Secured wireless sensor networks using hybrid Rivest Shamir Adleman with ant lion optimization algorithm

被引:2
|
作者
Almuzaini, Khalid K. [1 ]
Dubey, Rachana [2 ]
Gandhi, Charu [3 ]
Taram, Manish [2 ]
Soni, Anita [4 ]
Sharma, Seema [5 ]
Sanchez-Chero, Manuel [6 ]
Carrion-Barco, Gilberto [7 ]
机构
[1] King Abdulaziz City Sci & Technol KACST, Cyber Secur Inst, Riyadh 11442, Saudi Arabia
[2] Pandit S N Shukla Univ PTSNS, Dept Comp Sci, Shahdol, Madhya Pradesh, India
[3] Jaypee Inst Informat Technol, Dept CSE & IT, Noida, Uttar Pradesh, India
[4] IES Univ, Dept Comp Sci Engn, Bhopal, Madhya Pradesh, India
[5] Manav Rachna Int Inst Res & Studies, Faridabad 121004, Haryana, India
[6] Univ Nacl Frontera, Fac Ingn Ind Alimentarias & Biotecnol, Sullana, Peru
[7] Univ Nacl Pedro Ruiz Gallo, Dept Academ Comp & Elect, Lambayeque, Peru
关键词
Ant lion optimization algorithm; Hybrid Rivest-Shamir-Adleman algorithm; Wireless sensor network; Encryption;
D O I
10.1007/s11276-023-03372-y
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The concept of security is quite broad and touches the lives of one million people on a daily basis. Those individuals who depend on networks for activities such as banking, shopping, and filing their tax returns may soon face a potentially significant challenge in the form of network security, which will need to be handled in the not-too-distant future. The solution that is being recommended is a combination of two algorithms: The Hybrid Rivest-Shamir-Adleman (RSA) algorithm and the Ant Lion Optimization Algorithm. There have been two noteworthy developments in the requirements for information security inside a wireless sensor network over the course of the last several decades. First, prior to the broad use of data processing equipment, the security of information that was regarded useful to a wireless sensor network was largely supplied by physical and administrative precautions. This was the case even after the widespread use of data processing equipment. Hash functions are used by these designs whenever Rebalanced RSA is used to encrypt a message. This helps to guarantee that the integrity of the message is not compromised in any way. It has been found out that this novel method is susceptible to attacks based on selected ciphertext as well as adaptive attacks based on chosen ciphertext. A second strategy, which entails converting the ciphertext into binary format, is also one of the options that are being investigated. The binary format is further compressed and coded, which makes it resistant to a variety of attacks, including adaptive chosen ciphertext assaults, selected ciphertext assaults, and other assaults. To get started, a thorough study project on mapping is carried out in order to establish the mapping of assaults and counterattacks that would be most effective. A brand-new index that goes by the name "Threat Severity Index" (TSI) has been developed with the intention of determining how secure each individual system is on the whole. In addition, the decryption performance of RSA-type cryptosystems is researched and compared with that of other RSA-type cryptosystems in order to identify which cryptosystem provides the quickest decryption time. Last but not least, an overall rating of each system is provided, taking into account both its speed and its level of safety.
引用
收藏
页码:5977 / 5995
页数:19
相关论文
共 50 条
  • [21] Hybrid algorithm optimization for coverage problem in wireless sensor networks
    Jia, Han-Dong
    Chu, Shu-Chuan
    Hu, Pei
    Kong, LingPing
    Wang, XiaoPeng
    Snasel, Vaclav
    Jiang, Tong-Bang
    Pan, Jeng-Shyang
    TELECOMMUNICATION SYSTEMS, 2022, 80 (01) : 105 - 121
  • [22] Data Fusion for Wireless Sensor Networks Based on Hybrid Ant Colony Algorithm
    Wang, Lihong
    Han, Xue
    2019 2ND INTERNATIONAL CONFERENCE ON GEOINFORMATICS AND DATA ANALYSIS (ICGDA 2019), 2019, : 52 - 55
  • [23] Performance Evaluations of an Ant Colony Optimization Routing Algorithm for Wireless Sensor Networks
    Lin, Tu-Liang
    Chen, Yu-Sheng
    Chang, Hong-Yi
    2014 TENTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP 2014), 2014, : 690 - 693
  • [24] An Improved Routing Algorithm Based on Ant Colony Optimization in Wireless Sensor Networks
    Sun, Yongjun
    Dong, Wenxin
    Chen, Yahuan
    IEEE COMMUNICATIONS LETTERS, 2017, 21 (06) : 1317 - 1320
  • [25] A DYNAMIC ROUTING ALGORITHM IN WIRELESS SENSOR NETWORKS BASED ON ANT COLONY OPTIMIZATION
    Zhou, Xinxin
    Zhao, Yan
    3RD INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND COMPUTER SCIENCE (ITCS 2011), PROCEEDINGS, 2011, : 422 - 425
  • [26] WAOA: A hybrid whale-ant optimization algorithm for energy-efficient routing in wireless sensor networks
    Kumar, Navneet
    Singh, Karan
    Lloret, Jaime
    COMPUTER NETWORKS, 2024, 254
  • [27] Data aggregation in wireless sensor networks using ant colony algorithm
    Liao, Wen-Hwa
    Kao, Yucheng
    Fan, Chien-Ming
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2008, 31 (04) : 387 - 401
  • [28] Routing Algorithms for Wireless Sensor Networks Using Ant Colony Optimization
    Dominguez-Medina, Christian
    Cruz-Cortes, Nareli
    ADVANCES IN SOFT COMPUTING - MICAI 2010, PT II, 2010, 6438 : 337 - 348
  • [29] A Hybrid Modified Ant Colony Optimization - Particle Swarm Optimization Algorithm for Optimal Node Positioning and Routing in Wireless Sensor Networks
    Saheb, Shaik Imam
    Khan, Khaleel Ur Rahman
    Bindu, C. Shoba
    INTERNATIONAL JOURNAL OF ELECTRICAL AND COMPUTER ENGINEERING SYSTEMS, 2022, 13 (07) : 515 - 523
  • [30] Prolonging Network Lifetime Using Ant Colony Optimization Algorithm on LEACH Protocol for Wireless Sensor Networks
    Agarwal, Tanushree
    Kumar, Dilip
    Prakash, Neelam R.
    RECENT TRENDS IN NETWORKS AND COMMUNICATIONS, 2010, 90 : 634 - 641