Smart City Gnosys

Smart city article details

Title Data Security In Wireless Sensor Networks Using An Efficient Cryptographic Technique To Protect Against Intrusion
ID_Doc 17349
Authors Mary S.S.C.; Shri S.J.; Thenmozhi E.; Murugeswari K.
Year 2023
Published SSRG International Journal of Electronics and Communication Engineering, 10, 4
DOI http://dx.doi.org/10.14445/23488549/IJECE-V10I4P105
Abstract The ubiquitous nature of wireless sensor networks (WSNs) means that their underlying network architecture may be used to serve a broad range of use cases, from “smart cities” to “smart homes” and beyond. Other serious problems, such as energy use and security, have persisted. When it comes to WSN security, the blockchain might be the answer. Traditional blockchains have limitations, such as inefficient transaction processing and limited scalability. When Wireless Sensor Networks (WSNs) are deployed, most of the time, the nodes are left unmanaged and vulnerable to various security threats. Reliable data distribution in WSNs is nontrivial because of the limited resources and dynamic behavior of sensor nodes. Traditional cryptography and authentication-based methods have been shown to be unsuitable for countering node misbehavior attacks due to their high cost and incapability. The lightweight authentication encryption system was developed to solve the problems of sensor resource scarcity and data security (data integrity and secrecy). Current trust-based solutions, on the other hand, increase traffic congestion and decrease the network's lifespan due to the high costs associated with trust estimates and network-wide dissemination. As a result, the objective of this study is to present an intrusion prevention architecture for mobile Internet of Things devices, along with its integration into WSN, to ensure data security while simultaneously improving the network delivery ratio. The architecture that has been suggested is made up of two different discrete components. To begin, the ambiguity principle is used to construct non-overlapping and independently structured clusters, which are then used to preserve the clusters' stability. Second, based on the architecture of the blockchain, encrypted multi-hop routing pathways with end-to-end coverage are being established. By reducing end-to-end latency, time consumption, packet loss rate, and energy usage while increasing throughput, our recommended model's simulation results reveal good results and security gains. © 2023 Seventh Sense Research Group.
Author Keywords Cluster; Data security; Encryption; Intrusion prevention; WSN


Similar Articles


Id Similarity Authors Title Published
24139 View0.899Rehman A.; Abdullah S.; Fatima M.; Iqbal M.W.; Almarhabi K.A.; Ashraf M.U.; Ali S.Ensuring Security And Energy Efficiency Of Wireless Sensor Network By Using BlockchainApplied Sciences (Switzerland), 12, 21 (2022)
12547 View0.894Mishra A.K.; Surve T.; Tyagi A.K.Blockchain Technology For Smart Wireless Sensor NetworksBlockchain and Digital Twin for Smart Healthcare (2025)
12701 View0.89Tuteja G.; Rani S.; Sharma A.; Singla S.Blockchain-Enabled Security And Integrity Mechanisms For Wireless Sensor Networks In Iot Systems2024 Global Conference on Communications and Information Technologies, GCCIT 2024 (2024)
23770 View0.878Tuteja G.; Rani S.; Sharma A.Enhancing Data Integrity And Authentication In Wsn-Iot Systems Using Blockchain Technology2024 Global Conference on Communications and Information Technologies, GCCIT 2024 (2024)
494 View0.872Aldawsari H.A Blockchain-Based Approach For Secure Energy-Efficient Iot-Based Wireless Sensor Networks For Smart CitiesAlexandria Engineering Journal, 126 (2025)
12702 View0.866Oh T.Blockchain-Enabled Security Enhancement For Iot Networks: Integrating Leach Algorithm And Distributed Ledger TechnologyJournal of Machine and Computing, 5, 1 (2025)
12449 View0.86Rathod T.; Jadav N.K.; Alshehri M.D.; Tanwar S.; Sharma R.; Felseghi R.-A.; Raboaca M.S.Blockchain For Future Wireless Networks: A Decade SurveySensors, 22, 11 (2022)
23676 View0.86Santhanalakshmi M.; Murthy A.S.D.; Panda M.R.; Prabakaran S.; Rao G.S.; Nidhya M.S.Enhanced Security Model For Heterogeneous Wireless Sensor Networks2024 15th International Conference on Computing Communication and Networking Technologies, ICCCNT 2024 (2024)
8663 View0.859Reddy D.M.K.; Sathya R.; Lakshmi Y.V.A.S.An Investigative Study On Different Security Aspects Of Wireless Sensor NetworksLecture Notes in Networks and Systems, 1227 LNNS (2025)
43001 View0.859Goyat R.; Kumar G.; Saha R.; Conti M.Pribadi: A Decentralized Privacy-Preserving Authentication In Wireless Multimedia Sensor Networks For Smart CitiesCluster Computing, 27, 4 (2024)