Abstract
The recent era has witnessed several advances in Wireless Sensor Networks (WSNs), with few resources presents unprecedented challenges for secured data transmission in an ever-unsecured broadcast network. The situation is more challenging when adversaries are equipped with sophisticated resources having direct access to sensor nodes. Nevertheless, there exists several cryptographic techniques used for node authentication, authorization, data confidentiality, integrity, and other security related services. This paper contributes to novel network security strategies to prevent network compromise. The proposed strategies attempt to boost data integrity, reliability and secure data transmissions. The proposal identifies the strategically important nodes (SIN) in implementing network security measures using volatile symmetric-key management scheme (KMS).The scheme involves four phases: The first phase involves strategically important nodes (SIN) designation using Grey Wolf Optimization (GWO). Usually, hackers find it difficult to guess and access the keys that are selected on a random basis. To further increase the key protection, the scheme introduces a limited lifespan master key (LLMK). Secondly, to secure the KMS, this phase utilizes SHA for LLMK distribution, and paired node prediction. Next phase performs secret key generation with a gradient approach and the key sharing is performed using Supersingular Isogeny Diffie-Hellman algorithm. The last phase is responsible for the dynamic S-Box generation using the Blowfish algorithm. The generated S-Box are subsequently shuffled to enhance the cryptographic process offering immunity towards attacks.To evaluate the effectiveness of this approach, the proposed KMS is compared with relevant methods on various performance metrics. The results demonstrate that the proposed scheme achieves notable performance improvements over other methods.
Published Version
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have