Open Access
ARTICLE
Secure and Energy Efficient Data Transmission Model for WSN
1 Krishna Engineering College, Ghaziabad, India
2 College of Computer and Information Sciences, Majmaah University, Majmaah, 11952, Saudi Arabia
3 School of Computer Science, University of Petroleum and Energy Studies, Dehradun, India
4 Computer Science Department, Community College, King Saud University, Riyadh, Saudi Arabia
5 Department of Mathematics, Bioinformatics and Computer Applications, MANIT, Bhopal, India
* Corresponding Author: Mohammed Alshehri. Email:
Intelligent Automation & Soft Computing 2021, 27(3), 761-769. https://doi.org/10.32604/iasc.2021.012806
Received 30 August 2020; Accepted 01 November 2020; Issue published 01 March 2021
Abstract
Wireless sensor networks (WSNs) have been used in numerous delicate checking, observation, and surveillance systems that use sensitive data. When a WSN utilizes various data clustering techniques, data is moved to the cluster head (CH) of the corresponding cluster area. Cluster Head further communicates the information to the sink node. In a WSN, a network owner (NO) does not validate a sensor before connecting to the network, so faulty nodes may likely attach to the network to sense the data and attempt to release the information to unauthorized persons. Further, a malicious node may become a mobile node (MN) equipped to send all of a particular cluster area’s perceived data to unauthorized persons. The above-stated problems can be solved by introducing an authentication mechanism into wireless sensor networks. In this mechanism, at whatever point of time a sensor connects with a cluster region, the identity of the sensor must be validated and authenticate to, in turn, validate a mobile node. The perceived data are encrypted and then transmitted through the WSN’s transmission medium. However, the encrypted data are prone to flaws, and attackers can gain access to it illegitimately. In this study, a more energy effective and proficient secured model is proposed called a data transmission model. The technical components, including the data access control mechanism and various private key cryptography algorithms, are compared to choose the optimal energy-efficient cryptography algorithm. The proposed model is verified by experiments for encryption and decryption processes using JAVA language with advanced encryption standard (AES), data encryption standard (DES), Triple DES, Rivest Cipher (RC4), and Blowfish algorithms. The encryption time is determined using mathematical equations. The experiment results showed that the Blowfish algorithm was comparatively more energy effective than the other private key cryptography algorithms.Keywords
Cite This Article
Citations
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.