Secured wireless sensor networks using hybrid Rivest Shamir Adleman with ant lion optimization algorithm

被引:2
|
作者
Almuzaini, Khalid K. [1 ]
Dubey, Rachana [2 ]
Gandhi, Charu [3 ]
Taram, Manish [2 ]
Soni, Anita [4 ]
Sharma, Seema [5 ]
Sanchez-Chero, Manuel [6 ]
Carrion-Barco, Gilberto [7 ]
机构
[1] King Abdulaziz City Sci & Technol KACST, Cyber Secur Inst, Riyadh 11442, Saudi Arabia
[2] Pandit S N Shukla Univ PTSNS, Dept Comp Sci, Shahdol, Madhya Pradesh, India
[3] Jaypee Inst Informat Technol, Dept CSE & IT, Noida, Uttar Pradesh, India
[4] IES Univ, Dept Comp Sci Engn, Bhopal, Madhya Pradesh, India
[5] Manav Rachna Int Inst Res & Studies, Faridabad 121004, Haryana, India
[6] Univ Nacl Frontera, Fac Ingn Ind Alimentarias & Biotecnol, Sullana, Peru
[7] Univ Nacl Pedro Ruiz Gallo, Dept Academ Comp & Elect, Lambayeque, Peru
关键词
Ant lion optimization algorithm; Hybrid Rivest-Shamir-Adleman algorithm; Wireless sensor network; Encryption;
D O I
10.1007/s11276-023-03372-y
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The concept of security is quite broad and touches the lives of one million people on a daily basis. Those individuals who depend on networks for activities such as banking, shopping, and filing their tax returns may soon face a potentially significant challenge in the form of network security, which will need to be handled in the not-too-distant future. The solution that is being recommended is a combination of two algorithms: The Hybrid Rivest-Shamir-Adleman (RSA) algorithm and the Ant Lion Optimization Algorithm. There have been two noteworthy developments in the requirements for information security inside a wireless sensor network over the course of the last several decades. First, prior to the broad use of data processing equipment, the security of information that was regarded useful to a wireless sensor network was largely supplied by physical and administrative precautions. This was the case even after the widespread use of data processing equipment. Hash functions are used by these designs whenever Rebalanced RSA is used to encrypt a message. This helps to guarantee that the integrity of the message is not compromised in any way. It has been found out that this novel method is susceptible to attacks based on selected ciphertext as well as adaptive attacks based on chosen ciphertext. A second strategy, which entails converting the ciphertext into binary format, is also one of the options that are being investigated. The binary format is further compressed and coded, which makes it resistant to a variety of attacks, including adaptive chosen ciphertext assaults, selected ciphertext assaults, and other assaults. To get started, a thorough study project on mapping is carried out in order to establish the mapping of assaults and counterattacks that would be most effective. A brand-new index that goes by the name "Threat Severity Index" (TSI) has been developed with the intention of determining how secure each individual system is on the whole. In addition, the decryption performance of RSA-type cryptosystems is researched and compared with that of other RSA-type cryptosystems in order to identify which cryptosystem provides the quickest decryption time. Last but not least, an overall rating of each system is provided, taking into account both its speed and its level of safety.
引用
收藏
页码:5977 / 5995
页数:19
相关论文
共 50 条
  • [31] A Novel Data Aggregation Method for Underwater Wireless Sensor Networks using Ant Colony Optimization Algorithm
    Zhang, Lianchao
    Qi, Jianwei
    Wu, Hao
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2023, 14 (04) : 83 - 93
  • [32] Wireless Power Transfer for Wireless Sensor Networks using Hybrid algorithm
    Adarsha, B. M.
    Prakash, Surya
    Naik, Vishnu G.
    Reddy, K. Viswavardhan
    2017 INTERNATIONAL CONFERENCE ON COMPUTING METHODOLOGIES AND COMMUNICATION (ICCMC), 2017, : 68 - 72
  • [33] Genetic optimization of hybrid clustering algorithm in mobile wireless sensor networks
    Sangeetha, M.
    Sabari, A.
    SENSOR REVIEW, 2018, 38 (04) : 526 - 533
  • [34] Collaborative Hybrid Classifier Learning With Ant Colony Optimization in Wireless Multimedia Sensor Networks
    Wang, Sheng
    Wang, Xue
    Ding, Liang
    Bi, Daowei
    You, Zheng
    2008 7TH WORLD CONGRESS ON INTELLIGENT CONTROL AND AUTOMATION, VOLS 1-23, 2008, : 3341 - 3346
  • [35] Ant Intelligence Routing Algorithm for Wireless Sensor Networks
    Karim, Awudu
    Zhang, Xiaoming
    Oluyemi, A. M.
    Fitarikandro, T.
    INTERNET OF THINGS-BK, 2012, 312 : 76 - +
  • [36] A Novel Uneven Clustering Algorithm Based on Ant Colony Optimization for Wireless Sensor Networks
    Zhang, Rongbo
    Cao, Jianfu
    ICICTA: 2009 SECOND INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTATION TECHNOLOGY AND AUTOMATION, VOL I, PROCEEDINGS, 2009, : 138 - 143
  • [37] Optimization deployment of wireless sensor networks based on culture-ant colony algorithm
    Sun, Xuemei
    Zhang, Yiming
    Ren, Xu
    Chen, Ke
    APPLIED MATHEMATICS AND COMPUTATION, 2015, 250 : 58 - 70
  • [38] A modified ant colony optimization algorithm (mACO) for energy efficient wireless sensor networks
    Sharma, Vishal
    Grover, Amit
    OPTIK, 2016, 127 (04): : 2169 - 2172
  • [39] An Ant Colony Optimization-based Trustful Routing Algorithm for Wireless Sensor Networks
    Luo, Zhong
    Lu, Liuzheng
    Xie, Jianqun
    He, Jinrong
    PROCEEDINGS OF 2015 4TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT 2015), 2015, : 1128 - 1131
  • [40] Environmental Analysis of a Novel Hybrid Ant Breeding Algorithm for Forest Fire Detection using Wireless Sensor Networks
    Kalaiarasi, S.
    Sriramya, P.
    EKOLOJI, 2019, 28 (107): : 1463 - 1471