Skip to main content

Hybrid Cryptography Algorithm for Secure Data Communication in WSNs: DECRSA

  • Conference paper
  • First Online:
Congress on Intelligent Systems (CIS 2020)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1334))

Included in the following conference series:

Abstract

In this paper, we propose a dynamic hybrid cryptosystem based on the two famous cryptographic schemes RSA and ECC dedicated to Wireless Sensor Networks (WSNs). Our proposal well adapted to the specific characteristics of the sensors, benefits from the advantages of ECC and improves it by the RSA system to ensure a high security level in WSNs. This hybrid solution overcomes the weakness of existing solutions identified in this work and offers the possibility of adjusting the security level according to the needs of the application. The impact of the Hello flood and the Jamming attacks is highlighted through simulation conducted under the NS3 simulator. Obtained results show that the network lifespan for a WSN based on the famous LEACH routing protocol is on the wane by more than 30% in the presence of Hello flood attacks and decreases by more than 45% when the Jamming attack is launched.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Tehseen, M., Javed, H., Shah, I.H., et al.: A lightweight key negotiation and authentication scheme for large scale WSNs. In: Recent Trends and Advances in Wireless and IoT-enabled Networks, pp. 225–235. Springer, Cham (2019)

    Google Scholar 

  2. Al-Turjman, F.: The road towards plant phenotyping via WSNs: an overview. Comput. Electron. Agric. (2018)

    Google Scholar 

  3. Basha, A.R., Sivakumar, G.: An energy and delay aware optimal data aggregation using three fold algorithm for WSN. Int. J. Bus. Inf. Syst. 33(3), 299–319 (2020)

    Google Scholar 

  4. Lele, A.: Internet of Things (IoT). In: Disruptive Technologies for the Militaries and Security, pp. 187–195. Springer, Singapore (2019)

    Google Scholar 

  5. Kardi, A., Zagrouba, R.: RaCH: a new radial cluster head selection algorithm for wireless sensor networks. Wirel. Personal Commun. pp. 1–14 (2020)

    Google Scholar 

  6. Sharma, K., Sharma, S.: Issues in wireless sensor networks with an emphasis on security. In: International Conference on Communications and Cyber Physical Engineering 2018, pp. 419–425. Springer, Singapore (2018)

    Google Scholar 

  7. Sujanthi, S., Kalyani, S.N.: SecDL: QoS-aware secure deep learning approach for dynamic cluster-based routing in WSN assisted IoT. Wirel. Personal Commun. pp. 1–35 (2020)

    Google Scholar 

  8. Sharma, C., Vaid, R.: Analysis of existing protocols in WSN based on key parameters. In: Proceedings of 2nd International Conference on Communication, Computing and Networking, pp. 165–171. Springer, Singapore (2019)

    Google Scholar 

  9. Farhat, A., Guyeux, C., Makhoul, A., et al.: On the coverage effects in wireless sensor networks based prognostic and health management. Int. J. Sens. Netw. 28(2), 125–138 (2018)

    Google Scholar 

  10. Adil, M., Almaiah, M.A., Omar Alsayed, A., et al.: An Anonymous channel categorization scheme of edge nodes to detect jamming attacks in wireless sensor networks. Sensors 20(8), 2311 (2020)

    Google Scholar 

  11. Rose, S.G.H., Jayasree, T.: Detection of jamming attack using timestamp for WSN. Ad Hoc Netw. 91, 101874 (2019)

    Google Scholar 

  12. Meenalochani, M., Sudha, S.: Jammed node detection and routing in a multihop wireless sensor network using hybrid techniques. Wirel. Personal Commun. 104(2), 663–675 (2019)

    Google Scholar 

  13. Shabana, K., Fida, N., Khan, F., et al.: Security issues and attacks in wireless sensor networks. Int. J. Adv. Res. Comput. Sci. Electron. Eng. (IJARCSEE), 5(7), 81–87 (2016)

    Google Scholar 

  14. Zhu, J., Zou, Y., Zheng, B.: Physical-layer security and reliability challenges for industrial wireless sensor networks. IEEE Access (2017)

    Google Scholar 

  15. Bhavathankar, P., Sarkar, S., Misra, S.: Optimal decision rule-based ex-ante frequency hopping for jamming avoidance in wireless sensor networks. Comput. Netw. (2017)

    Google Scholar 

  16. Pruthi, V., Mittal, K., Sharma, N., et al.: Network layers threats & its countermeasures in WSNs. In: 2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS). p. 156–163, IEEE (2019)

    Google Scholar 

  17. Srinivas, T.A.S., Manivannan, S.S.: Prevention of hello flood attack in IoT using combination of deep learning with improved rider optimization algorithm. Comput. Commun. (2020)

    Google Scholar 

  18. Pawar, M., Agarwal, J.: A literature survey on security issues of WSN and different types of attacks in network. Indian J. Comput. Sci. Eng. 8, 80–83 (2017)

    Google Scholar 

  19. Mugheri, A.A., Siddiqui, M.A., Khoso, M.: Analysis on security methods of wireless sensor network (WSN). Sukkur IBA J. Comput. Math. Sci. 2(1), 52–60 (2018)

