Wireless sensor networks (WSNs) have been used in numerous delicate checking, observation, and surveillance systems that use sensitive data. When a WSN utilizes various data clustering techniques, data is moved to the cluster head (CH) of the corresponding cluster area. Cluster Head further communicates the information to the sink node. In a WSN, a network owner (NO) does not validate a sensor before connecting to the network, so faulty nodes may likely attach to the network to sense the data and attempt to release the information to unauthorized persons. Further, a malicious node may become a mobile node (MN) equipped to send all of a particular cluster area’s perceived data to unauthorized persons. The above-stated problems can be solved by introducing an authentication mechanism into wireless sensor networks. In this mechanism, at whatever point of time a sensor connects with a cluster region, the identity of the sensor must be validated and authenticate to, in turn, validate a mobile node. The perceived data are encrypted and then transmitted through the WSN’s transmission medium. However, the encrypted data are prone to flaws, and attackers can gain access to it illegitimately. In this study, a more energy effective and proficient secured model is proposed called a data transmission model. The technical components, including the data access control mechanism and various private key cryptography algorithms, are compared to choose the optimal energy-efficient cryptography algorithm. The proposed model is verified by experiments for encryption and decryption processes using JAVA language with advanced encryption standard (AES), data encryption standard (DES), Triple DES, Rivest Cipher (RC4), and Blowfish algorithms. The encryption time is determined using mathematical equations. The experiment results showed that the Blowfish algorithm was comparatively more energy effective than the other private key cryptography algorithms.
Read full abstract