Secure authentication and key management based on hierarchical enhanced identity based digital signature in heterogeneous wireless sensor network

被引:2
作者
Iqbal, Siddiq [1 ]
Sujatha, B. R. [2 ]
机构
[1] BMS Inst Technol & Management, Dept Elect & Telecommun, Bengaluru 560064, Karnataka, India
[2] Malnad Coll Engn, Dept Elect & Commun, Hassan 573202, Karnataka, India
基金
英国科研创新办公室;
关键词
Adaptive Aquila optimization; Heterogeneous wireless sensor network; Clustering; Security; Homomorphic equilibrium algorithm; Key management; Routing; And network lifetime; SCHEME; EFFICIENT;
D O I
10.1007/s11276-024-03745-x
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays, secured data transmission has become the most desired need for all networks. Ensuring secure authentication and data transmission in the network is a significant and important task in a heterogeneous wireless sensor network (HWSN). Even though several models are adopted in the network, offering secure authentication and sustaining the energy along with key management is still considered a major problem in the research community. Thus, in this paper, a novel energy efficient clustering and routing algorithm is proposed based on the Hierarchical enhanced identity based digital signature (Hierarchical-EIDS) algorithm in HWSN. Initially, an efficient clustering and cluster head (CH) selection are performed using a fuzzy transient search algorithm (FTSA) in order to play a significant role in energy consumption. In the next stage, adaptive Aquila optimization (AAO) has been introduced to define the optimal route for efficient data transmission. To overcome the mutual authentication, bilinear pairings, and public key generation, a Hierarchical-EIDS scheme is applied. Here, the homomorphic equilibrium (HE) algorithm is employed to generate a key for a particular sensor node (SN). The proposed method is implemented in MATLAB, and a comparative analysis has been carried out to determine the efficacy of the model. As a result, the proposed method accomplishes better performance in terms of security strength (0.08 per packet), average energy (AE) consumption (8.861 J), average end-to-end (AEE) delay (0.344 ms), and key length (1900 character). The acquired results outperform the existing models and prove their effectiveness.
引用
收藏
页码:127 / 147
页数:21
相关论文
共 51 条
  • [1] Abdul Basith K., 2021, International Conference on Intelligent and Smart Computing in Data Analytics. ISCDA 2020. Advances in Intelligent Systems and Computing (AISC 1312), P291, DOI 10.1007/978-981-33-6176-8_32
  • [2] Aquila Optimizer: A novel meta-heuristic optimization algorithm
    Abualigah, Laith
    Yousri, Dalia
    Abd Elaziz, Mohamed
    Ewees, Ahmed A.
    Al-qaness, Mohammed A. A.
    Gandomi, Amir H.
    [J]. COMPUTERS & INDUSTRIAL ENGINEERING, 2021, 157 (157)
  • [3] Secure Path Key Establishment Schemes Based on Random Key Management for WSN
    Ahlawat, Priyanka
    Dave, Mayank
    [J]. PROCEEDINGS OF THE NATIONAL ACADEMY OF SCIENCES INDIA SECTION A-PHYSICAL SCIENCES, 2021, 91 (03) : 555 - 567
  • [4] Al-ahwal A., 2015, IOSR J COMPUT ENG, V17, P2278
  • [5] Robust encryption method based on AES-CBC using elliptic curves Diffie-Hellman to secure data in wireless sensor networks
    Ametepe, Adote Francois-Xavier
    Ahouandjinou, Arnaud S. R. M.
    Ezin, Eugene C.
    [J]. WIRELESS NETWORKS, 2022, 28 (03) : 991 - 1001
  • [6] Clustering Based Routing Protocol for Wireless Sensor Networks Using the Concept of Zonal Division of Network Field
    Bagga, Siddhant
    Sharma, Deepak Kumar
    Singh, Krishna Kant
    Singh, Akansha
    [J]. JOURNAL OF SIGNAL PROCESSING SYSTEMS FOR SIGNAL IMAGE AND VIDEO TECHNOLOGY, 2023, 95 (2-3): : 115 - 127
  • [7] Energy-Efficient Clustering and Routing Using ASFO and a Cross-Layer-Based Expedient Routing Protocol for Wireless Sensor Networks
    Cherappa, Venkatesan
    Thangarajan, Thamaraimanalan
    Meenakshi Sundaram, Sivagama Sundari
    Hajjej, Fahima
    Munusamy, Arun Kumar
    Shanmugam, Ramalingam
    [J]. SENSORS, 2023, 23 (05)
  • [8] Building supply chain resilience in the era of COVID-19: An AHP-DEMATEL approach
    Das, Debashree
    Datta, Avik
    Kumar, Patanjal
    Kazancoglu, Yigit
    Ram, Mangey
    [J]. OPERATIONS MANAGEMENT RESEARCH, 2022, 15 (1-2) : 249 - 267
  • [9] Polynomial and matrix based key management security scheme in wireless sensor networks
    Dinker, Aarti Gautam
    Sharma, Vidushi
    [J]. JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2019, 22 (08) : 1563 - 1575
  • [10] Equilibrium optimizer: A novel optimization algorithm
    Faramarzi, Afshin
    Heidarinejad, Mohammad
    Stephens, Brent
    Mirjalili, Seyedali
    [J]. KNOWLEDGE-BASED SYSTEMS, 2020, 191