An efficient cryptographic technique using modified Diffie–Hellman in wireless sensor networks

In wireless sensor networks, the sensors transfer data through radio signals to a remote base station. Sensor nodes are used to sense environmental conditions such as temperature, strain, humidity, sound, vibration, and position. Data security is a major issue in wireless sensor networks since data...

Full description

Bibliographic Details
Main Authors: Shahwar Ali, A Humaria, M Sher Ramzan, Imran Khan, Syed M Saqlain, Anwar Ghani, J Zakia, Bander A Alzahrani
Format: Article
Language:English
Published: SAGE Publishing 2020-06-01
Series:International Journal of Distributed Sensor Networks
Online Access:https://doi.org/10.1177/1550147720925772
id doaj-256d941cb08e4e4e9855a388aaf558af
record_format Article
spelling doaj-256d941cb08e4e4e9855a388aaf558af2020-11-25T03:54:35ZengSAGE PublishingInternational Journal of Distributed Sensor Networks1550-14772020-06-011610.1177/1550147720925772An efficient cryptographic technique using modified Diffie–Hellman in wireless sensor networksShahwar Ali0A Humaria1M Sher Ramzan2Imran Khan3Syed M Saqlain4Anwar Ghani5J Zakia6Bander A Alzahrani7International Islamic University Islamabad, Islamabad, PakistanInternational Islamic University Islamabad, Islamabad, PakistanFaculty of Computing and Information Technology, King Abdulaziz University, Jeddah, Saudi ArabiaInternational Islamic University Islamabad, Islamabad, PakistanInternational Islamic University Islamabad, Islamabad, PakistanInternational Islamic University Islamabad, Islamabad, PakistanInternational Islamic University Islamabad, Islamabad, PakistanFaculty of Computing and Information Technology, King Abdulaziz University, Jeddah, Saudi ArabiaIn wireless sensor networks, the sensors transfer data through radio signals to a remote base station. Sensor nodes are used to sense environmental conditions such as temperature, strain, humidity, sound, vibration, and position. Data security is a major issue in wireless sensor networks since data travel over the naturally exposed wireless channel where malicious attackers may get access to critical information. The sensors in wireless sensor networks are resource-constrained devices whereas the existing data security approaches have complex security mechanisms with high computational and response times affecting the network lifetime. Furthermore, existing systems, such as secure efficient encryption algorithm, use the Diffie–Hellman approach for key generation and exchange; however, Diffie–Hellman is highly vulnerable to the man-in-the-middle attack. This article introduces a data security approach with less computational and response times based on a modified version of Diffie–Hellman. The Diffie–Hellman has been modified to secure it against attacks by generating a hash of each value that is transmitted over the network. The proposed approach has been analyzed for security against various attacks. Furthermore, it has also been analyzed in terms of encryption/decryption time, computation time, and key generation time for different sizes of data. The comparative analysis with the existing approaches shows that the proposed approach performs better in most of the cases.https://doi.org/10.1177/1550147720925772
collection DOAJ
language English
format Article
sources DOAJ
author Shahwar Ali
A Humaria
M Sher Ramzan
Imran Khan
Syed M Saqlain
Anwar Ghani
J Zakia
Bander A Alzahrani
spellingShingle Shahwar Ali
A Humaria
M Sher Ramzan
Imran Khan
Syed M Saqlain
Anwar Ghani
J Zakia
Bander A Alzahrani
An efficient cryptographic technique using modified Diffie–Hellman in wireless sensor networks
International Journal of Distributed Sensor Networks
author_facet Shahwar Ali
A Humaria
M Sher Ramzan
Imran Khan
Syed M Saqlain
Anwar Ghani
J Zakia
Bander A Alzahrani
author_sort Shahwar Ali
title An efficient cryptographic technique using modified Diffie–Hellman in wireless sensor networks
title_short An efficient cryptographic technique using modified Diffie–Hellman in wireless sensor networks
title_full An efficient cryptographic technique using modified Diffie–Hellman in wireless sensor networks
title_fullStr An efficient cryptographic technique using modified Diffie–Hellman in wireless sensor networks
title_full_unstemmed An efficient cryptographic technique using modified Diffie–Hellman in wireless sensor networks
title_sort efficient cryptographic technique using modified diffie–hellman in wireless sensor networks
publisher SAGE Publishing
series International Journal of Distributed Sensor Networks
issn 1550-1477
publishDate 2020-06-01
description In wireless sensor networks, the sensors transfer data through radio signals to a remote base station. Sensor nodes are used to sense environmental conditions such as temperature, strain, humidity, sound, vibration, and position. Data security is a major issue in wireless sensor networks since data travel over the naturally exposed wireless channel where malicious attackers may get access to critical information. The sensors in wireless sensor networks are resource-constrained devices whereas the existing data security approaches have complex security mechanisms with high computational and response times affecting the network lifetime. Furthermore, existing systems, such as secure efficient encryption algorithm, use the Diffie–Hellman approach for key generation and exchange; however, Diffie–Hellman is highly vulnerable to the man-in-the-middle attack. This article introduces a data security approach with less computational and response times based on a modified version of Diffie–Hellman. The Diffie–Hellman has been modified to secure it against attacks by generating a hash of each value that is transmitted over the network. The proposed approach has been analyzed for security against various attacks. Furthermore, it has also been analyzed in terms of encryption/decryption time, computation time, and key generation time for different sizes of data. The comparative analysis with the existing approaches shows that the proposed approach performs better in most of the cases.
url https://doi.org/10.1177/1550147720925772
work_keys_str_mv AT shahwarali anefficientcryptographictechniqueusingmodifieddiffiehellmaninwirelesssensornetworks
AT ahumaria anefficientcryptographictechniqueusingmodifieddiffiehellmaninwirelesssensornetworks
AT msherramzan anefficientcryptographictechniqueusingmodifieddiffiehellmaninwirelesssensornetworks
AT imrankhan anefficientcryptographictechniqueusingmodifieddiffiehellmaninwirelesssensornetworks
AT syedmsaqlain anefficientcryptographictechniqueusingmodifieddiffiehellmaninwirelesssensornetworks
AT anwarghani anefficientcryptographictechniqueusingmodifieddiffiehellmaninwirelesssensornetworks
AT jzakia anefficientcryptographictechniqueusingmodifieddiffiehellmaninwirelesssensornetworks
AT banderaalzahrani anefficientcryptographictechniqueusingmodifieddiffiehellmaninwirelesssensornetworks
AT shahwarali efficientcryptographictechniqueusingmodifieddiffiehellmaninwirelesssensornetworks
AT ahumaria efficientcryptographictechniqueusingmodifieddiffiehellmaninwirelesssensornetworks
AT msherramzan efficientcryptographictechniqueusingmodifieddiffiehellmaninwirelesssensornetworks
AT imrankhan efficientcryptographictechniqueusingmodifieddiffiehellmaninwirelesssensornetworks
AT syedmsaqlain efficientcryptographictechniqueusingmodifieddiffiehellmaninwirelesssensornetworks
AT anwarghani efficientcryptographictechniqueusingmodifieddiffiehellmaninwirelesssensornetworks
AT jzakia efficientcryptographictechniqueusingmodifieddiffiehellmaninwirelesssensornetworks
AT banderaalzahrani efficientcryptographictechniqueusingmodifieddiffiehellmaninwirelesssensornetworks
_version_ 1724472900429283328