Crypto Analysis with Modified Diffie-Hellman Key Exchange based Sensor Node Security Improvement in Wireless Sensor Networks

Sensor nodes sense ecological situations, for example, strain, temperature, humidity, vibration, sound, and location. Because of the transportable information through the logically showing wireless channel, there is a considerable risk to the data security of wireless sensor networks (WSN). Since WS...

Full description

Saved in:
Bibliographic Details
Published in2023 Third International Conference on Artificial Intelligence and Smart Energy (ICAIS) pp. 1222 - 1227
Main Authors Rangarajan, J., Suriyakrishnaan, K, Meenakshi, V., Tholkapiyan, M.
Format Conference Proceeding
LanguageEnglish
Published IEEE 02.02.2023
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Sensor nodes sense ecological situations, for example, strain, temperature, humidity, vibration, sound, and location. Because of the transportable information through the logically showing wireless channel, there is a considerable risk to the data security of wireless sensor networks (WSN). Since WSNs are decentralized across their whole structure, man-in-the-middle attacks, also known as MIM attacks, are more susceptible to becoming successful. This article presents a method for the protection of data that requires less time for both calculation and response. The Diffie-Hellman has been strengthened so that it can better withstand attacks by having it produce a hash of each value sent over the network. This approach proposes Cryptanalysis with Modified Diffie-Hellman key exchange (CMDH) based Sensor node Security improvement in Wireless Sensor Networks. This approach uses a modified version of the Diffie-Hellman algorithm to produce a key; the sender encrypts the data and sends the receiver the information in an encrypted form. Finally, the recipient sensor node decrypted the data. This approach is separated into two parts: generating key and data encryption. Every value is hashed, and the resulting hash is sent via the WSN. This approach is mainly used for military applications in the WSN. The simulation analysis shows that the CMDH method executes better performance.
DOI:10.1109/ICAIS56108.2023.10073749