A Secure Framework based On Hybrid Cryptographic Scheme and Trusted Routing to Enhance the QoS of a WSN
Received: 24 April 2024 | Revised: 21 May 2024 and 22 May2024 | Accepted: 25 May 2024 | Online: 26 June 2024
Corresponding author: Mohammad Sirajuddin
Abstract
Achieving Quality of Service (QoS) in Wireless Sensor Networks (WSNs) is challenging, due to their dynamic nature, and many parameters must be taken into account. The main objective of this work is to propose a hybrid cryptographic system with trust-based routing to improve the QoS. This study considers ways to improve QoS while maintaining security. To enhance the performance of the WSN, a framework that uses a hybrid cryptographic system based on a logistic map and the trust-based routing protocol CTBSR that can recognize and counteract a variety of security threats is presented. The findings of this study support the claim that the proposed framework ensures better security than the existing approaches in terms of confidentiality, integrity, and authentication. The performance of the framework introduced is evaluated by employing the NS2 simulator.
Keywords:
QoS, WSN, cryptographic scheme, trusted routing, energy consumption reductionDownloads
References
K. Akkaya and M. Younis, "Energy-aware routing to a mobile gateway in wireless sensor networks," in IEEE Global Telecommunications Conference Workshops, Dallas, TX, USA, Dec. 2004, pp. 16–21.
C.-H. Cheng, H. Liang, Y.-F. Huang, and T.-Y. Wu, "Energy Efficient Block Division Methods for Data Aggregation in Wireless Sensor Networks," in Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, Palermo, Italy, Jul. 2012, pp. 454–458.
S. Sinha and S. Aggarwal, "Cryptographic Algorithms for Security in Wireless Sensor Networks," in 3rd International Conference on Intelligent Engineering and Management, London, United Kingdom, Apr. 2022, pp. 111–117.
K. Bok, Y. Lee, J. Park, and J. Yoo, "An Energy-Efficient Secure Scheme in Wireless Sensor Networks," Journal of Sensors, vol. 2016, no. 1, 2016, Art. no. 1321079.
T. Khan and K. Singh, "TASRP: a trust aware secure routing protocol for wireless sensor networks," International Journal of Innovative Computing and Applications, vol. 12, no. 2–3, pp. 108–122, Jan. 2021.
M. E. Al-Sadoon, A. Jedidi, and H. Al-Raweshidy, "Dual-Tier Cluster-Based Routing in Mobile Wireless Sensor Network for IoT Application," IEEE Access, vol. 11, pp. 4079–4094, 2023.
W. Wang, H. Xu, M. Alazab, T. R. Gadekallu, Z. Han, and C. Su, "Blockchain-Based Reliable and Efficient Certificateless Signature for IIoT Devices," IEEE Transactions on Industrial Informatics, vol. 18, no. 10, pp. 7059–7067, Oct. 2022.
H. Xiong et al., "On the Design of Blockchain-Based ECDSA With Fault-Tolerant Batch Verification Protocol for Blockchain-Enabled IoMT," IEEE Journal of Biomedical and Health Informatics, vol. 26, no. 5, pp. 1977–1986, May 2022.
Ch. Rupa and D. J. Kumari, "Network Based Adaptation of Block Chain Technology," International Journal of Innovative Technology and Exploring Engineering, vol. 8, no. 9, pp. 1588–1591, Jul. 2019.
V. Nikhila and Ch. Rupa, "Intensifying Multimedia Information Security Using Comprehensive Cipher," in Innovations in Power and Advanced Computing Technologies (i-PACT), Vellore, India, Mar. 2019, vol. 1, pp. 1–4.
S. Gadamsetty, R. Ch, A. Ch, C. Iwendi, and T. R. Gadekallu, "Hash-Based Deep Learning Approach for Remote Sensing Satellite Imagery Detection," Water, vol. 14, no. 5, Jan. 2022, Art. no. 707.
S. Juneja, G. Dhiman, S. Kautish, W. Viriyasitavat, and K. Yadav, "A Perspective Roadmap for IoMT-Based Early Detection and Care of the Neural Disorder, Dementia," Journal of Healthcare Engineering, vol. 2021, no. 1, 2021, Art. no. 6712424.
C. Iwendi, P. K. R. Maddikunta, T. R. Gadekallu, K. Lakshmanna, A. K. Bashir, and Md. J. Piran, "A metaheuristic optimization approach for energy efficiency in the IoT networks," Software: Practice and Experience, vol. 51, no. 12, pp. 2558–2571, 2021.
D. K. Bangotra, Y. Singh, A. Selwal, N. Kumar, and P. K. Singh, "A Trust Based Secure Intelligent Opportunistic Routing Protocol for Wireless Sensor Networks," Wireless Personal Communications, vol. 127, no. 2, pp. 1045–1066, Nov. 2022.
R. Sinde, F. Begum, K. Njau, and S. Kaijage, "Refining Network Lifetime of Wireless Sensor Network Using Energy-Efficient Clustering and DRL-Based Sleep Scheduling," Sensors, vol. 20, no. 5, Jan. 2020, Art. no. 1540.
Q. Shi, L. Qin, Y. Ding, B. Xie, J. Zheng, and L. Song, "Information-Aware Secure Routing in Wireless Sensor Networks," Sensors, vol. 20, no. 1, Jan. 2020, Art. no. 165.
S. Kamel, A. A. Qahtani, and A. S. M. Al-Shahrani, "Particle Swarm Optimization for Wireless Sensor Network Lifespan Maximization," Engineering, Technology & Applied Science Research, vol. 14, no. 2, pp. 13665–13670, Apr. 2024.
S. Panbude, B. Iyer, A. B. Nandgaonkar, and P. S. Deshpande, "DFPC: Dynamic Fuzzy-based Primary User Aware clustering for Cognitive Radio Wireless Sensor Networks," Engineering, Technology & Applied Science Research, vol. 13, no. 6, pp. 12058–12067, Dec. 2023.
S. Panbude, P. Deshpande, B. Iyer, and A. B. Nandgaonkar, "Enhancing Cognitive Radio WSN Communication through Cluster Head Selection Technique," Engineering, Technology & Applied Science Research, vol. 14, no. 2, pp. 13347–13351, Apr. 2024.
Downloads
How to Cite
License
Copyright (c) 2024 Mohammad Sirajuddin, Chittibabu Ravela, S. Rama Krishna, Shaik Khaleel Ahamed, S. Karimulla Basha, N. Md. Jubair Basha
This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain the copyright and grant the journal the right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) after its publication in ETASR with an acknowledgement of its initial publication in this journal.