Measurement: Sensors (Jun 2024)

Exceptional key based node validation for secure data transmission using asymmetric cryptography in wireless sensor networks

  • Bhanu Priyanka Valluri,
  • Nitin Sharma

Journal volume & issue
Vol. 33
p. 101150

Abstract

Read online

Wireless Sensor Networks (WSNs) are networks of low-power, low-cost devices that may gather data for many applications. These networks rely heavily on Medium Access Control (MAC) features for administration due to the critical roles of energy and security. Due to the low resources of the nodes, traditional security methods are unsuitable for WSNs, hence lightweight cryptographic algorithms are required to ensure adequate security. Nodes, which are communication devices in WSNs, are used. Data trust, data availability, authentication, and data integrity are just some of the security concerns raised by the deployment of such nodes. To address these concerns and ensure secure data transmission, cryptographic methods should be utilized. Keeping information transmitted over a wireless sensor network secure is complicated by the technology's increasing popularity. The problem arises because of the constraints imposed by finite supplies of energy, data storage, and processing power. This research offers a method for node validations in WSN for secure data transmission, taking into account the characteristics of wireless sensor nodes where the energy consumption for transferring data is substantially larger than that for calculation. Cryptography keys will be used for node authentication and for secure data transmission. Messages sent between nodes in a WSN must be encrypted, and the network must keep a key for encryption and decryption. As a result, Key management plays a crucial role in ensuring WSN safety. Each node will be allocated with a key set which is used for node validation, encryption and decryption. Secure and efficient data transmission in WSN relies on obtaining such a key arrangement in a constrained resource setting. Plaintext assaults, attacks using brute force, attacks via side channels, and computational complexity are just a few of the security problems that plague today's algorithms. This research presents a scheme for protecting sensor data during transmission and after it has been received by nodes. This research proposes a Exceptional Key based Node Validation for Secure Data Transmission using Asymmetric Cryptography (EKbNV-SDT-AC) model. This research performs node validation, encryption and decryption of data in the WSN to securely transmit the data from source to destination. The proposed model when compared with the traditional model performs better in data node validation and secure data transmission.

Keywords