Providing an effective key management scheme to increase transaction security of homogeneous mobile wireless sensor networks

Network security is one of the key concerns with wireless sensor networks. Because sensor nodes employ radio channel frequencies, which are riskier than traditional networks, the attacker may be able to force the node to compromise, disrupt data integrity, eavesdrop, or insert false data into the ne...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Journal of intelligent & fuzzy systems 2023-12, Vol.45 (6), p.10451-10466
Hauptverfasser: Tan, Lirui, Zheng, Qiuju, Chen, Junji
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 10466
container_issue 6
container_start_page 10451
container_title Journal of intelligent & fuzzy systems
container_volume 45
creator Tan, Lirui
Zheng, Qiuju
Chen, Junji
description Network security is one of the key concerns with wireless sensor networks. Because sensor nodes employ radio channel frequencies, which are riskier than traditional networks, the attacker may be able to force the node to compromise, disrupt data integrity, eavesdrop, or insert false data into the network, wasting network resources. Creating dependable sensor networks that offer the highest level of security while using the fewest resources is thus one of the problems. The designers of wireless sensor networks can take into account providing an efficient key management system that can enhance any efficiency features such as communication overhead, calculation rate, memory demand, and energy consumption rate. The energy level of nodes is determined in this article using a novel approach based on fuzzy systems and simple to implement in both hardware and software. In this study, the memory needed to carry out the plan was decreased, and the search performance was raised by integrating elliptic curve cryptography with an AVL search tree and a LEACH model. Also, the frequency range of radio channels in this study is 2.4 GHz. Based on the theoretical analysis as well as the outcomes of the experiments, the suggested key management strategy for wireless sensor networks improves security while also reducing computational overhead by 23%, energy consumption by 14%, and memory consumption parameters by 14%. 18% of people have used the network. Additionally, it was demonstrated that the suggested approach is scalable and extendable. Because of this, the suggested technique has a wide range of applications in massive wireless sensor networks.
doi_str_mv 10.3233/JIFS-233476
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2897574144</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2897574144</sourcerecordid><originalsourceid>FETCH-LOGICAL-c219t-589341457e4d60ae2bad0aefdff7f3b1a9ebb59e3d18b5208b9c5f8211665d373</originalsourceid><addsrcrecordid>eNotkFFLwzAUhYMoOKdP_oGAj1JtmqZpH2U4nQwU1OeStjdbtjWZuenGwB9vxnw638PHudxDyC1LH3jG-ePbbPqZRMhlcUZGrJQiKatCnkdOizxhWV5ckivEVZoyKbJ0RH4_vNuZztgFVZaC1tAGswO6hgPtlVUL6MEGiu0yAg2OGtt6UBjZK4sq2s5ShHbwJhyo03TpercAC25A2rvGbIDujYcNIEbPovPUQtg7v8ZrcqHVBuHmP8fke_r8NXlN5u8vs8nTPGkzVoVElBXPWS4k5F2RKsga1cXQndZS84apCppGVMA7Vjbxq7KpWqHLjLGiEB2XfEzuTr1b734GwFCv3OBtPFlnZSWFjO15tO5PVusdogddb73plT_ULK2P89bHeevTvPwPsQRwiw</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2897574144</pqid></control><display><type>article</type><title>Providing an effective key management scheme to increase transaction security of homogeneous mobile wireless sensor networks</title><source>EBSCOhost Business Source Complete</source><creator>Tan, Lirui ; Zheng, Qiuju ; Chen, Junji</creator><creatorcontrib>Tan, Lirui ; Zheng, Qiuju ; Chen, Junji</creatorcontrib><description>Network security is one of the key concerns with wireless sensor networks. Because sensor nodes employ radio channel frequencies, which are riskier than traditional networks, the attacker may be able to force the node to compromise, disrupt data integrity, eavesdrop, or insert false data into the network, wasting network resources. Creating dependable sensor networks that offer the highest level of security while using the fewest resources is thus one of the problems. The designers of wireless sensor networks can take into account providing an efficient key management system that can enhance any efficiency features such as communication overhead, calculation rate, memory demand, and energy consumption rate. The energy level of nodes is determined in this article using a novel approach based on fuzzy systems and simple to implement in both hardware and software. In this study, the memory needed to carry out the plan was decreased, and the search performance was raised by integrating elliptic curve cryptography with an AVL search tree and a LEACH model. Also, the frequency range of radio channels in this study is 2.4 GHz. Based on the theoretical analysis as well as the outcomes of the experiments, the suggested key management strategy for wireless sensor networks improves security while also reducing computational overhead by 23%, energy consumption by 14%, and memory consumption parameters by 14%. 