Crypto Analysis with Modified Diffie-Hellman Key Exchange based Sensor Node Security Improvement in Wireless Sensor Networks
Sensor nodes sense ecological situations, for example, strain, temperature, humidity, vibration, sound, and location. Because of the transportable information through the logically showing wireless channel, there is a considerable risk to the data security of wireless sensor networks (WSN). Since WS...
Saved in:
Published in | 2023 Third International Conference on Artificial Intelligence and Smart Energy (ICAIS) pp. 1222 - 1227 |
---|---|
Main Authors | , , , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
02.02.2023
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | Sensor nodes sense ecological situations, for example, strain, temperature, humidity, vibration, sound, and location. Because of the transportable information through the logically showing wireless channel, there is a considerable risk to the data security of wireless sensor networks (WSN). Since WSNs are decentralized across their whole structure, man-in-the-middle attacks, also known as MIM attacks, are more susceptible to becoming successful. This article presents a method for the protection of data that requires less time for both calculation and response. The Diffie-Hellman has been strengthened so that it can better withstand attacks by having it produce a hash of each value sent over the network. This approach proposes Cryptanalysis with Modified Diffie-Hellman key exchange (CMDH) based Sensor node Security improvement in Wireless Sensor Networks. This approach uses a modified version of the Diffie-Hellman algorithm to produce a key; the sender encrypts the data and sends the receiver the information in an encrypted form. Finally, the recipient sensor node decrypted the data. This approach is separated into two parts: generating key and data encryption. Every value is hashed, and the resulting hash is sent via the WSN. This approach is mainly used for military applications in the WSN. The simulation analysis shows that the CMDH method executes better performance. |
---|---|
DOI: | 10.1109/ICAIS56108.2023.10073749 |