International Journal of Wireless and Ad Hoc Communication

Journal DOI

https://doi.org/10.54216/IJWAC

Submit Your Paper

2692-4056ISSN (Online)
Full Length Article

International Journal of Wireless and Ad Hoc Communication

Volume 6, Issue 2, PP: 08-17, 2023 | Cite this article as | XML | | Html PDF

An Efficient and Secured Triple-Layered Wireless Sensor Network with Machine Learning Techniques

Reem Atassi   1 * , Aditi Sharma   2

  • 1 Faculty of Computer Information System, Higher Colleges of Technology, UAE - (ratassi@hct.ac.ae)
  • 2 IEEE Senior Member, Post-Doc Fellow, Intelligent Cryptographic systems/IOT-Cloud in Robotics, Nazarbayev University, Kazakhstan ;Department of Computer Science, School of Engineering and Digital Sciences - (aditi11121986@gmail.com)
  • Doi: https://doi.org/10.54216/IJWAC.060201

    Received: September 03, 2022 Accepted: November 18, 2022
    Abstract

    Replacement of physical labor and repetitive tasks by the agents is an attractive issue in the Smart Environment (SE). SE is distinguished by its ability to be controlled from a distance, to facilitate the connection between devices through middleware, to gather and share data from sensors, to improve the intelligence of devices, and to make decisions. To be effective, SE design must make use of information and networks that already exist in the actual world. Effective SE design is complicated by several difficulties, including monitoring, data collecting, assessment, evaluation, prediction of important data, and meaningful presentation. For SE, the most important step is gathering information from a variety of sensors in various locations. Wireless sensor networks provide an underlying architecture for the coordinated collection of data from many sensors that have common characteristics (WSN). An essential aspect of sensor networks is their inability to function in the currently complicated environment for wireless network security. In the realm of remote sensor businesses, cryptology is an essential part of safety measures. Several of the prevalent cryptographic methods have significant flaws that prevent them from being fully reliable. In this paper, we provide a unified, three-stage cryptographic procedure that combines public-key and secret-key techniques for maximum security. Due to consideration of Public-key management and high degree of security, Rijndael Encryption Approach (REA), Horst Feistel's Encryption Approach (HFEA), and the more sophisticated Rivest-Shamir-Adleman (e-RSA). Time spent in both execution and decoding of the suggested approach was utilized to rank the quality of displays. The suggested set of rules uses a single evaluation boundary or computation time, which is different from the methodologies used before. Low Encryption Time (LET) and Low Unscrambling Time (LDT) values of 1.12 and 1.26 were observed on texts ranging in size from 6 to 184 MB, respectively. Comparisons show that the suggested hybrid form is 2.9% more efficient than AES+RSA, 1.36 times more efficient than ECC+RSA+MD-5, 1.36 times more efficient than AES+ECC, and 1.36 times more efficient than AES+ECC+RSA+MD-5.

    Keywords :

    Wireless Sensor Networks (WSN) , Rijndael encryption approach , Horst Feistel&rsquo , s encryption approach , Enhanced RSA

    References

    [1] H. Hu and W. Chang, "On the Mitigation of Controllable Event Triggering Attack in WSNs,"

    2020 29th International Conference on Computer Communications and Networks (ICCCN),

    2020, pp. 1-6, doi: 10.1109/ICCCN49398.2020.9209613.

    [2] R. Chanana, A. K. Singh, R. Killa, S. Agarwal and P. S. Mehra, "Blockchain Based Secure Model

    for Sensor Data in Wireless Sensor Network," 2020 6th International Conference on Signal

    Processing and Communication (ICSC), 2020, pp. 288-293, doi:

    10.1109/ICSC48311.2020.9182776.

    [3] G. Xu, F. Wang, M. Zhang and J. Peng, "Efficient and Provably Secure Anonymous User

    Authentication Scheme for Patient Monitoring Using Wireless Medical Sensor Networks," in

    IEEE Access, vol. 8, pp. 47282-47294, 2020, doi: 10.1109/ACCESS.2020.2978891.

    [4] Y. Zhan, B. Wang and R. Lu, "Cryptanalysis and Improvement of a Pairing-Free Certificateless

    Aggregate Signature in Healthcare Wireless Medical Sensor Networks," in IEEE Internet of

    Things Journal, vol. 8, no. 7, pp. 5973-5984, 1 April1, 2021, doi: 10.1109/JIOT.2020.3033337.