18% of people have used the network. Additionally, it was demonstrated that the suggested approach is scalable and extendable. Because of this, the suggested technique has a wide range of applications in massive wireless sensor networks.</description><identifier>ISSN: 1064-1246</identifier><identifier>EISSN: 1875-8967</identifier><identifier>DOI: 10.3233/JIFS-233476</identifier><language>eng</language><publisher>Amsterdam: IOS Press BV</publisher><subject>Cryptography ; Curves ; Energy consumption ; Energy levels ; Frequency ranges ; Fuzzy systems ; Network security ; Nodes ; Radio ; Sensors ; Wireless sensor networks</subject><ispartof>Journal of intelligent &amp; fuzzy systems, 2023-12, Vol.45 (6), p.10451-10466</ispartof><rights>Copyright IOS Press BV 2023</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c219t-589341457e4d60ae2bad0aefdff7f3b1a9ebb59e3d18b5208b9c5f8211665d373</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27924,27925</link.rule.ids></links><search><creatorcontrib>Tan, Lirui</creatorcontrib><creatorcontrib>Zheng, Qiuju</creatorcontrib><creatorcontrib>Chen, Junji</creatorcontrib><title>Providing an effective key management scheme to increase transaction security of homogeneous mobile wireless sensor networks</title><title>Journal of intelligent &amp; fuzzy systems</title><description>Network security is one of the key concerns with wireless sensor networks. Because sensor nodes employ radio channel frequencies, which are riskier than traditional networks, the attacker may be able to force the node to compromise, disrupt data integrity, eavesdrop, or insert false data into the network, wasting network resources. Creating dependable sensor networks that offer the highest level of security while using the fewest resources is thus one of the problems. The designers of wireless sensor networks can take into account providing an efficient key management system that can enhance any efficiency features such as communication overhead, calculation rate, memory demand, and energy consumption rate. The energy level of nodes is determined in this article using a novel approach based on fuzzy systems and simple to implement in both hardware and software. In this study, the memory needed to carry out the plan was decreased, and the search performance was raised by integrating elliptic curve cryptography with an AVL search tree and a LEACH model. Also, the frequency range of radio channels in this study is 2.4 GHz. Based on the theoretical analysis as well as the outcomes of the experiments, the suggested key management strategy for wireless sensor networks improves security while also reducing computational overhead by 23%, energy consumption by 14%, and memory consumption parameters by 14%. 18% of people have used the network. Additionally, it was demonstrated that the suggested approach is scalable and extendable. Because of this, the suggested technique has a wide range of applications in massive wireless sensor networks.</description><subject>Cryptography</subject><subject>Curves</subject><subject>Energy consumption</subject><subject>Energy levels</subject><subject>Frequency ranges</subject><subject>Fuzzy systems</subject><subject>Network security</subject><subject>Nodes</subject><subject>Radio</subject><subject>Sensors</subject><subject>Wireless sensor networks</subject><issn>1064-1246</issn><issn>1875-8967</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2023</creationdate><recordtype>article</recordtype><recordid>eNotkFFLwzAUhYMoOKdP_oGAj1JtmqZpH2U4nQwU1OeStjdbtjWZuenGwB9vxnw638PHudxDyC1LH3jG-ePbbPqZRMhlcUZGrJQiKatCnkdOizxhWV5ckivEVZoyKbJ0RH4_vNuZztgFVZaC1tAGswO6hgPtlVUL6MEGiu0yAg2OGtt6UBjZK4sq2s5ShHbwJhyo03TpercAC25A2rvGbIDujYcNIEbPovPUQtg7v8ZrcqHVBuHmP8fke_r8NXlN5u8vs8nTPGkzVoVElBXPWS4k5F2RKsga1cXQndZS84apCppGVMA7Vjbxq7KpWqHLjLGiEB2XfEzuTr1b734GwFCv3OBtPFlnZSWFjO15tO5PVusdogddb73plT_ULK2P89bHeevTvPwPsQRwiw</recordid><startdate>20231202</startdate><enddate>20231202</enddate><creator>Tan, Lirui</creator><creator>Zheng, Qiuju</creator><creator>Chen, Junji</creator><general>IOS