An efficient cryptographic technique using modified Diffie–Hellman in wireless sensor networks
In wireless sensor networks, the sensors transfer data through radio signals to a remote base station. Sensor nodes are used to sense environmental conditions such as temperature, strain, humidity, sound, vibration, and position. Data security is a major issue in wireless sensor networks since data...
Main Authors: | , , , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
SAGE Publishing
2020-06-01
|
Series: | International Journal of Distributed Sensor Networks |
Online Access: | https://doi.org/10.1177/1550147720925772 |
id |
doaj-256d941cb08e4e4e9855a388aaf558af |
---|---|
record_format |
Article |
spelling |
doaj-256d941cb08e4e4e9855a388aaf558af2020-11-25T03:54:35ZengSAGE PublishingInternational Journal of Distributed Sensor Networks1550-14772020-06-011610.1177/1550147720925772An efficient cryptographic technique using modified Diffie–Hellman in wireless sensor networksShahwar Ali0A Humaria1M Sher Ramzan2Imran Khan3Syed M Saqlain4Anwar Ghani5J Zakia6Bander A Alzahrani7International Islamic University Islamabad, Islamabad, PakistanInternational Islamic University Islamabad, Islamabad, PakistanFaculty of Computing and Information Technology, King Abdulaziz University, Jeddah, Saudi ArabiaInternational Islamic University Islamabad, Islamabad, PakistanInternational Islamic University Islamabad, Islamabad, PakistanInternational Islamic University Islamabad, Islamabad, PakistanInternational Islamic University Islamabad, Islamabad, PakistanFaculty of Computing and Information Technology, King Abdulaziz University, Jeddah, Saudi ArabiaIn wireless sensor networks, the sensors transfer data through radio signals to a remote base station. Sensor nodes are used to sense environmental conditions such as temperature, strain, humidity, sound, vibration, and position. Data security is a major issue in wireless sensor networks since data travel over the naturally exposed wireless channel where malicious attackers may get access to critical information. The sensors in wireless sensor networks are resource-constrained devices whereas the existing data security approaches have complex security mechanisms with high computational and response times affecting the network lifetime. Furthermore, existing systems, such as secure efficient encryption algorithm, use the Diffie–Hellman approach for key generation and exchange; however, Diffie–Hellman is highly vulnerable to the man-in-the-middle attack. This article introduces a data security approach with less computational and response times based on a modified version of Diffie–Hellman. The Diffie–Hellman has been modified to secure it against attacks by generating a hash of each value that is transmitted over the network. The proposed approach has been analyzed for security against various attacks. Furthermore, it has also been analyzed in terms of encryption/decryption time, computation time, and key generation time for different sizes of data. The comparative analysis with the existing approaches shows that the proposed approach performs better in most of the cases.https://doi.org/10.1177/1550147720925772 |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Shahwar Ali A Humaria M Sher Ramzan Imran Khan Syed M Saqlain Anwar Ghani J Zakia Bander A Alzahrani |
spellingShingle |
Shahwar Ali A Humaria M Sher Ramzan Imran Khan Syed M Saqlain Anwar Ghani J Zakia Bander A Alzahrani An efficient cryptographic technique using modified Diffie–Hellman in wireless sensor networks International Journal of Distributed Sensor Networks |
author_facet |
Shahwar Ali A Humaria M Sher Ramzan Imran Khan Syed M Saqlain Anwar Ghani J Zakia Bander A Alzahrani |
author_sort |
Shahwar Ali |
title |
An efficient cryptographic technique using modified Diffie–Hellman in wireless sensor networks |
title_short |
An efficient cryptographic technique using modified Diffie–Hellman in wireless sensor networks |
title_full |
An efficient cryptographic technique using modified Diffie–Hellman in wireless sensor networks |
title_fullStr |
An efficient cryptographic technique using modified Diffie–Hellman in wireless sensor networks |
title_full_unstemmed |
An efficient cryptographic technique using modified Diffie–Hellman in wireless sensor networks |
title_sort |
efficient cryptographic technique using modified diffie–hellman in wireless sensor networks |
publisher |
SAGE Publishing |
series |
International Journal of Distributed Sensor Networks |
issn |
1550-1477 |
publishDate |
2020-06-01 |
description |
In wireless sensor networks, the sensors transfer data through radio signals to a remote base station. Sensor nodes are used to sense environmental conditions such as temperature, strain, humidity, sound, vibration, and position. Data security is a major issue in wireless sensor networks since data travel over the naturally exposed wireless channel where malicious attackers may get access to critical information. The sensors in wireless sensor networks are resource-constrained devices whereas the existing data security approaches have complex security mechanisms with high computational and response times affecting the network lifetime. Furthermore, existing systems, such as secure efficient encryption algorithm, use the Diffie–Hellman approach for key generation and exchange; however, Diffie–Hellman is highly vulnerable to the man-in-the-middle attack. This article introduces a data security approach with less computational and response times based on a modified version of Diffie–Hellman. The Diffie–Hellman has been modified to secure it against attacks by generating a hash of each value that is transmitted over the network. The proposed approach has been analyzed for security against various attacks. Furthermore, it has also been analyzed in terms of encryption/decryption time, computation time, and key generation time for different sizes of data. The comparative analysis with the existing approaches shows that the proposed approach performs better in most of the cases. |
url |
https://doi.org/10.1177/1550147720925772 |
work_keys_str_mv |
AT shahwarali anefficientcryptographictechniqueusingmodifieddiffiehellmaninwirelesssensornetworks AT ahumaria anefficientcryptographictechniqueusingmodifieddiffiehellmaninwirelesssensornetworks AT msherramzan anefficientcryptographictechniqueusingmodifieddiffiehellmaninwirelesssensornetworks AT imrankhan anefficientcryptographictechniqueusingmodifieddiffiehellmaninwirelesssensornetworks AT syedmsaqlain anefficientcryptographictechniqueusingmodifieddiffiehellmaninwirelesssensornetworks AT anwarghani anefficientcryptographictechniqueusingmodifieddiffiehellmaninwirelesssensornetworks AT jzakia anefficientcryptographictechniqueusingmodifieddiffiehellmaninwirelesssensornetworks AT banderaalzahrani anefficientcryptographictechniqueusingmodifieddiffiehellmaninwirelesssensornetworks AT shahwarali efficientcryptographictechniqueusingmodifieddiffiehellmaninwirelesssensornetworks AT ahumaria efficientcryptographictechniqueusingmodifieddiffiehellmaninwirelesssensornetworks AT msherramzan efficientcryptographictechniqueusingmodifieddiffiehellmaninwirelesssensornetworks AT imrankhan efficientcryptographictechniqueusingmodifieddiffiehellmaninwirelesssensornetworks AT syedmsaqlain efficientcryptographictechniqueusingmodifieddiffiehellmaninwirelesssensornetworks AT anwarghani efficientcryptographictechniqueusingmodifieddiffiehellmaninwirelesssensornetworks AT jzakia efficientcryptographictechniqueusingmodifieddiffiehellmaninwirelesssensornetworks AT banderaalzahrani efficientcryptographictechniqueusingmodifieddiffiehellmaninwirelesssensornetworks |
_version_ |
1724472900429283328 |