Karthik, M. and Balakrishna, R. (2025) Key Distribution and Security Frameworks in Wireless Sensor Networks Based on Dynamic Stepwise Tiny Encryption Algorithm. International Journal of Basic and Applied Sciences, 14 (SI-1). pp. 289-296. ISSN 2227-5053
![[thumbnail of 289-296-34041.pdf]](https://ir.vistas.ac.in/style/images/fileicons/text.png)
289-296-34041.pdf
Download (587kB)
Abstract
Key Distribution and Security Frameworks in Wireless Sensor Networks Based on Dynamic Stepwise Tiny Encryption Algorithm M. Karthik R. Balakrishna
Data security and user privacy has become increasingly important in our daily lives. Sensitive information is stored in different devices like a smartphone, personal computers, laptops, etc. However, most of the user devices are not adequately protected, and malicious threats against sensitive information are growing rapidly. In this modern era, the realization of the importance of security and privacy has made security a global concern for everyone. The recent years have witnessed that the Internet of Things-(IoT) has become a reality where a number of embedded objects and devices are interconnected to monitor the environment and also it has a potential feature of human-machine interaction. In the next few decades, it is expected that IoT becomes the major driver of productivity and growth in every aspect of human life. The wireless sensor networks-(WSN) act as a backbone for the IoT-ecosystem, where connectivity between several sensor nodes and the internet is established to accomplish different tasks. WSN has multiple security constraints. Therefore, traditional network security mechanisms cannot be directly implemented in the sensor network. It is essential to first understand WSN security constraints for designing an energy-saving security technique. The proposed system provides a novel solution in which a very lightweight encryption technique is applied to ensure multiple-layers of security. The system allows only valid sensor nodes through authentication using signatures. Both forward and backward secrecy is ensured by building a dynamic network topology. The proposed system can be claimed to be cost-efficient. It offers comprehensive security features with lightweight encryption and a hop-2-hop message authentication mechanism in WSN, which does not depend on any complex operations. Therefore, the proposed scheme is energy-efficient, secure, and suitable for time-sensitive real-world applications.
07 08 2025 289 296 10.14419/2nx9av60 https://www.sciencepubco.com/index.php/IJBAS/article/view/34041 https://www.sciencepubco.com/index.php/IJBAS/article/download/34041/18384 https://www.sciencepubco.com/index.php/IJBAS/article/download/34041/18384
Item Type: | Article |
---|---|
Subjects: | Computer Science Engineering > Algorithms |
Domains: | Computer Science Engineering |
Depositing User: | Mr IR Admin |
Date Deposited: | 31 Aug 2025 07:19 |
Last Modified: | 31 Aug 2025 07:19 |
URI: | https://ir.vistas.ac.in/id/eprint/10758 |