Secured wireless sensor networks using hybrid Rivest Shamir Adleman with ant lion optimization algorithm

被引:2
|
作者
Almuzaini, Khalid K. [1 ]
Dubey, Rachana [2 ]
Gandhi, Charu [3 ]
Taram, Manish [2 ]
Soni, Anita [4 ]
Sharma, Seema [5 ]
Sanchez-Chero, Manuel [6 ]
Carrion-Barco, Gilberto [7 ]
机构
[1] King Abdulaziz City Sci & Technol KACST, Cyber Secur Inst, Riyadh 11442, Saudi Arabia
[2] Pandit S N Shukla Univ PTSNS, Dept Comp Sci, Shahdol, Madhya Pradesh, India
[3] Jaypee Inst Informat Technol, Dept CSE & IT, Noida, Uttar Pradesh, India
[4] IES Univ, Dept Comp Sci Engn, Bhopal, Madhya Pradesh, India
[5] Manav Rachna Int Inst Res & Studies, Faridabad 121004, Haryana, India
[6] Univ Nacl Frontera, Fac Ingn Ind Alimentarias & Biotecnol, Sullana, Peru
[7] Univ Nacl Pedro Ruiz Gallo, Dept Academ Comp & Elect, Lambayeque, Peru
关键词
Ant lion optimization algorithm; Hybrid Rivest-Shamir-Adleman algorithm; Wireless sensor network; Encryption;
D O I
10.1007/s11276-023-03372-y
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The concept of security is quite broad and touches the lives of one million people on a daily basis. Those individuals who depend on networks for activities such as banking, shopping, and filing their tax returns may soon face a potentially significant challenge in the form of network security, which will need to be handled in the not-too-distant future. The solution that is being recommended is a combination of two algorithms: The Hybrid Rivest-Shamir-Adleman (RSA) algorithm and the Ant Lion Optimization Algorithm. There have been two noteworthy developments in the requirements for information security inside a wireless sensor network over the course of the last several decades. First, prior to the broad use of data processing equipment, the security of information that was regarded useful to a wireless sensor network was largely supplied by physical and administrative precautions. This was the case even after the widespread use of data processing equipment. Hash functions are used by these designs whenever Rebalanced RSA is used to encrypt a message. This helps to guarantee that the integrity of the message is not compromised in any way. It has been found out that this novel method is susceptible to attacks based on selected ciphertext as well as adaptive attacks based on chosen ciphertext. A second strategy, which entails converting the ciphertext into binary format, is also one of the options that are being investigated. The binary format is further compressed and coded, which makes it resistant to a variety of attacks, including adaptive chosen ciphertext assaults, selected ciphertext assaults, and other assaults. To get started, a thorough study project on mapping is carried out in order to establish the mapping of assaults and counterattacks that would be most effective. A brand-new index that goes by the name "Threat Severity Index" (TSI) has been developed with the intention of determining how secure each individual system is on the whole. In addition, the decryption performance of RSA-type cryptosystems is researched and compared with that of other RSA-type cryptosystems in order to identify which cryptosystem provides the quickest decryption time. Last but not least, an overall rating of each system is provided, taking into account both its speed and its level of safety.
引用
收藏
页码:5977 / 5995
页数:19
相关论文
共 50 条
  • [1] Hybrid Algorithm using Rivest-Shamir-Adleman and Elliptic Curve Cryptography for Secure Email Communication
    Assa-Agyei, Kwame
    Owa, Kayode
    Al-Hadhrami, Tawfik
    Olajide, Funminiyi
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2024, 15 (04) : 1037 - 1047
  • [2] Image Security Using Quantum Rivest-Shamir-Adleman Cryptosystem Algorithm and Digital Watermarking
    Elsayed, Hend A.
    Jadaan, Yasir Khalid
    Guirguis, Shawkat K.
    2016 PROGRESS IN ELECTROMAGNETICS RESEARCH SYMPOSIUM (PIERS), 2016, : 3978 - 3982
  • [3] Performance analysis of ant-lion optimization based routing algorithm for wireless sensor networks
    Swapna, Sasi B.
    Santhosh, R.
    INTERNATIONAL JOURNAL OF INTELLIGENT UNMANNED SYSTEMS, 2021, 9 (02) : 119 - 132
  • [4] Improved Ant Lion Optimizer for Coverage Optimization in Wireless Sensor Networks
    Chen, Wei
    Yang, Panlong
    Zhao, Wei
    Wei, Linna
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [5] Energy efficient routing protocol using exponentially-ant lion whale optimization algorithm in wireless sensor networks
    SureshKumar, K.
    Vimala, P.
    COMPUTER NETWORKS, 2021, 197
  • [6] Improved Cluster Based Data Gathering Using Ant Lion Optimization in Wireless Sensor Networks
    G. Yogarajan
    T. Revathi
    Wireless Personal Communications, 2018, 98 : 2711 - 2731
  • [7] Improved Cluster Based Data Gathering Using Ant Lion Optimization in Wireless Sensor Networks
    Yogarajan, G.
    Revathi, T.
    WIRELESS PERSONAL COMMUNICATIONS, 2018, 98 (03) : 2711 - 2731
  • [8] A ladder diffusion algorithm using ant colony optimization for wireless sensor networks
    Ho, Jiun-Huei
    Shih, Hong-Chi
    Liao, Bin-Yih
    Chu, Shu-Chuan
    INFORMATION SCIENCES, 2012, 192 : 204 - 212
  • [9] EVALUATION OF HYBRID TRUST MODELS USING ANT COLONY OPTIMIZATION IN WIRELESS SENSOR NETWORKS
    Kumar, G. Edwin Prem
    Baskaran, K.
    Blessing, R. Elijah
    Lydia, M.
    INTERNATIONAL JOURNAL ON SMART SENSING AND INTELLIGENT SYSTEMS, 2016, 9 (03): : 1243 - 1260
  • [10] GWO-SMSLO: Grey wolf optimization based clustering with secured modified Sea Lion optimization routing algorithm in wireless sensor networks
    Dinesh, K.
    Svn, Santhosh Kumar
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2024, 17 (02) : 585 - 611