Wireless Sensor Networks: A Hybrid Eecc-Eml Protocol for Improved Security and Energy-Efficiency

Main Article Content

G. Viswanathan, M. Jayakumar


                An important function of a "Message-Authenticator (MA)" in "Wireless Sensor Networks (WSN)" is to prevent the transmission of unauthorized or flawed messages to preserve the sensors' limited energy resources. Numerous approaches that offer integrity and authenticity checking for messages transmitted over WSN are currently presented. Still, with those approaches, the "Sensor Node (SN)" containing the shared key, which frequently gets dispersed by several SNs, is solely capable of verifying the veracity and quality of the message. If an invader captures even a single SN, they will possess the key. Furthermore, these approaches fail to perform in multicast connections, and computing security formulas necessitate a major energy consumption. This research proposes a new hybrid protocol called "Enhanced Elliptic Curve Cryptography-Energy Modelling Language (EECC-EML)" to address the issue of limited energy efficiency while maintaining adequate security. The key concept behind the EECC is that the transmitting SN must create a source anonymized MA with every "Message (m)" before it can be shared. To protect the confidentiality of unconditionally clustered SNs during data exchange in WSNs, this method employs a "Ring-Signature (RS)" in which each ring SN is required to determine a forgery signature for each of the other SNs within its "Ambiguity Set (AS)". The core concept of EML aims to increase the efficiency of WSNs by the use of intermediary SN authentication on each hop. The suggested EECC-EML protocol outperforms the current HSC and CCAP protocols in terms of "Security Ratio", "Energy Consumption Ratio", "Computation Time", and "Key Generation Time".

Article Details

How to Cite
G. Viswanathan, et al. (2023). Wireless Sensor Networks: A Hybrid Eecc-Eml Protocol for Improved Security and Energy-Efficiency. International Journal on Recent and Innovation Trends in Computing and Communication, 11(11), 770–779. Retrieved from https://ijritcc.org/index.php/ijritcc/article/view/10141