{"title":"Secure authentication and key management based on hierarchical enhanced identity based digital signature in heterogeneous wireless sensor network","authors":"Siddiq Iqbal, B. R. Sujatha","doi":"10.1007/s11276-024-03745-x","DOIUrl":null,"url":null,"abstract":"<p>Nowadays, secured data transmission has become the most desired need for all networks. Ensuring secure authentication and data transmission in the network is a significant and important task in a heterogeneous wireless sensor network (HWSN). Even though several models are adopted in the network, offering secure authentication and sustaining the energy along with key management is still considered a major problem in the research community. Thus, in this paper, a novel energy efficient clustering and routing algorithm is proposed based on the Hierarchical enhanced identity based digital signature (Hierarchical-EIDS) algorithm in HWSN. Initially, an efficient clustering and cluster head (CH) selection are performed using a fuzzy transient search algorithm (FTSA) in order to play a significant role in energy consumption. In the next stage, adaptive Aquila optimization (AAO) has been introduced to define the optimal route for efficient data transmission. To overcome the mutual authentication, bilinear pairings, and public key generation, a Hierarchical-EIDS scheme is applied. Here, the homomorphic equilibrium (HE) algorithm is employed to generate a key for a particular sensor node (SN). The proposed method is implemented in MATLAB, and a comparative analysis has been carried out to determine the efficacy of the model. As a result, the proposed method accomplishes better performance in terms of security strength (0.08 per packet), average energy (AE) consumption (8.861 J), average end-to-end (AEE) delay (0.344 ms), and key length (1900 character). The acquired results outperform the existing models and prove their effectiveness.</p>","PeriodicalId":23750,"journal":{"name":"Wireless Networks","volume":"27 1","pages":""},"PeriodicalIF":2.1000,"publicationDate":"2024-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Wireless Networks","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.1007/s11276-024-03745-x","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
Nowadays, secured data transmission has become the most desired need for all networks. Ensuring secure authentication and data transmission in the network is a significant and important task in a heterogeneous wireless sensor network (HWSN). Even though several models are adopted in the network, offering secure authentication and sustaining the energy along with key management is still considered a major problem in the research community. Thus, in this paper, a novel energy efficient clustering and routing algorithm is proposed based on the Hierarchical enhanced identity based digital signature (Hierarchical-EIDS) algorithm in HWSN. Initially, an efficient clustering and cluster head (CH) selection are performed using a fuzzy transient search algorithm (FTSA) in order to play a significant role in energy consumption. In the next stage, adaptive Aquila optimization (AAO) has been introduced to define the optimal route for efficient data transmission. To overcome the mutual authentication, bilinear pairings, and public key generation, a Hierarchical-EIDS scheme is applied. Here, the homomorphic equilibrium (HE) algorithm is employed to generate a key for a particular sensor node (SN). The proposed method is implemented in MATLAB, and a comparative analysis has been carried out to determine the efficacy of the model. As a result, the proposed method accomplishes better performance in terms of security strength (0.08 per packet), average energy (AE) consumption (8.861 J), average end-to-end (AEE) delay (0.344 ms), and key length (1900 character). The acquired results outperform the existing models and prove their effectiveness.
期刊介绍:
The wireless communication revolution is bringing fundamental changes to data networking, telecommunication, and is making integrated networks a reality. By freeing the user from the cord, personal communications networks, wireless LAN''s, mobile radio networks and cellular systems, harbor the promise of fully distributed mobile computing and communications, any time, anywhere.
Focusing on the networking and user aspects of the field, Wireless Networks provides a global forum for archival value contributions documenting these fast growing areas of interest. The journal publishes refereed articles dealing with research, experience and management issues of wireless networks. Its aim is to allow the reader to benefit from experience, problems and solutions described.