Simple Key Distribution For Secure And Energy Efficient Communication In Wireless Sensor Networks

Authors

DOI:

https://doi.org/10.22399/ijcesen.1461

Keywords:

WSN, Data storage, data processing, Attacks, Protocols

Abstract

WSNs are used extensively in military and environmental monitoring applications. The appropriate use of limited and insufficient resources is the fundamental problem facing WSNs. Since sensor nodes have limited battery life, efficient use and energy conservation become essential and inevitable problems in prolonging the life of WSNs. Providing security is also crucial because hackers can easily access these networks. WSN security is a crucial component that differs greatly from wired networks' conventional security measures. However, the key objectives of the safe data aggregation strategy are to reduce network data redundancy, minimize the energy consumption of Sensor Nodes (SN), and precisely maintain information quality. This is largely due to encryption standards, which employ shorter keys and require less RAM to store them. Lightweight encryption has been proposed in recent studies as a solution to the resource restriction problem. In order to increase encryption efficiency, the lightweight encryption technique reduces the security margins utilized by conventional cryptographic approaches. The following privacy and energy dependability concerns need to be effectively addressed in order to meet the WSN targets: secure clustering and routing, key management, and robust encryption procedures. Nevertheless, the majority of earlier studies have focused on addressing a single aspect of WSN safety issues. For maximum effectiveness, a protective mechanism must be put in place. A new Dynamic Step-wise Tiny Encryption Algorithm (DSTE) method for secure and energy-efficient communication in WSNs is proposed in this work.

Author Biography

M. Karthik, Vels Institute of Science Technology and Advanced Studies

M.Karthik1*,

 

Research Scholar

 Department of Computer Science and Engineering,

Vels Institute of Science Technology and Advanced Studies (VISTAS), Tamil Nadu, India

References

Khan, S. U., Khan, Z. U., Alkhowaiter, M., Khan, J., & Ullah, S. (2024). Energy-efficient routing protocols for UWSNs: A comprehensive review of taxonomy, challenges, opportunities, future research directions, and machine learning perspectives. Journal of King Saud University-Computer and Information Sciences, 102128.

Shwetha, G. R., & Murthy, V. N. (2024). Hybrid Compressed Sensing and Secure Fault Tolerant Data Aggregation in Wireless Sensor Networks. International Journal of Communication Networks and Information Security, 16(1), 211-227.

Devi, V. A., & Sampradeepraj, T. (2024). End-to-End Self-organizing Intelligent Security Model for Wireless Sensor Network based on a Hybrid (AES–RSA) Cryptography. Wireless Personal Communications, 136(3), 1675-1703.

AlMajed, H. N., & AlMogren, A. S. (2019). Simple and effective secure group communications in dynamic wireless sensor networks. Sensors, 19(8), 1909.

Al-Hejri, I., Azzedin, F., Almuhammadi, S., & Syed, N. F. (2024). Enabling Efficient Data Transmission in Wireless Sensor Networks-Based IoT Applications. Computers, Materials & Continua, 79(3).

Alsumayt, A., Alshammari, M., Alfawaer, Z. M., Al-Wesabi, F. N., El-Haggar, N., Aljameel, S. S., ... & Aldossary, N. (2024). Efficient security level in wireless sensor networks (WSNs) using four-factors authentication over the Internet of Things (IoT). PeerJ Computer Science, 10, e2091.

Dudeja, D., Hera, S. Y., Doohan, N. V., Dubey, N., Mahaveerakannan, R., Ahanger, T. A., ... & Hinga, S. K. (2022). Energy efficient and secure information dissemination in heterogeneous wireless sensor networks using machine learning techniques. Wireless Communications and Mobile Computing, 2022, 2206530.

Chmielowiec, A., Klich, L., & Woś, W. (2024). Energy efficient ECC authenticated key exchange protocol for wireless sensor networks with star topology. Journal of Telecommunications and Information Technology.

Urooj, S., Lata, S., Ahmad, S., Mehfuz, S., & Kalathil, S. (2023). Cryptographic data security for reliable wireless sensor network. Alexandria Engineering Journal, 72, 37-50.

Gupta, S. K., & Singh, S. (2022). Survey on energy efficient dynamic sink optimum routing for wireless sensor network and communication technologies. International Journal of Communication Systems, 35(11), e5194.

Yilmaz, S., & Dener, M. (2024). Security with Wireless Sensor Networks in Smart Grids: A Review. Symmetry, 16(10), 1295.

Tharani, B., & Devi, B. P. (2024). Optimizing Energy Efficiency and Security in Wireless Sensor Networks with a Hybrid HF-ECC. In 2024 10th International Conference on Advanced Computing and Communication Systems (ICACCS).

Cheng, Y., Liu, Y., Zhang, Z., & Li, Y. (2023). An Asymmetric Encryption-Based Key Distribution Method for Wireless Sensor Networks. Sensors, 23(14), 6460.

Shah, S., Munir, A., Waheed, A., Alabrah, A., Mukred, M., Amin, F., ... & Salam, A. (2023). Enhancing security and efficiency in underwater wireless sensor networks: a lightweight key management framework. Symmetry, 15(8), 1484.

