Providing an effective key management scheme to increase transaction security of homogeneous mobile wireless sensor networks
Network security is one of the key concerns with wireless sensor networks. Because sensor nodes employ radio channel frequencies, which are riskier than traditional networks, the attacker may be able to force the node to compromise, disrupt data integrity, eavesdrop, or insert false data into the ne...
Gespeichert in:
Veröffentlicht in: | Journal of intelligent & fuzzy systems 2023-12, Vol.45 (6), p.10451-10466 |
---|---|
Hauptverfasser: | , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 10466 |
---|---|
container_issue | 6 |
container_start_page | 10451 |
container_title | Journal of intelligent & fuzzy systems |
container_volume | 45 |
creator | Tan, Lirui Zheng, Qiuju Chen, Junji |
description | Network security is one of the key concerns with wireless sensor networks. Because sensor nodes employ radio channel frequencies, which are riskier than traditional networks, the attacker may be able to force the node to compromise, disrupt data integrity, eavesdrop, or insert false data into the network, wasting network resources. Creating dependable sensor networks that offer the highest level of security while using the fewest resources is thus one of the problems. The designers of wireless sensor networks can take into account providing an efficient key management system that can enhance any efficiency features such as communication overhead, calculation rate, memory demand, and energy consumption rate. The energy level of nodes is determined in this article using a novel approach based on fuzzy systems and simple to implement in both hardware and software. In this study, the memory needed to carry out the plan was decreased, and the search performance was raised by integrating elliptic curve cryptography with an AVL search tree and a LEACH model. Also, the frequency range of radio channels in this study is 2.4 GHz. Based on the theoretical analysis as well as the outcomes of the experiments, the suggested key management strategy for wireless sensor networks improves security while also reducing computational overhead by 23%, energy consumption by 14%, and memory consumption parameters by 14%. 18% of people have used the network. Additionally, it was demonstrated that the suggested approach is scalable and extendable. Because of this, the suggested technique has a wide range of applications in massive wireless sensor networks. |
doi_str_mv | 10.3233/JIFS-233476 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2897574144</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2897574144</sourcerecordid><originalsourceid>FETCH-LOGICAL-c219t-589341457e4d60ae2bad0aefdff7f3b1a9ebb59e3d18b5208b9c5f8211665d373</originalsourceid><addsrcrecordid>eNotkFFLwzAUhYMoOKdP_oGAj1JtmqZpH2U4nQwU1OeStjdbtjWZuenGwB9vxnw638PHudxDyC1LH3jG-ePbbPqZRMhlcUZGrJQiKatCnkdOizxhWV5ckivEVZoyKbJ0RH4_vNuZztgFVZaC1tAGswO6hgPtlVUL6MEGiu0yAg2OGtt6UBjZK4sq2s5ShHbwJhyo03TpercAC25A2rvGbIDujYcNIEbPovPUQtg7v8ZrcqHVBuHmP8fke_r8NXlN5u8vs8nTPGkzVoVElBXPWS4k5F2RKsga1cXQndZS84apCppGVMA7Vjbxq7KpWqHLjLGiEB2XfEzuTr1b734GwFCv3OBtPFlnZSWFjO15tO5PVusdogddb73plT_ULK2P89bHeevTvPwPsQRwiw</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2897574144</pqid></control><display><type>article</type><title>Providing an effective key management scheme to increase transaction security of homogeneous mobile wireless sensor networks</title><source>EBSCOhost Business Source Complete</source><creator>Tan, Lirui ; Zheng, Qiuju ; Chen, Junji</creator><creatorcontrib>Tan, Lirui ; Zheng, Qiuju ; Chen, Junji</creatorcontrib><description>Network security is one of the key concerns with wireless sensor networks. Because sensor nodes employ radio channel frequencies, which are riskier than traditional networks, the attacker may be able to force the node to compromise, disrupt data integrity, eavesdrop, or insert false data into the network, wasting network resources. Creating dependable sensor networks that offer the highest level of security while using the fewest resources is thus one of the problems. The designers of wireless sensor networks can take into account providing an efficient key management system that can enhance any efficiency features such as communication overhead, calculation rate, memory demand, and energy consumption rate. The energy level of nodes is determined in this article using a novel approach based on fuzzy systems and simple to implement in both hardware and software. In this study, the memory needed to carry out the plan was decreased, and the search performance was raised by integrating elliptic curve cryptography with an AVL search tree and a LEACH model. Also, the frequency range of radio channels in this study is 2.4 GHz. Based on the theoretical analysis as well as the outcomes of the experiments, the suggested key management strategy for wireless sensor networks improves security while also reducing computational overhead by 23%, energy consumption by 14%, and memory consumption parameters by 14%. 