. The major concerns besides preserving the energy efficiency.
while designing a security solution comprise the robustness of
solution, transmission speed and energy constraints. The DAR In this research work we focussed on providing security as well
model detailed exhibits strong encryption as three state of art its impact on preserving the energy efficiency and time
algorithms are used. In addition, the key management also consumption. As a part of future extension, more focus is to be
given on practical implementation of testing the algorithm for
726
IJRITCC | October 2023, Available @ http://www.ijritcc.org
International Journal on Recent and Innovation Trends in Computing and Communication
ISSN: 2321-8169 Volume: 11 Issue: 10
Article Received: 10 August 2023 Revised: 28 September 2023 Accepted: 20 October 2023
___________________________________________________________________________________________________________________
all types of attacks which proves the technique to be highly [11] Shabana Urooj, Sonam Lata, Shahnawaz Ahmad, Shabana
vigorous. The hybrid approach is formulated and verified for Mehfuz and S Kalathil, "Cryptographic Data Security for
textual information such as temperature, humidity, pressure and Reliable Wireless Sensor Network", Alexandria
so on. However, the approach must be equipped for Image Engineering Journal, Volume 72, 2023, Pages 37-50,
related data security. ISSN 1110-0168,
https://doi.org/10.1016/j.aej.2023.03.061.
References: [12] Mahlake, Ntebatseng, Topside E. Mathonsi, Tonderai
Muchenje and Deon Du Plessis. “A Hybrid Algorithm to
[1] Yazdinejad, M.; Nayyeri, F.; Ebadati E., O. M.; Afshari, N.
Enhance Wireless Sensor Networks security on the
(2017): Secure distributed group rekeying scheme for
IoT.” ArXiv abs/2303.14445 (2023):
cluster based wireless sensor networks using multilevel
[13] F. Ullah, T. Mehmood, M. Habib and M. Ibrahim, "SPINS:
encryption. Internet of Things: Novel Advances and
Security Protocols for Sensor Networks", 2009
Envisioned Applications, pp. 127-147.
International Conference on Machine Learning and
[2] National Institute of Standards and Technology (1979).
Computing IPCSIT, vol. 3, 2011. IACSIT Press,
“FIPS-46: Data Encryption Standard (DES).” Revised as
Singapore
FIPS 46-1:1988, FIPS 46-2:1993, FIPS 46-3:1999,
[14] L. Tobarra, D. Cazorla and F. Cuartero, "Formal Analysis
available at http://csrc.nist.gov/publications/fips/fips46-
of Sensor Network Encryption Protocol (SNEP)," 2007
3/fips46-3.pdf
IEEE International Conference on Mobile Adhoc and
[3] Dworkin, M. , Barker, E. , Nechvatal, J. , Foti, J. , Bassham,
Sensor Systems, 2007, pp. 1-6, doi:
L. , Roback, E. and Dray, J. (2001), Advanced Encryption
10.1109/MOBHOC.2007.4428763.
Standard (AES), Federal Inf. Process. Stds. (NIST FIPS),
[15] Sharmila, Kumar, P., Bhushan, S. et al. Secure Key
National Institute of Standards and Technology,
Management and Mutual Authentication Protocol for
Gaithersburg, MD, [online],
Wireless Sensor Network by Linking Edge Devices using
https://doi.org/10.6028/NIST.FIPS.197
Hybrid Approach. Wireless Pers Commun 130, 2935–
[4] De Cannière C (2005) Blowfish. In: van Tilborg HCA (ed)
2957 (2023). https://doi.org/10.1007/s11277-023-10410-
Encyclopedia of Cryptography and Security. Springer,
7
Berlin. https://doi.org/10.1007/0-387-23483-7_34
[16] Sampradeepraj T, V. Anusuya Devi. A Hybrid
[5] Fontaine, C. (2011). RC4. In: van Tilborg, H.C.A., Jajodia,
Cryptography and End-to-end Security Model for
S. (eds) Encyclopedia of Cryptography and Security.
Wireless Sensor Netwoks, 14 June 2022, PREPRINT
Springer, Boston, MA. https://doi.org/10.1007/978-1-
(Version 1) available at Research Square
4419-5906-5_365
[https://doi.org/10.21203/rs.3.rs-1619181/v1]
[6] (2006). The RSA Public-Key Encryption Algorithm. In:
[17] Uras Panahi & Cüneyt Bayılmış,"Enabling secure data
Furht, B. (eds) Encyclopedia of Multimedia. Springer,
transmission for wireless sensor networks based IoT
Boston, MA. https://doi.org/10.1007/0-387-30038-4_206
applications", Ain Shams Engineering Journal, Volume
[7] Hankerson, D., Menezes, A. (2011). Elliptic Curve
14, Issue 2,(2023) 101866, ISSN 2090-4479,
Cryptography. In: van Tilborg, H.C.A., Jajodia, S. (eds)
https://doi.org/10.1016/j.asej.2022.101866.
Encyclopedia of Cryptography and Security. Springer,
[18] Hudhaifa A. Abdulhameed, Ayoob A.
Boston, MA. https://doi.org/10.1007/978-1-4419-5906-
Abdulhameed, Mahmood F. Mosleh, Alhamzah T.
5_245
Mohammad; Lightweight security protocol for WSNs
[8] Here we need to quote first paper
using hybrid cryptography algorithm. AIP Conf. Proc. 2
[9] P.B. Hari, S.N. Singh, Security issues in wireless sensor
December 2022; 2547 (1):
networks: current research and challenges, in: Paper
060006. https://doi.org/10.1063/5.0112665
presented at the 2016 international conference on
[19] Jeong H, Lee S-W, Hussain Malik M, Yousefpoor E,
advances in computing, communication, & automation
Yousefpoor MS, Ahmed OH, Hosseinzadeh M and
(ICACCA) (Spring), 2016.
Mosavi A (2022) SecAODV: A Secure Healthcare
[10] Pooja & R. K. Chauhan (2022) Triple phase hybrid
Routing Scheme Based on Hybrid Cryptography in
cryptography technique in a wireless sensor
Wireless Body Sensor Networks. Front. Med. 9:829055.
network, International Journal of Computers and
doi: 10.3389/fmed.2022.829055
Applications, 44:2, 148-
[20] Kumar, D. A secure and efficient user authentication
153, DOI: 10.1080/1206212X.2019.1710342
protocol for wireless sensor network. Multimed Tools
727
IJRITCC | October 2023, Available @ http://www.ijritcc.org
International Journal on Recent and Innovation Trends in Computing and Communication
ISSN: 2321-8169 Volume: 11 Issue: 10
Article Received: 10 August 2023 Revised: 28 September 2023 Accepted: 20 October 2023
___________________________________________________________________________________________________________________
728
IJRITCC | October 2023, Available @ http://www.ijritcc.org