Open Access Journal

ISSN : 2394 - 6849 (Online)

International Journal of Engineering Research in Electronics and Communication Engineering(IJERECE)

Monthly Journal for Electronics and Communication Engineering

Open Access Journal

International Journal of Engineering Research in Electronics and Communication Engineering(IJERECE)

Monthly Journal for Electronics and Communication Engineering

ISSN : 2394-6849 (Online)

Proficient and Safe Token with Secret and Public Keys Sharing Algorithm for Preventing Cryptographic Key Leakage in Wireless Sensor Network

Author : R.Nesamalar 1 Dr.K.Ravikumar 2

Date of Publication :15th September 2022

Abstract: Sensor devices in the Wireless Sensor Network (WSN) are commonly subjected to various forms of attacks, such as flood attacks, eavesdropping attacks, etc. When an attacker compromises a sensor device, the sensor device's data contents become non-confidential and are grabbed by the attacker, putting the entire network at risk. As a result, to prevent key leaks in WSN networks, this paper proposes a Token with Secret and Public Keys Sharing (TSP-KS) algorithm. In the existence of attackers, cryptography is used to provide secure communication. A traditional public-key cryptosystem is appropriate in cryptography since it does not need the sender and receiver to supply the same secret to communicate without risk. However, they frequently rely on complex mathematical calculations, making them far less capable than equivalent symmetric-key cryptosystems. The high cost of encrypting long messages with public-key cryptography could be problematic in a wide range of applications. A hybrid system deals with it using a combination of the two. In WSN, Admin creates a token, a secret key, a public key, and a private key. Here, the token is used for access control in sensor devices and the administrator, the secret and public keys are utilized for packet encryption in sensor devices and the base station, and the private key is utilized for decryption in the administrator. Admin shares token with secret and public key for sensor devices and base station for encryption purposes. As a result, the TSP-KS algorithm was utilized to securely share these token with secret and public keys for sensor devices and base station over a distributed way. Experimental results demonstrate that the TSP-KS algorithm securely shares a token with a secret and public key.

Reference :

    1. Abdulkarem, M., Samsudin, K., Rokhani, F. Z., & A Rasid, M. F. (2020). Wireless sensor network for structural health monitoring: a contemporary review of technologies, challenges, and future direction. Structural Health Monitoring, 19(3), 693-735.
    2. Riaz, M. N., Buriro, A., & Mahboob, A. (2018). Classification of attacks on wireless sensor networks: A survey. International Journal of Wireless and Microwave Technologies, 8(6), 15-39.
    3. Radhappa, H., Pan, L., Xi Zheng, J., & Wen, S. (2018). Practical overview of security issues in wireless sensor network applications. International journal of computers and applications, 40(4), 202-213.
    4. Mirvaziri, H., & Hosseini, R. (2020). A novel method for key establishment based on symmetric cryptography in hierarchical wireless sensor networks. Wireless Personal Communications, 112(4), 2373-2391.
    5. Bashaa, M. H., Al-Alak, S. M., & Idrees, A. K. (2019, April). Secret key generation in wireless sensor network using public key encryption. In Proceedings of the international conference on information and communication technology (pp. 106-112).
    6. Prakash, S., & Rajput, A. (2018). Hybrid cryptography for secure data communication in wireless sensor networks. In Ambient Communications and Computer Systems (pp. 589-599). Springer, Singapore.
    7.  Luo, M., Luo, Y., Wan, Y., & Wang, Z. (2018). Secure and efficient access control scheme for wireless sensor networks in the cross-domain context of the IoT. Security and Communication Networks, 2018.
    8. Haseeb, K., Islam, N., Almogren, A., Din, I. U., Almajed, H. N., & Guizani, N. (2019). Secret sharing-based energy-aware and multi-hop routing protocol for IoT based WSNs. IEEE Access, 7, 79980-79988.
    9. Fotohi, R., Firoozi Bari, S., & Yusefi, M. (2020). Securing wireless sensor networks against denial‐of‐sleep attacks using RSA cryptography algorithm and interlock protocol. International Journal of Communication Systems, 33(4), e4234.
    10. Qazi, R., Qureshi, K. N., Bashir, F., Islam, N. U., Iqbal, S., & Arshad, A. (2021). Security protocol using elliptic curve cryptography algorithm for wireless sensor networks. Journal of Ambient Intelligence and Humanized Computing, 12(1), 547-566
    11. Ali, S., Humaria, A., Ramzan, M. S., Khan, I., Saqlain, S. M., Ghani, A., ... & Alzahrani, B. A. (2020). An efficient cryptographic technique using modified Diffie–Hellman in wireless sensor networks. International journal of distributed sensor networks, 16(6), 1550147720925772. 
    12. Mohindru, V., Singh, Y., & Bhatt, R. (2020). Hybrid cryptography algorithm for securing wireless sensor networks from Node Clone Attack. Recent Advances in Electrical & Electronic Engineering (Formerly Recent Patents on Electrical & Electronic Engineering), 13(2), 251-259.
    13. Lin, Y., Zhu, H., Xu, G., & Xu, G. (2022). Hierarchical secret sharing scheme for WSN based on linear homogeneous recurrence relations. International Journal of Distributed Sensor Networks, 18(3), 15501329221088740.
    14. Mahalat, M. H., Karmakar, D., Mondal, A., & Sen, B. (2021). PUF based Secure and Lightweight Authentication and Key-Sharing Scheme for Wireless Sensor Network. ACM Journal on Emerging Technologies in Computing Systems (JETC), 18(1), 1-23. 
    15. Liu, X., Ma, W., Yu, J., Yu, K., & Xiang, J. (2021, June). A Secret-Sharing-based Security Data Aggregation Scheme in Wireless Sensor Networks. In International Conference on Wireless Algorithms, Systems, and Applications (pp. 303-313). Springer, Cham. 
    16. Iqbal, U., & Mir, A. H. (2020). Secure and practical access control mechanism for WSN with node privacy. Journal of King Saud University-Computer and Information Sciences.
    17. Liu, Z., Ma, Q., Liu, W., Sheng, V. S., Zhang, L., & Liu, G. (2018). Access control model based on time synchronization trust in wireless sensor networks. Sensors, 18(7), 2107.
    18. Hamsha, K., & Nagaraja, G. S. (2019, February). Threshold cryptography based light weight key management technique for hierarchical WSNs. In international conference on ubiquitous communications and network computing (pp. 188-197). Springer, Cham.
    19. Kardi, A., Zagrouba, R., & Alqahtani, M. (2018, April). Performance evaluation of RSA and elliptic curve cryptography in wireless sensor networks. In 2018 21st Saudi Computer Society National Computer Conference (NCC) (pp. 1-6). IEEE.
    20. W. J. Buchanan, D. Lanc, E. Ukwandu, L. Fan, G. Russell and O. Lo, “The Future Internet: A World of Secret Share”, Future Internet 2015, 7, 445-464, DOI:10.3390/fi7040445.

Recent Article