18% of people have used the network. Additionally, it was demonstrated that the suggested approach is scalable and extendable. Because of this, the suggested technique has a wide range of applications in massive wireless sensor networks.</description><identifier>ISSN: 1064-1246</identifier><identifier>EISSN: 1875-8967</identifier><identifier>DOI: 10.3233/JIFS-233476</identifier><language>eng</language><publisher>Amsterdam: IOS Press BV</publisher><subject>Cryptography ; Curves ; Energy consumption ; Energy levels ; Frequency ranges ; Fuzzy systems ; Network security ; Nodes ; Radio ; Sensors ; Wireless sensor networks</subject><ispartof>Journal of intelligent & fuzzy systems, 2023-12, Vol.45 (6), p.10451-10466</ispartof><rights>Copyright IOS Press BV 2023</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c219t-589341457e4d60ae2bad0aefdff7f3b1a9ebb59e3d18b5208b9c5f8211665d373</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27924,27925</link.rule.ids></links><search><creatorcontrib>Tan, Lirui</creatorcontrib><creatorcontrib>Zheng, Qiuju</creatorcontrib><creatorcontrib>Chen, Junji</creatorcontrib><title>Providing an effective key management scheme to increase transaction security of homogeneous mobile wireless sensor networks</title><title>Journal of intelligent & fuzzy systems</title><description>Network security is one of the key concerns with wireless sensor networks. Because sensor nodes employ radio channel frequencies, which are riskier than traditional networks, the attacker may be able to force the node to compromise, disrupt data integrity, eavesdrop, or insert false data into the network, wasting network resources. Creating dependable sensor networks that offer the highest level of security while using the fewest resources is thus one of the problems. The designers of wireless sensor networks can take into account providing an efficient key management system that can enhance any efficiency features such as communication overhead, calculation rate, memory demand, and energy consumption rate. The energy level of nodes is determined in this article using a novel approach based on fuzzy systems and simple to implement in both hardware and software. In this study, the memory needed to carry out the plan was decreased, and the search performance was raised by integrating elliptic curve cryptography with an AVL search tree and a LEACH model. Also, the frequency range of radio channels in this study is 2.4 GHz. Based on the theoretical analysis as well as the outcomes of the experiments, the suggested key management strategy for wireless sensor networks improves security while also reducing computational overhead by 23%, energy consumption by 14%, and memory consumption parameters by 14%. 18% of people have used the network. Additionally, it was demonstrated that the suggested approach is scalable and extendable. Because of this, the suggested technique has a wide range of applications in massive wireless sensor networks.</description><subject>Cryptography</subject><subject>Curves</subject><subject>Energy consumption</subject><subject>Energy levels</subject><subject>Frequency ranges</subject><subject>Fuzzy systems</subject><subject>Network security</subject><subject>Nodes</subject><subject>Radio</subject><subject>Sensors</subject><subject>Wireless sensor networks</subject><issn>1064-1246</issn><issn>1875-8967</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2023</creationdate><recordtype>article</recordtype><recordid>eNotkFFLwzAUhYMoOKdP_oGAj1JtmqZpH2U4nQwU1OeStjdbtjWZuenGwB9vxnw638PHudxDyC1LH3jG-ePbbPqZRMhlcUZGrJQiKatCnkdOizxhWV5ckivEVZoyKbJ0RH4_vNuZztgFVZaC1tAGswO6hgPtlVUL6MEGiu0yAg2OGtt6UBjZK4sq2s5ShHbwJhyo03TpercAC25A2rvGbIDujYcNIEbPovPUQtg7v8ZrcqHVBuHmP8fke_r8NXlN5u8vs8nTPGkzVoVElBXPWS4k5F2RKsga1cXQndZS84apCppGVMA7Vjbxq7KpWqHLjLGiEB2XfEzuTr1b734GwFCv3OBtPFlnZSWFjO15tO5PVusdogddb73plT_ULK2P89bHeevTvPwPsQRwiw</recordid><startdate>20231202</startdate><enddate>20231202</enddate><creator>Tan, Lirui</creator><creator>Zheng, Qiuju</creator><creator>Chen, Junji</creator><general>IOS