Abstract
Wireless sensor networks are heavily utilized in numerous applications in both industry and science. As the original data is transferred from the sensor node to the sink node, unauthorized individuals attempt to access it, breaching confidentiality. The first step in enhancing the security of data transmission in a wireless sensor network (WSN) is figuring out the best method for encrypting data as it moves from the sensors to the central node. In order to move encrypted data from different sensor nodes to sink nodes efficiently in wireless sensor networks, this paper introduces a simple data encryption technique.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Veeramani S, Noor Mahammad Sk (2020) An approach to place sink node in a wireless sensor network (WSN). Wireless Pers Commun 111:1117–1127
Hayouni H, Hamdi M, Kim TH (2014) A survey on encryption schemes in wireless sensor networks. In: 7th International conference on advanced software engineering and its applications, pp 39–43
Cao CH, Tang YN, Huang DY, Gan WM, Zhang C (2021) IIBE: an improved identity-based encryption algorithm for WSN security. Secur Commun Netw 1–8:2021
Harn L, Hsu C-F, Xia Z, He Z (2021) Lightweight aggregated data encryption for wireless sensor networks (WSNs). IEEE Sensors Lett 5(4):1–4
Liu J, Liu Z, Sun C, Zhuang J (2022) A data transmission approach based on ant colony optimization and threshold proxy re-encryption in wsns. J Artif Intell Technol 2(1):23–31
Said G, Ghani A, Ullah A, Azeem M, Bilal M, Kwak KS (2022) Light-weight secure aggregated data sharing in IoT-enabled wireless sensor networks. IEEE Access 10:33571–33585
Zhang B (2020) A lightweight data aggregation protocol with privacy-preserving for healthcare wireless sensor networks. IEEE Syst J 15(2):1705–1716
Babaeer HA, Al-Ahmadi SA (2020) Efficient and secure data transmission and sinkhole detection in a multi-clustering wireless sensor network based on homomorphic encryption and watermarking. IEEE Access 8:92098–92109
Burhan IM, khalil Ibrahim S, Jebur ZT, Zahra MMA, Salih MA, Jaleel RA (2021) Secure wireless sensor network using cryptographic technique based hybrid genetic firefly algorithm. Periodicals Eng Nat Sci 9(4):1159–1165
Sivakumar T, Veeramani S, Anusha T (2021) Generation of random key stream using word grid puzzle for the applications of cryptography. WSEAS Trans Comput 20:1–9
Sivakumar T, Veeramani S, Pandi M, Gopal G (2020) A novel encryption of text messages using two fold approach. Recent Adv Comput Sci Commun (Formerly: Recent Pat Comput Sci) 13(6):1106–1112
Thangavelu S, Sonai V, Malaisamy P, Nallakannu SM et al (2020) A novel permutation based encryption using tree traversal approach. Recent Adv Comput Sci Commun (Formerly: Recent Pat Comput Sci) 13(6):1278–1283
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Sonai, V., Bharathi, I. (2024). A Simple Algorithm to Secure Data Dissemination in Wireless Sensor Network. In: Verma, O.P., Wang, L., Kumar, R., Yadav, A. (eds) Machine Intelligence for Research and Innovations. MAiTRI 2023. Lecture Notes in Networks and Systems, vol 832. Springer, Singapore. https://doi.org/10.1007/978-981-99-8129-8_1
Download citation
DOI: https://doi.org/10.1007/978-981-99-8129-8_1
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-99-8128-1
Online ISBN: 978-981-99-8129-8
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)