Abstract
In this paper, we propose a dynamic hybrid cryptosystem based on the two famous cryptographic schemes RSA and ECC dedicated to Wireless Sensor Networks (WSNs). Our proposal well adapted to the specific characteristics of the sensors, benefits from the advantages of ECC and improves it by the RSA system to ensure a high security level in WSNs. This hybrid solution overcomes the weakness of existing solutions identified in this work and offers the possibility of adjusting the security level according to the needs of the application. The impact of the Hello flood and the Jamming attacks is highlighted through simulation conducted under the NS3 simulator. Obtained results show that the network lifespan for a WSN based on the famous LEACH routing protocol is on the wane by more than 30% in the presence of Hello flood attacks and decreases by more than 45% when the Jamming attack is launched.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Tehseen, M., Javed, H., Shah, I.H., et al.: A lightweight key negotiation and authentication scheme for large scale WSNs. In: Recent Trends and Advances in Wireless and IoT-enabled Networks, pp. 225–235. Springer, Cham (2019)
Al-Turjman, F.: The road towards plant phenotyping via WSNs: an overview. Comput. Electron. Agric. (2018)
Basha, A.R., Sivakumar, G.: An energy and delay aware optimal data aggregation using three fold algorithm for WSN. Int. J. Bus. Inf. Syst. 33(3), 299–319 (2020)
Lele, A.: Internet of Things (IoT). In: Disruptive Technologies for the Militaries and Security, pp. 187–195. Springer, Singapore (2019)
Kardi, A., Zagrouba, R.: RaCH: a new radial cluster head selection algorithm for wireless sensor networks. Wirel. Personal Commun. pp. 1–14 (2020)
Sharma, K., Sharma, S.: Issues in wireless sensor networks with an emphasis on security. In: International Conference on Communications and Cyber Physical Engineering 2018, pp. 419–425. Springer, Singapore (2018)
Sujanthi, S., Kalyani, S.N.: SecDL: QoS-aware secure deep learning approach for dynamic cluster-based routing in WSN assisted IoT. Wirel. Personal Commun. pp. 1–35 (2020)
Sharma, C., Vaid, R.: Analysis of existing protocols in WSN based on key parameters. In: Proceedings of 2nd International Conference on Communication, Computing and Networking, pp. 165–171. Springer, Singapore (2019)
Farhat, A., Guyeux, C., Makhoul, A., et al.: On the coverage effects in wireless sensor networks based prognostic and health management. Int. J. Sens. Netw. 28(2), 125–138 (2018)
Adil, M., Almaiah, M.A., Omar Alsayed, A., et al.: An Anonymous channel categorization scheme of edge nodes to detect jamming attacks in wireless sensor networks. Sensors 20(8), 2311 (2020)
Rose, S.G.H., Jayasree, T.: Detection of jamming attack using timestamp for WSN. Ad Hoc Netw. 91, 101874 (2019)
Meenalochani, M., Sudha, S.: Jammed node detection and routing in a multihop wireless sensor network using hybrid techniques. Wirel. Personal Commun. 104(2), 663–675 (2019)
Shabana, K., Fida, N., Khan, F., et al.: Security issues and attacks in wireless sensor networks. Int. J. Adv. Res. Comput. Sci. Electron. Eng. (IJARCSEE), 5(7), 81–87 (2016)
Zhu, J., Zou, Y., Zheng, B.: Physical-layer security and reliability challenges for industrial wireless sensor networks. IEEE Access (2017)
Bhavathankar, P., Sarkar, S., Misra, S.: Optimal decision rule-based ex-ante frequency hopping for jamming avoidance in wireless sensor networks. Comput. Netw. (2017)
Pruthi, V., Mittal, K., Sharma, N., et al.: Network layers threats & its countermeasures in WSNs. In: 2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS). p. 156–163, IEEE (2019)
Srinivas, T.A.S., Manivannan, S.S.: Prevention of hello flood attack in IoT using combination of deep learning with improved rider optimization algorithm. Comput. Commun. (2020)
Pawar, M., Agarwal, J.: A literature survey on security issues of WSN and different types of attacks in network. Indian J. Comput. Sci. Eng. 8, 80–83 (2017)
Mugheri, A.A., Siddiqui, M.A., Khoso, M.: Analysis on security methods of wireless sensor network (WSN). Sukkur IBA J. Comput. Math. Sci. 2(1), 52–60 (2018)
