IDEAS home Printed from https://ideas.repec.org/a/gam/jeners/v16y2022i1p8-d1008800.html
   My bibliography  Save this article

Improved Secure Encryption with Energy Optimization Using Random Permutation Pseudo Algorithm Based on Internet of Thing in Wireless Sensor Networks

Author

Listed:
  • S. Nagaraj

    (Department of CSE, Mallareddy University, Hyderabad 500043, India)

  • Atul B. Kathole

    (Department of Information Technology, Pimpri Chinchwad College of Engineering, Pune 411044, India)

  • Leena Arya

    (Department of CSE, Koneru Lakshmaiah Education Foundation, Vaddeswaram 522502, India)

  • Neha Tyagi

    (Department of IT, G.L Bajaj Institute of Technology & Management, Knowledge Park 3, Greater Noida 201306, India)

  • S. B. Goyal

    (Faculty of Information Technology, City University, Petaling Jaya 46100, Malaysia)

  • Anand Singh Rajawat

    (School of Computer Sciences & Engineering, Sandip University, Nashik 422213, India)

  • Maria Simona Raboaca

    (ICSI Energy Department, National Research and Development Institute for Cryogenics and Isotopic Technologies, 240050 Ramnicu Valcea, Romania)

  • Traian Candin Mihaltan

    (Faculty of Building Services, Technical University of Cluj-Napoca, 40033 Cluj-Napoca, Romania)

  • Chaman Verma

    (Faculty of Informatics, University of Eötvös Loránd, 1053 Budapest, Hungary)

  • George Suciu

    (R&D Department Beia Consult International, 041386 Bucharest, Romania)

Abstract

The use of wireless and Internet of Things (IoT) devices is growing rapidly. Because of this expansion, nowadays, mobile apps are integrated into low-cost, low-power platforms. Low-power, inexpensive sensor nodes are used to facilitate this integration. Given that they self-organize, these systems qualify as IoT-based wireless sensor networks. WSNs have gained tremendous popularity in recent years, but they are also subject to security breaches from multiple entities. WSNs pose various challenges, such as the possibility of numerous attacks, their innate power, and their unfeasibility for use in standard security solutions. In this paper, to overcome these issues, we propose the secure encryption random permutation pseudo algorithm (SERPPA) for achieving network security and energy consumption. SERPPA contains a major entity known as a cluster head responsible for backing up and monitoring the activities of the nodes in the network. The proposed work performance is compared with other work based on secure IoT devices. The calculation metrics taken for consideration are energy, overheads, computation cost, and time consumption. The obtained results show that the proposed SERPPA is very significant in comparison to the existing works, such as GKA (Group Key Agreement) and MPKE (Multipath Key Establishment), in terms of data transfer rate, energy consumption and throughput.

Suggested Citation

  • S. Nagaraj & Atul B. Kathole & Leena Arya & Neha Tyagi & S. B. Goyal & Anand Singh Rajawat & Maria Simona Raboaca & Traian Candin Mihaltan & Chaman Verma & George Suciu, 2022. "Improved Secure Encryption with Energy Optimization Using Random Permutation Pseudo Algorithm Based on Internet of Thing in Wireless Sensor Networks," Energies, MDPI, vol. 16(1), pages 1-16, December.
  • Handle: RePEc:gam:jeners:v:16:y:2022:i:1:p:8-:d:1008800
    as

    Download full text from publisher

    File URL: https://www.mdpi.com/1996-1073/16/1/8/pdf
    Download Restriction: no

    File URL: https://www.mdpi.com/1996-1073/16/1/8/
    Download Restriction: no
    ---><---

    References listed on IDEAS

    as
    1. Vishnu Kumar Kaliappan & Aravind Babu Lalpet Ranganathan & Selvaraju Periasamy & Padmapriya Thirumalai & Tuan Anh Nguyen & Sangwoo Jeon & Dugki Min & Enumi Choi, 2022. "Energy-Efficient Offloading Based on Efficient Cognitive Energy Management Scheme in Edge Computing Device with Energy Optimization," Energies, MDPI, vol. 15(21), pages 1-16, November.
    2. Georgios Kambourakis & Felix Gomez Marmol & Guojun Wang, 2018. "Security and Privacy in Wireless and Mobile Networks," Future Internet, MDPI, vol. 10(2), pages 1-3, February.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. You Zhao & Ye Fan & Xuefen Bian, 2023. "OO-MA-KP-ABE-CRF: Online/Offline Multi-Authority Key-Policy Attribute-Based Encryption with Cryptographic Reverse Firewall for Physical Ability Data," Mathematics, MDPI, vol. 11(15), pages 1-19, July.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.

      Corrections

      All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jeners:v:16:y:2022:i:1:p:8-:d:1008800. See general information about how to correct material in RePEc.

      If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

      If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

      If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

      For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .

      Please note that corrections may take a couple of weeks to filter through the various RePEc services.

      IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.