    [5] S. Hassayoun, S. Lahouar and K. Besbes, "SDR Bridge for a Secure Wireless Sensor Network

    (WSN)," 2020 IEEE International Conference on Design & Test of Integrated Micro & Nano-

    Systems (DTS), 2020, pp. 1-5, doi: 10.1109/DTS48731.2020.9196201.

    [6] J. Kar, K. Naik and T. Abdelkader, "A Secure and Lightweight Protocol for Message

    Authentication in Wireless Sensor Networks," in IEEE Systems Journal, vol. 15, no. 3, pp. 3808-

    3819, Sept. 2021, doi: 10.1109/JSYST.2020.3015424.

    [7] K. -A. Shim, "Cryptanalysis of Two Signature Schemes for IoT-Based Mobile Payments and

    Healthcare Wireless Medical Sensor Networks," in IEEE Access, vol. 8, pp. 167203-167208,

    2020, doi: 10.1109/ACCESS.2020.3023093.

    [8] S. Li et al., "A Secure Scheme Based on One-Way Associated Key Management Model in

    Wireless Sensor Networks," in IEEE Internet of Things Journal, vol.s 8, no. 4, pp. 2920-2930, 15

    Feb.15, 2021, doi: 10.1109/JIOT.2020.3021740.

    [9] P. Arpaia, F. Bonavolontà and A. Cioffi, "Security vulnerability in Internet of Things sensor

    networks protected by Advanced Encryption Standard," 2020 IEEE International Workshop on

    Metrology for Industry 4.0 & IoT, 2020, pp. 452-457, doi:

    10.1109/MetroInd4.0IoT48571.2020.9138236.

    [10] An Braeken, "Symmetric Key‐Based Authentication with an Application to Wireless Sensor

    Networks," in IoT Security: Advances in Authentication , Wiley, 2020, pp.65-84, doi:

    10.1002/9781119527978.ch3.

    [11] X. Lin, M. Guizani, X. Du, C. -K. Chu and Y. Yu, "Advances of Security and Privacy Techniques

    in Emerging Wireless Networks," in IEEE Wireless Communications, vol. 27, no. 3, pp. 8-9, June

    2020, doi: 10.1109/MWC.2020.9116080.

    [12] J. Shen, Z. Gui, X. Chen, J. Zhang and Y. Xiang, "Lightweight and Certificateless Multi-Receiver

    Secure Data Transmission Protocol for Wireless Body Area Networks," in IEEE Transactions on

    Dependable and Secure Computing, doi: 10.1109/TDSC.2020.3025288.

    [13] X. Zhu, Y. Li and Y. Lei, "A Forwarding Secrecy Based Lightweight Authenticastion Scheme for

    Intelligent Logistics," 2020 IEEE International Conference on Advances in Electrical Engineering

    and Computer Applications( AEECA), 2020, pp. 356-360, doi:

    10.1109/AEECA49918.2020.9213520.

    [14] Jothi AA, Srinivasan B. “A Hy ri Ciphertext-Policy With Hierarchical Attribute-Based Ring

    Signcryption To Enhance Security An Privacy In Bo y Area etworks”. 2016 International

    Journal of Advanced Research in Computer Science. May 1;7(3).

    [15] Zhong S, Zhong H, Huang X, Yang P, Shi J, Xie L, Wang K. “Connecting Things to Things in

    Physical-World: Security and Privacy Issues in Mobile Sensor Networks. In Security and Privacy

    for Next-Generation Wireless etworks” 2019 (pp. 135-160). Springer, Cham.

    [16] B. T. Asare, K. Quist-Aphetsi and L. Nana, "A Hybrid Lightweight Cryptographic Scheme For

    Securing Node Data Based On The Feistel sCipher And MD5 Hash Algorithm In A Local IoT

    Network," 2019 International Conference on Mechatronics, Remote Ssensing, Information

    Systems and Industrial Information Technologies (ICMRSISIIT), 2019, pp. 1-5, doi:

    10.1109/ICMRSISIIT46373.2020.9405869.

    [17] Pooja, Chauhan RK. “Triple phase hy ri cryptography technique in a wireless sensor network”.

    International Journal of Computers and Applications. 2020 Jan 8:1-6.

