Key Agreement Scheme for Authorization and Authentication of WSN in IoT-5G Using Elliptic Curve Cryptography.

Autor: Kelagadi, Hemantaraj M., Prasad, M. R., Ramesh, B. T., Bongale, Arun Kumar, Kumar, Satish
Předmět:
Zdroj: Mathematical Modelling of Engineering Problems; Apr2024, Vol. 11 Issue 4, p1060-1070, 11p
Abstrakt: The successful deployment of the Internet of Things (IoT) heavily relies on the integration of Wireless Sensor Networks (WSN) with 5th Generation (5G). However, this integration presents data security challenges during continuous data transactions in WSN. Thus, to provide secured data transfer from any location in WSN, a secured data transmission framework using Public Private and Session-based Elliptic Curve Cryptography (PPSECC) and One Sample Median Vigenere Cipher-based Diffie-Hellman (OSMVC-DH) is proposed. First, the node is registered and then authenticated regarding the node's checksum. Subsequently, Geography and Energy Aware Routing (GEAR) is employed for routing, and the optimal routes are selected using the Triangle Walk strategy-based Coati Optimization Algorithm (TW-COA). The data from sensed nodes are encrypted using PPSECC, based on a Session Key (SK) generated using the OSMVC-DH technique. The encrypted data that transmits through the selected paths is changed into a hashcode using Separate Chaining-based Secure Hash Algorithm 512 (SC-SHA-512). At the receiver end, the hashcode-matched data is decrypted in the server. Hence, the proposed model authorized the user by generating the hashcode in 313ms and secured the data with 98% Security Level and 1137ms Encryption Time, thus showing better performance than existing models. [ABSTRACT FROM AUTHOR]
Databáze: Complementary Index