Press BV</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>20231202</creationdate><title>Providing an effective key management scheme to increase transaction security of homogeneous mobile wireless sensor networks</title><author>Tan, Lirui ; Zheng, Qiuju ; Chen, Junji</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c219t-589341457e4d60ae2bad0aefdff7f3b1a9ebb59e3d18b5208b9c5f8211665d373</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2023</creationdate><topic>Cryptography</topic><topic>Curves</topic><topic>Energy consumption</topic><topic>Energy levels</topic><topic>Frequency ranges</topic><topic>Fuzzy systems</topic><topic>Network security</topic><topic>Nodes</topic><topic>Radio</topic><topic>Sensors</topic><topic>Wireless sensor networks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Tan, Lirui</creatorcontrib><creatorcontrib>Zheng, Qiuju</creatorcontrib><creatorcontrib>Chen, Junji</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>Journal of intelligent & fuzzy systems</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Tan, Lirui</au><au>Zheng, Qiuju</au><au>Chen, Junji</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Providing an effective key management scheme to increase transaction security of homogeneous mobile wireless sensor networks</atitle><jtitle>Journal of intelligent & fuzzy systems</jtitle><date>2023-12-02</date><risdate>2023</risdate><volume>45</volume><issue>6</issue><spage>10451</spage><epage>10466</epage><pages>10451-10466</pages><issn>1064-1246</issn><eissn>1875-8967</eissn><abstract>Network security is one of the key concerns with wireless sensor networks. Because sensor nodes employ radio channel frequencies, which are riskier than traditional networks, the attacker may be able to force the node to compromise, disrupt data integrity, eavesdrop, or insert false data into the network, wasting network resources. Creating dependable sensor networks that offer the highest level of security while using the fewest resources is thus one of the problems. The designers of wireless sensor networks can take into account providing an efficient key management system that can enhance any efficiency features such as communication overhead, calculation rate, memory demand, and energy consumption rate. The energy level of nodes is determined in this article using a novel approach based on fuzzy systems and simple to implement in both hardware and software. In this study, the memory needed to carry out the plan was decreased, and the search performance was raised by integrating elliptic curve cryptography with an AVL search tree and a LEACH model. Also, the frequency range of radio channels in this study is 2.4 GHz. Based on the theoretical analysis as well as the outcomes of the experiments, the suggested key management strategy for wireless sensor networks improves security while also reducing computational overhead by 23%, energy consumption by 14%, and memory consumption parameters by 14%. 18% of people have used the network. Additionally, it was demonstrated that the suggested approach is scalable and extendable. Because of this, the suggested technique has a wide range of applications in massive wireless sensor networks.</abstract><cop>Amsterdam</cop><pub>IOS Press BV</pub><doi>10.3233/JIFS-233476</doi><tpages>16</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1064-1246 |
ispartof | Journal of intelligent & fuzzy systems, 2023-12, Vol.45 (6), p.10451-10466 |
issn | 1064-1246 1875-8967 |
language | eng |
recordid | cdi_proquest_journals_2897574144 |
source | EBSCOhost Business Source Complete |
subjects | Cryptography Curves Energy consumption Energy levels Frequency ranges Fuzzy systems Network security Nodes Radio Sensors Wireless sensor networks |
title | Providing an effective key management scheme to increase transaction security of homogeneous mobile wireless sensor networks |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-30T21%3A08%3A21IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Providing%20an%20effective%20key%20management%20scheme%20to%20increase%20transaction%20security%20of%20homogeneous%20mobile%20wireless%20sensor%20networks&rft.jtitle=Journal%20of%20intelligent%20&%20fuzzy%20systems&rft.au=Tan,%20Lirui&rft.date=2023-12-02&rft.volume=45&rft.issue=6&rft.spage=10451&rft.epage=10466&rft.pages=10451-10466&rft.issn=1064-1246&rft.eissn=1875-8967&rft_id=info:doi/10.3233/JIFS-233476&rft_dat=%3Cproquest_cross%3E2897574144%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2897574144&rft_id=info:pmid/&rfr_iscdi=true |