Open Access
ARTICLE
A Hybrid Encryption Algorithm for Security Enhancement of Wireless Sensor Networks: A Supervisory Approach to Pipelines
1 Department of Mathematics and Computer Science, Kharazmi University, Tehran, Iran.
2 Department of Electrical and Computer Engineering, Kharazmi University, Tehran, Iran.
* Corresponding Author: Omid Mahdi Ebadati E. Email: .
Computer Modeling in Engineering & Sciences 2020, 122(1), 323-349. https://doi.org/10.32604/cmes.2020.08079
Received 25 June 2019; Accepted 11 October 2019; Issue published 01 January 2020
Abstract
Transmission pipelines are vulnerable to various accidents and acts of vandalism. Therefore, a reliable monitoring system is needed to secure the transmission pipelines. A wireless sensor network is a wireless network consisting of distributed devices distributed at various distances, which monitors the physical and environmental conditions using sensors. Wireless sensor networks have many uses, including the built-in sensor on the outside of the pipeline or installed to support bridge structures, robotics, healthcare, environmental monitoring, etc. Wireless Sensor networks could be used to monitor the temperature, pressure, leak detection and sabotage of transmission lines. Wireless sensor networks are vulnerable to various attacks. Cryptographic algorithms have a good role in information security for wireless sensor networks. Now, various types of cryptographic algorithms provide security in networks, but there are still some problems. In this research, to improve the power of these algorithms, a new hybrid encryption algorithm for monitoring energy transmission lines and increasing the security of wireless sensor networks is proposed. The proposed hybrid encryption algorithm provides the security and timely transmission of data in wireless sensor networks to monitor the transmission pipelines. The proposed algorithm fulfills three principles of cryptography: integrity, confidentiality and authentication. The details of the algorithm and basic concepts are presented in such a way that the algorithm can be operational.Keywords
Cite This Article
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.