Nabavi, S.R., Mousavi, S.M.: A review of distributed dynamic key management schemes in wireless sensor networks. JCP, 13(1), 77–89 (2018)
Hamici, Z.: Towards genetic cryptography for biomedical wireless sensor networks gateways. IEEE J. Biomed. Health Inf. 22(6), 1814–1823 (2018)
Hung, C.-W. Hsu, W.-T.: Power consumption and calculation requirement analysis of AES for WSN IoT. Sensors 18(6), 1675 (2018)
Sasi, S.B., Sivanandam, N., et al.: A survey on cryptography using optimization algorithms in WSNs. Indian J. Sci. Technol. 8(3), 216 (2015)
Senthilkumar, M.K., Senthilkumaran, U.: Review of asymmetric key cryptography in wireless sensor networks. Int. J. Eng. Technol. 8(2), 859–862 (2016)
Leelavathi, G., Shaila, K., Venugopal, K.R.: Design and implementation of montgomery multipliers in RSA cryptography for wireless sensor networks. In: Proceedings of First International Conference on Smart System, Innovations and Computing, pp. 565–574. Springer, Singapore (2018)
Fotohi, R., Firoozi Bari, S., Yusefi, M.: Securing wireless sensor networks against denial‐of‐sleep attacks using RSA cryptography algorithm and interlock protocol. Int. J. Commun. Syst., 33(4), e4234 (2020)
Iqbal, U., Shafi, S.: A provable and secure key exchange protocol based on the elliptical curve Diffe–Hellman for WSN. In: Advances in Big Data and Cloud Computing, pp. 363–372. Springer, Singapore (2019)
Abdullah, K.M., Houssein, E.H., Zayed, H.H.: New security protocol using hybrid cryptography algorithm for WSN. In: 2018 1st International Conference on Computer Applications & Information Security (ICCAIS), pp. 1–6. IEEE (2018)
Singh, P., Chauhan, R.K.: A survey on comparisons of cryptographic algorithms using certain parameters in WSN. Int. J. Electr. Comput. Eng. 7(4) (2017) (2088-8708)
Adnan, S.F.S., Isa, M.A.M., Hashim, H.: Energy analysis of the AA β lightweight asymmetric encryption scheme on an embedded device. In: 2016 IEEE Industrial Electronics and Applications Conference (IEACon), pp. 116–122. IEEE (2016)
Khan, A., Shah, S.W., Ali, A., et al.: Secret key encryption model for Wireless Sensor Networks. In: 2017 14th International Bhurban Conference on Applied Sciences and Technology (IBCAST), pp. 809–815. IEEE (2017)
Da Silva Quirino, G., Moreno, E.D.: Architectural evaluation of algorithms RSA, ECC and MQQ in arm processors. Int. J. Comput. Netw. Commun. 5(2), 153 (2013)
Kardi, A., Zagrouba, R., Alqahtani, M.: Performance evaluation of RSA and elliptic curve cryptography in wireless sensor networks. In: 2018 21st Saudi Computer Society National Computer Conference (NCC), pp. 1–6. IEEE, (2018)
Verma, D., Jain, R., Shrivastava, A.: Performance analysis of cryptographic algorithms RSA and ECC in wireless sensor networks. IUP J. Telecommun. 7(3), 51 (2015)
Sharma, C., et al.: Performance analysis of ECC and RSA for securing CoAP-based remote health monitoring system. In: Ambient Communications and Computer Systems, pp. 615–628. Springer, Singapore (2018)
Menezes, A., Teske, E., Weng, A.: Weak fields for ECC. In: Cryptographers’ Track at the RSA Conference, pp. 366–386. Springer, Berlin, Heidelberg (2004)
Huang, X., Shah, P.G., Sharma, D.: Protecting from attacking the man-in-middle in wireless sensor networks with elliptic curve cryptography key exchange. In: 2010 Fourth International Conference on Network and System Security, pp. 588–593. IEEE (2010)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Kardi, A., Zagrouba, R. (2021). Hybrid Cryptography Algorithm for Secure Data Communication in WSNs: DECRSA. In: Sharma, H., Saraswat, M., Yadav, A., Kim, J.H., Bansal, J.C. (eds) Congress on Intelligent Systems. CIS 2020. Advances in Intelligent Systems and Computing, vol 1334. Springer, Singapore. https://doi.org/10.1007/978-981-33-6981-8_51
Download citation
DOI: https://doi.org/10.1007/978-981-33-6981-8_51
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-33-6980-1
Online ISBN: 978-981-33-6981-8
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)