Press BV</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>20231202</creationdate><title>Providing an effective key management scheme to increase transaction security of homogeneous mobile wireless sensor networks</title><author>Tan, Lirui ; Zheng, Qiuju ; Chen, Junji</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c219t-589341457e4d60ae2bad0aefdff7f3b1a9ebb59e3d18b5208b9c5f8211665d373</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2023</creationdate><topic>Cryptography</topic><topic>Curves</topic><topic>Energy consumption</topic><topic>Energy levels</topic><topic>Frequency ranges</topic><topic>Fuzzy systems</topic><topic>Network security</topic><topic>Nodes</topic><topic>Radio</topic><topic>Sensors</topic><topic>Wireless sensor networks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Tan, Lirui</creatorcontrib><creatorcontrib>Zheng, Qiuju</creatorcontrib><creatorcontrib>Chen, Junji</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>Journal of intelligent &amp; fuzzy systems</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Tan, Lirui</au><au>Zheng, Qiuju</au><au>Chen, Junji</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Providing an effective key management scheme to increase transaction security of homogeneous mobile wireless sensor networks</atitle><jtitle>Journal of intelligent &amp; fuzzy systems</jtitle><date>2023-12-02</date><risdate>2023</risdate><volume>45</volume><issue>6</issue><spage>10451</spage><epage>10466</epage><pages>10451-10466</pages><issn>1064-1246</issn><eissn>1875-8967</eissn><abstract>Network security is one of the key concerns with wireless sensor networks. Because sensor nodes employ radio channel frequencies, which are riskier than traditional networks, the attacker may be able to force the node to compromise, disrupt data integrity, eavesdrop, or insert false data into the network, wasting network resources. Creating dependable sensor networks that offer the highest level of security while using the fewest resources is thus one of the problems. The designers of wireless sensor networks can take into account providing an efficient key management system that can enhance any efficiency features such as communication overhead, calculation rate, memory demand, and energy consumption rate. The energy level of nodes is determined in this article using a novel approach based on fuzzy systems and simple to implement in both hardware and software. In this study, the memory needed to carry out the plan was decreased, and the search performance was raised by integrating elliptic curve cryptography with an AVL search tree and a LEACH model. Also, the frequency range of radio channels in this study is 2.4 GHz. Based on the theoretical analysis as well as the outcomes of the experiments, the suggested key management strategy for wireless sensor networks improves security while also reducing computational overhead by 23%, energy consumption by 14%, and memory consumption parameters by 14%. 18% of people have used the network. Additionally, it was demonstrated that the suggested approach is scalable and extendable. Because of this, the suggested technique has a wide range of applications in massive wireless sensor networks.</abstract><cop>Amsterdam</cop><pub>IOS Press BV</pub><doi>10.3233/JIFS-233476</doi><tpages>16</tpages></addata></record>
fulltext fulltext
identifier ISSN: 1064-1246
ispartof Journal of intelligent & fuzzy systems, 2023-12, Vol.45 (6), p.10451-10466
issn 1064-1246
1875-8967
language eng
recordid cdi_proquest_journals_2897574144
source EBSCOhost Business Source Complete
subjects Cryptography
Curves
Energy consumption
Energy levels
Frequency ranges
Fuzzy systems
Network security
Nodes
Radio
Sensors
Wireless sensor networks
title Providing an effective key management scheme to increase transaction security of homogeneous mobile wireless sensor networks
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-30T21%3A08%3A21IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Providing%20an%20effective%20key%20management%20scheme%20to%20increase%20transaction%20security%20of%20homogeneous%20mobile%20wireless%20sensor%20networks&rft.jtitle=Journal%20of%20intelligent%20&%20fuzzy%20systems&rft.au=Tan,%20Lirui&rft.date=2023-12-02&rft.volume=45&rft.issue=6&rft.spage=10451&rft.epage=10466&rft.pages=10451-10466&rft.issn=1064-1246&rft.eissn=1875-8967&rft_id=info:doi/10.3233/JIFS-233476&rft_dat=%3Cproquest_cross%3E2897574144%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2897574144&rft_id=info:pmid/&rfr_iscdi=true