Key Distribution and Security Frameworks in Wireless Sensor Networks Based on Dynamic Stepwise Tiny Encryption Algorithm
-
https://doi.org/10.14419/2nx9av60
Received date: May 28, 2025
Accepted date: May 31, 2025
Published date: July 8, 2025
-
Wireless Network; Attacks; Protocols; Encryption Algorithm -
Abstract
Data security and user privacy has become increasingly important in our daily lives. Sensitive information is stored in different devices like a smartphone, personal computers, laptops, etc. However, most of the user devices are not adequately protected, and malicious threats against sensitive information are growing rapidly. In this modern era, the realization of the importance of security and privacy has made security a global concern for everyone. The recent years have witnessed that the Internet of Things-(IoT) has become a reality where a number of embedded objects and devices are interconnected to monitor the environment and also it has a potential feature of human-machine interaction. In the next few decades, it is expected that IoT becomes the major driver of productivity and growth in every aspect of human life. The wireless sensor networks-(WSN) act as a backbone for the IoT-ecosystem, where connectivity between several sensor nodes and the internet is established to accomplish different tasks. WSN has multiple security constraints. Therefore, traditional network security mechanisms cannot be directly implemented in the sensor network. It is essential to first understand WSN security constraints for designing an energy-saving security technique. The proposed system provides a novel solution in which a very lightweight encryption technique is applied to ensure multiple-layers of security. The system allows only valid sensor nodes through authentication using signatures. Both forward and backward secrecy is ensured by building a dynamic network topology. The proposed system can be claimed to be cost-efficient. It offers comprehensive security features with lightweight encryption and a hop-2-hop message authentication mechanism in WSN, which does not depend on any complex operations. Therefore, the proposed scheme is energy-efficient, secure, and suitable for time-sensitive real-world applications.
-
References
- Rehman, E., Toure, I. K., Sultan, K., Asif, M., Habib, M., Hasan, N. U., & Abbasi, A. A. (2022). Lightweight Key Management Scheme Using Fuzzy Extractor for Wireless Mobile Sensor Network. Computers, Materials & Continua, 71(1). https://doi.org/10.32604/cmc.2022.021641.
- Iyer, D., & Nambiar, R. (2024). Marketing Innovations in the Digital Era: A Study within the Periodic Series of Multidisciplinary Perspectives. In Digital Marketing Innovations (pp. 12-17). Periodic Series in Multidisciplinary Studies.
- Sah, D. K., & Amgoth, T. (2018). Parametric survey on cross-layer designs for wireless sensor networks. Computer Science Review, 27, 112-134. https://doi.org/10.1016/j.cosrev.2017.12.002.
- Uvarajan, K. P. (2024). Integration of artificial intelligence in electronics: Enhancing smart devices and systems. Progress in Electronics and Com-munication Engineering, 1(1), 7–12. https://doi.org/10.31838/ECE/01.01.02.
- Puri, A., & Lakhwani, K. (2013). Enhanced approach for handwritten text recognition using neural network. International Journal of Communica-tion and Computer Technologies, 1(2), 79-82. https://doi.org/10.31838/ijccts/01.02.02.
- Baggyalakshmi, N., Brindha, G., & Revathi, R. (2024). Dealer Management System. International Academic Journal of Science and Engineer-ing, 11(1), 81–90. https://doi.org/10.9756/IAJSE/V11I1/IAJSE1111.
- Puthal, D., Nepal, S., Ranjan, R., & Chen, J. (2017). A dynamic prime number based efficient security mechanism for big sensing data streams. Journal of Computer and System Sciences, 83(1), 22-42. https://doi.org/10.1016/j.jcss.2016.02.005.
- Baggyalakshmi, N., Anubarathi, M., & Revathi, R. (2023). Pharmacy Management System. International Academic Journal of Innovative Re-search, 10(2), 36–55. https://doi.org/10.9756/IAJIR/V10I2/IAJIR1008.
- Khadidos, A. O., Alhebaishi, N., Khadidos, A. O., Altwijri, M., Fayoumi, A. G., & Ragab, M. (2024). Efficient key distribution for secure and en-ergy-optimized communication in wireless sensor network using bioinspired algorithms. Alexandria Engineering Journal, 92, 63-73. https://doi.org/10.1016/j.aej.2024.02.064.
- Gokhale, A., & Kaur, A. (2024). Language Loss and Cultural Identity in Minority Ethnic Groups. Progression journal of Human Demography and Anthropology, 2(2), 13-16.
- Mohd, A., & Kumar, A. (2016). Novel GPS activation strategy for Minimization of Localization Error with improved Energy Efficiency in Wireless Sensor Networks. International Journal of Research and Development in Applied Science and Engineering (IJRDASE), 9(2).
- Dhileepkumar, T., Jaikumar, M. A., Logesh, V., & Steffigraf, R. (2023). Embedding Image Using Triple Des Algorithm by Steganographic Tech-nique. International Journal of Advances in Engineering and Emerging Technology, 14(1), 112-115.
- Chakrabarty, P., Sarkar, T., Rakhra, M., Jairath, K., & Sharma, V. (2024, May). Enhanced Data Security Framework Using Lightweight Cryptog-raphy and Multi-Level Encryption. In 2024 International Conference on Communication, Computer Sciences and Engineering (IC3SE) (pp. 720-725). IEEE. https://doi.org/10.1109/IC3SE62002.2024.10593191.
- Kulkarni, S., & Nair, H. (2024). The Role of Medical Terminology in Public Health Surveillance and Pandemic Preparedness. Global Journal of Medical Terminology Research and Informatics, 2(3), 5-7.
- Sutradhar, S., Karforma, S., Bose, R., & Roy, S. (2023). A dynamic stepwise tiny encryption algorithm with fruit fly optimization for quality of service improvement in healthcare. Healthcare Analytics, 3, 100177. https://doi.org/10.1016/j.health.2023.100177.
- Jain, S., & Suresh, N. (2024). Membrane Technologies in Juice Clarification: Comparative Study of UF and NF Systems. Engineering Perspectives in Filtration and Separation, 2(3), 1-4.
- Thakur, G., Prajapat, S., Kumar, P., Das, A. K., & Shetty, S. (2023). An efficient lightweight provably secure authentication protocol for patient monitoring using wireless medical sensor networks. IEEE Access, 11, 114662-114679. https://doi.org/10.1109/ACCESS.2023.3325130.
- Adil, M., Almaiah, M. A., Omar Alsayed, A., & Almomani, O. (2020). An anonymous channel categorization scheme of edge nodes to detect jam-ming attacks in wireless sensor networks. Sensors, 20(8), 2311. https://doi.org/10.3390/s20082311.
- Prasath, C. A. (2024). Cutting-edge developments in artificial intelligence for autonomous systems. Innovative Reviews in Engineering and Sci-ence, 1(1), 11-15. https://doi.org/10.31838/INES/01.01.03.
- Castiñeira, M., & Francis, K. (2025). Model-driven design approaches for embedded systems development: A case study. SCCTS Journal of Em-bedded Systems Design and Applications, 2(2), 30–38.
- Surendar, A. (2025). Hybrid Renewable Energy Systems for Islanded Microgrids: A Multi-Criteria Optimization Approach. National Journal of Renewable Energy Systems and Innovation, 27-37.
-
Downloads
-
How to Cite
Karthik, M., & Balakrishna , R. . (2025). Key Distribution and Security Frameworks in Wireless Sensor Networks Based on Dynamic Stepwise Tiny Encryption Algorithm. International Journal of Basic and Applied Sciences, 14(SI-1), 289-296. https://doi.org/10.14419/2nx9av60