Oztoprak, A., Hassanpour, R., Ozkan, A. G., & Oztoprak, K. (2024). A Comparative Study on Key Generation in Wireless Sensor Networks. In 2024 IEEE International Conference on Big Data (BigData).

Hussein, S. M., López Ramos, J. A., & Ashir, A. M. (2022). A secure and efficient method to protect communications and energy consumption in IoT wireless sensor networks. Electronics, 11(17), 2721..

Aqeel, I. (2024). Enhancing Security and Energy Efficiency in Wireless Sensor Networks for IoT Applications. Journal of Electrical Systems, 20(3s), 807-816..

Khashan, O. A., Ahmad, R., & Khafajah, N. M. (2021). An automated lightweight encryption scheme for secure and energy-efficient communication in wireless sensor networks. Ad Hoc Networks, 115, 102448..

Alghamdi, A., Al Shahrani, A. M., AlYami, S. S., Khan, I. R., Sri, P. A., Dutta, P., ... & Venkatareddy, P. (2024). Security and energy efficient cyber-physical systems using predictive modeling approaches in wireless sensor network. Wireless Networks, 30(6), 5851-5866..

Alshammari, M. R., & Elleithy, K. M. (2018). Efficient and secure key distribution protocol for wireless sensor networks. Sensors, 18(10), 3569.

V. Thamilarasi, P. K. Naik, I. Sharma, V. Porkodi, M. Sivaram and M. Lawanyashri, (2024). Quantum Computing - Navigating the Frontier with Shor's Algorithm and Quantum Cryptography, 2024 International Conference on Trends in Quantum Computing and Emerging Business Technologies, Pune, India, 2024, pp. 1-5, doi: 10.1109/TQCEBT59414.2024.10545283.

Ganta, S. R., & Naga Malleswara Rao Nallamothu. (2025). A dynamic integrity and data confidentiality based wireless N2N data communication and security protocol on large networks. International Journal of Computational and Experimental Science and Engineering, 11(1). https://doi.org/10.22399/ijcesen.720

Udayakumar, P., & R. Anandan. (2025). Comparative Study of Lightweight Encryption Algorithms Leveraging Neural Processing Unit for Artificial Internet of Medical Things. International Journal of Computational and Experimental Science and Engineering, 11(1). https://doi.org/10.22399/ijcesen.1259

Thammuluri, R., Gottala Surendra Kumar, Bellamgubba Anoch, Ramesh Babu Mallela, Anuj Rapaka, & Veera V. Rama Rao M. (2025). Enhanced Hybrid Adaptive DNA Compression: Accelerating Genomic Data Compression through Parallel Processing. International Journal of Computational and Experimental Science and Engineering, 11(1). https://doi.org/10.22399/ijcesen.943

C. Kiruthiga, & K. Dharmarajan. (2025). Data-Driven Insights: A Critical Analysis of Farmer Call Centre Data Using Machine Learning Techniques. International Journal of Computational and Experimental Science and Engineering, 11(2). https://doi.org/10.22399/ijcesen.1348

Mohammed F Ibrahim Alsarraj, Aliza Binti Abdul Latif, & Rohaini Binti Ramli. (2025). Human Activity-Based Machine Learning and Deep Learning Techniques. International Journal of Computational and Experimental Science and Engineering, 11(2). https://doi.org/10.22399/ijcesen.1368

J Jeysudha, K. Deiwakumari, C.A. Arun, R. Pushpavalli, Ponmurugan Panneer Selvam, & S.D. Govardhan. (2024). Hybrid Computational Intelligence Models for Robust Pattern Recognition and Data Analysis. International Journal of Computational and Experimental Science and Engineering, 10(4). https://doi.org/10.22399/ijcesen.624

K. Tamilselvan, , M. N. S., A. Saranya, D. Abdul Jaleel, Er. Tatiraju V. Rajani Kanth, & S.D. Govardhan. (2025). Optimizing data processing in big data systems using hybrid machine learning techniques. International Journal of Computational and Experimental Science and Engineering, 11(1). https://doi.org/10.22399/ijcesen.936

Olola, T. M., & Olatunde, T. I. (2025). Artificial Intelligence in Financial and Supply Chain Optimization: Predictive Analytics for Business Growth and Market Stability in The USA. International Journal of Applied Sciences and Radiation Research, 2(1). https://doi.org/10.22399/ijasrar.18

Ibeh, C. V., & Adegbola, A. (2025). AI and Machine Learning for Sustainable Energy: Predictive Modelling, Optimization and Socioeconomic Impact In The USA. International Journal of Applied Sciences and Radiation Research, 2(1). https://doi.org/10.22399/ijasrar.19

Fowowe, O. O., & Agboluaje, R. (2025). Leveraging Predictive Analytics for Customer Churn: A Cross-Industry Approach in the US Market. International Journal of Applied Sciences and Radiation Research, 2(1). https://doi.org/10.22399/ijasrar.20

Downloads

Published

2025-04-02

How to Cite

M. Karthik, & R. Balakrishna. (2025). Simple Key Distribution For Secure And Energy Efficient Communication In Wireless Sensor Networks. International Journal of Computational and Experimental Science and Engineering, 11(2). https://doi.org/10.22399/ijcesen.1461

Issue

Section

Research Article