    [18] J. Ryu, H. Kim, Y. Lee and D. Won, "Cryptanalysis of Protocol for Heterogeneous Wireless

    Sensor Networks for the Internet of Things Environment," 2020 14th International Conference on

    Ubiquitous Information Management and Communication (IMCOM), 2020, pp. 1-4, doi:

    10.1109/IMCOM48794.2020.9001674.

    [19] V. Gatate and J. Agarkhed, "Spectrum Aware Cryptography (SAC) in Wirelesss Cognitive Radio

    Sensor Networks for Delay Sensitive Applications," 2020 International Conference for Emerging

    Technology (INCET), 2020, pp. 1-7, doi: 10.1109/INCET49848.2020.9154027.

    [20] S. Shin and T. Kwon, "A Privacy-Preserving Authentication, Authorization, and Key Agreement

    Scheme for Wireless Sensor Networks in 5G-Integrated Internet of Things," in IEEE Access, vol.

    8, pp. 67555-67571, 2020, doi: 10.1109/ACCESS.2020.2985719.

    [21] H. A. Babaeer and S. A. Al-Ahmadi, "Efficient and Secure Data Transmission and Sinkhole

    Detection in a Multi-Clustering Wireless Sensor Network Based on Homomorphic Encryption

    and Watermarking," in IEEE Access, vol. 8, pp. 92098-92109, 2020, doi:

    10.1109/ACCESS.2020.2994587.

    [22] S. Reshma, K. Shaila and K. R. Venugopal, "DEAVD - Data Encryption and Aggregation using

    Voronoi Diagram for Wireless Sensor Networks," 2020 Fourth World Conference on Smart

    Trends in Systems, Security and Sustainability (WorldS4), 2020, pp. 635-638, doi:

    10.1109/WorldS450073.2020.9210316.

    [23] C. Meshram, C. Lee, S. G. Meshram and A. Meshram, "OOS-SSS: An Efficient Online/Offline

    Subtree-Based Short Signature Scheme Using Chebyshev Chaotic Maps for Wireless Sensor

    Network," in IEEE Access, vol. 8, pp. 80063-80073, 2020, doi: 10.1109/ACCESS.2020.2991348.

    [24] R. Kumar, S. Tripathi and R. Agrawal, "A Review On Security in Wireless Sensor Network,"

    2020 International Conference on Emerging Smart Computing and Informatics (ESCI), 2020, pp.

    304-308, doi: 10.1109/ESCI48226.2020.9167610.

    [25] M. Griotti, F. Gandino and M. Rebaudengo, "Transitory Master Key Transport Layer Security for

    WSNs," in IEEE Access, vol. 8, pp. 20304-20312, 2020, doi: 10.1109/ACCESS.2020.2969050.

    Cite This Article As :
    Reem Atassi, Aditi Sharma. "An Efficient and Secured Triple-Layered Wireless Sensor Network with Machine Learning Techniques." Full Length Article, Vol. 6, No. 2, 2023 ,PP. 08-17 (Doi   :  https://doi.org/10.54216/IJWAC.060201)
    Reem Atassi, Aditi Sharma. (2023). An Efficient and Secured Triple-Layered Wireless Sensor Network with Machine Learning Techniques. Journal of , 6 ( 2 ), 08-17 (Doi   :  https://doi.org/10.54216/IJWAC.060201)
    Reem Atassi, Aditi Sharma. "An Efficient and Secured Triple-Layered Wireless Sensor Network with Machine Learning Techniques." Journal of , 6 no. 2 (2023): 08-17 (Doi   :  https://doi.org/10.54216/IJWAC.060201)
    Reem Atassi, Aditi Sharma. (2023). An Efficient and Secured Triple-Layered Wireless Sensor Network with Machine Learning Techniques. Journal of , 6 ( 2 ), 08-17 (Doi   :  https://doi.org/10.54216/IJWAC.060201)
    Reem Atassi, Aditi Sharma. An Efficient and Secured Triple-Layered Wireless Sensor Network with Machine Learning Techniques. Journal of , (2023); 6 ( 2 ): 08-17 (Doi   :  https://doi.org/10.54216/IJWAC.060201)
    Reem Atassi, Aditi Sharma, An Efficient and Secured Triple-Layered Wireless Sensor Network with Machine Learning Techniques, Journal of , Vol. 6 , No. 2 , (2023) : 08-17 (Doi   :  https://doi.org/10.54216/IJWAC.060201)