EconPapers    
Economics at your fingertips  
 

Improved Secure Encryption with Energy Optimization Using Random Permutation Pseudo Algorithm Based on Internet of Thing in Wireless Sensor Networks

S. Nagaraj, Atul B. Kathole, Leena Arya, Neha Tyagi, S. B. Goyal (), Anand Singh Rajawat, Maria Simona Raboaca (), Traian Candin Mihaltan, Chaman Verma and George Suciu ()
Additional contact information
S. Nagaraj: Department of CSE, Mallareddy University, Hyderabad 500043, India
Atul B. Kathole: Department of Information Technology, Pimpri Chinchwad College of Engineering, Pune 411044, India
Leena Arya: Department of CSE, Koneru Lakshmaiah Education Foundation, Vaddeswaram 522502, India
Neha Tyagi: Department of IT, G.L Bajaj Institute of Technology & Management, Knowledge Park 3, Greater Noida 201306, India
S. B. Goyal: Faculty of Information Technology, City University, Petaling Jaya 46100, Malaysia
Anand Singh Rajawat: School of Computer Sciences & Engineering, Sandip University, Nashik 422213, India
Maria Simona Raboaca: ICSI Energy Department, National Research and Development Institute for Cryogenics and Isotopic Technologies, 240050 Ramnicu Valcea, Romania
Traian Candin Mihaltan: Faculty of Building Services, Technical University of Cluj-Napoca, 40033 Cluj-Napoca, Romania
Chaman Verma: Faculty of Informatics, University of Eötvös Loránd, 1053 Budapest, Hungary
George Suciu: R&D Department Beia Consult International, 041386 Bucharest, Romania

Energies, 2022, vol. 16, issue 1, 1-16

Abstract: The use of wireless and Internet of Things (IoT) devices is growing rapidly. Because of this expansion, nowadays, mobile apps are integrated into low-cost, low-power platforms. Low-power, inexpensive sensor nodes are used to facilitate this integration. Given that they self-organize, these systems qualify as IoT-based wireless sensor networks. WSNs have gained tremendous popularity in recent years, but they are also subject to security breaches from multiple entities. WSNs pose various challenges, such as the possibility of numerous attacks, their innate power, and their unfeasibility for use in standard security solutions. In this paper, to overcome these issues, we propose the secure encryption random permutation pseudo algorithm (SERPPA) for achieving network security and energy consumption. SERPPA contains a major entity known as a cluster head responsible for backing up and monitoring the activities of the nodes in the network. The proposed work performance is compared with other work based on secure IoT devices. The calculation metrics taken for consideration are energy, overheads, computation cost, and time consumption. The obtained results show that the proposed SERPPA is very significant in comparison to the existing works, such as GKA (Group Key Agreement) and MPKE (Multipath Key Establishment), in terms of data transfer rate, energy consumption and throughput.

Keywords: wireless sensor network (WSN); IoT; security; attacks; cluster mechanism; time consumption (search for similar items in EconPapers)
JEL-codes: Q Q0 Q4 Q40 Q41 Q42 Q43 Q47 Q48 Q49 (search for similar items in EconPapers)
Date: 2022
References: View references in EconPapers View complete reference list from CitEc
Citations: View citations in EconPapers (1)

Downloads: (external link)
https://www.mdpi.com/1996-1073/16/1/8/pdf (application/pdf)
https://www.mdpi.com/1996-1073/16/1/8/ (text/html)

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:gam:jeners:v:16:y:2022:i:1:p:8-:d:1008800

Access Statistics for this article

Energies is currently edited by Ms. Agatha Cao

More articles in Energies from MDPI
Bibliographic data for series maintained by MDPI Indexing Manager ().

 
Page updated 2025-03-19
Handle: RePEc:gam:jeners:v:16:y:2022:i:1:p:8-:d:1008800