    Google Scholar 

  20. Nabavi, S.R., Mousavi, S.M.: A review of distributed dynamic key management schemes in wireless sensor networks. JCP, 13(1), 77–89 (2018)

    Google Scholar 

  21. Hamici, Z.: Towards genetic cryptography for biomedical wireless sensor networks gateways. IEEE J. Biomed. Health Inf. 22(6), 1814–1823 (2018)

    Google Scholar 

  22. Hung, C.-W. Hsu, W.-T.: Power consumption and calculation requirement analysis of AES for WSN IoT. Sensors 18(6), 1675 (2018)

    Google Scholar 

  23. Sasi, S.B., Sivanandam, N., et al.: A survey on cryptography using optimization algorithms in WSNs. Indian J. Sci. Technol. 8(3), 216 (2015)

    Google Scholar 

  24. Senthilkumar, M.K., Senthilkumaran, U.: Review of asymmetric key cryptography in wireless sensor networks. Int. J. Eng. Technol. 8(2), 859–862 (2016)

    Google Scholar 

  25. Leelavathi, G., Shaila, K., Venugopal, K.R.: Design and implementation of montgomery multipliers in RSA cryptography for wireless sensor networks. In: Proceedings of First International Conference on Smart System, Innovations and Computing, pp. 565–574. Springer, Singapore (2018)

    Google Scholar 

  26. Fotohi, R., Firoozi Bari, S., Yusefi, M.: Securing wireless sensor networks against denial‐of‐sleep attacks using RSA cryptography algorithm and interlock protocol. Int. J. Commun. Syst., 33(4), e4234 (2020)

    Google Scholar 

  27. Iqbal, U., Shafi, S.: A provable and secure key exchange protocol based on the elliptical curve Diffe–Hellman for WSN. In: Advances in Big Data and Cloud Computing, pp. 363–372. Springer, Singapore (2019)

    Google Scholar 

  28. Abdullah, K.M., Houssein, E.H., Zayed, H.H.: New security protocol using hybrid cryptography algorithm for WSN. In: 2018 1st International Conference on Computer Applications & Information Security (ICCAIS), pp. 1–6. IEEE (2018)

    Google Scholar 

  29. Singh, P., Chauhan, R.K.: A survey on comparisons of cryptographic algorithms using certain parameters in WSN. Int. J. Electr. Comput. Eng. 7(4) (2017) (2088-8708)

    Google Scholar 

  30. Adnan, S.F.S., Isa, M.A.M., Hashim, H.: Energy analysis of the AA β lightweight asymmetric encryption scheme on an embedded device. In: 2016 IEEE Industrial Electronics and Applications Conference (IEACon), pp. 116–122. IEEE (2016)

    Google Scholar 

  31. Khan, A., Shah, S.W., Ali, A., et al.: Secret key encryption model for Wireless Sensor Networks. In: 2017 14th International Bhurban Conference on Applied Sciences and Technology (IBCAST), pp. 809–815. IEEE (2017)

    Google Scholar 

  32. Da Silva Quirino, G., Moreno, E.D.: Architectural evaluation of algorithms RSA, ECC and MQQ in arm processors. Int. J. Comput. Netw. Commun. 5(2), 153 (2013)

    Google Scholar 

  33. Kardi, A., Zagrouba, R., Alqahtani, M.: Performance evaluation of RSA and elliptic curve cryptography in wireless sensor networks. In: 2018 21st Saudi Computer Society National Computer Conference (NCC), pp. 1–6. IEEE, (2018)

    Google Scholar 

  34. Verma, D., Jain, R., Shrivastava, A.: Performance analysis of cryptographic algorithms RSA and ECC in wireless sensor networks. IUP J. Telecommun. 7(3), 51 (2015)

    Google Scholar 

  35. Sharma, C., et al.: Performance analysis of ECC and RSA for securing CoAP-based remote health monitoring system. In: Ambient Communications and Computer Systems, pp. 615–628. Springer, Singapore (2018)

    Google Scholar 

  36. Menezes, A., Teske, E., Weng, A.: Weak fields for ECC. In: Cryptographers’ Track at the RSA Conference, pp. 366–386. Springer, Berlin, Heidelberg (2004)

    Google Scholar 

  37. Huang, X., Shah, P.G., Sharma, D.: Protecting from attacking the man-in-middle in wireless sensor networks with elliptic curve cryptography key exchange. In: 2010 Fourth International Conference on Network and System Security, pp. 588–593. IEEE (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Amine Kardi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kardi, A., Zagrouba, R. (2021). Hybrid Cryptography Algorithm for Secure Data Communication in WSNs: DECRSA. In: Sharma, H., Saraswat, M., Yadav, A., Kim, J.H., Bansal, J.C. (eds) Congress on Intelligent Systems. CIS 2020. Advances in Intelligent Systems and Computing, vol 1334. Springer, Singapore. https://doi.org/10.1007/978-981-33-6981-8_51

Download citation

Publish with us

Policies and ethics