Secured wireless sensor networks using hybrid Rivest Shamir Adleman with ant lion optimization algorithm

WIRELESS NETWORKS(2023)

引用 0|浏览1
暂无评分
摘要
The concept of security is quite broad and touches the lives of one million people on a daily basis. Those individuals who depend on networks for activities such as banking, shopping, and filing their tax returns may soon face a potentially significant challenge in the form of network security, which will need to be handled in the not-too-distant future. The solution that is being recommended is a combination of two algorithms: The Hybrid Rivest–Shamir–Adleman (RSA) algorithm and the Ant Lion Optimization Algorithm. There have been two noteworthy developments in the requirements for information security inside a wireless sensor network over the course of the last several decades. First, prior to the broad use of data processing equipment, the security of information that was regarded useful to a wireless sensor network was largely supplied by physical and administrative precautions. This was the case even after the widespread use of data processing equipment. Hash functions are used by these designs whenever Rebalanced RSA is used to encrypt a message. This helps to guarantee that the integrity of the message is not compromised in any way. It has been found out that this novel method is susceptible to attacks based on selected ciphertext as well as adaptive attacks based on chosen ciphertext. A second strategy, which entails converting the ciphertext into binary format, is also one of the options that are being investigated. The binary format is further compressed and coded, which makes it resistant to a variety of attacks, including adaptive chosen ciphertext assaults, selected ciphertext assaults, and other assaults. To get started, a thorough study project on mapping is carried out in order to establish the mapping of assaults and counterattacks that would be most effective. A brand-new index that goes by the name "Threat Severity Index" (TSI) has been developed with the intention of determining how secure each individual system is on the whole. In addition, the decryption performance of RSA-type cryptosystems is researched and compared with that of other RSA-type cryptosystems in order to identify which cryptosystem provides the quickest decryption time. Last but not least, an overall rating of each system is provided, taking into account both its speed and its level of safety.
更多
查看译文
关键词
Ant lion optimization algorithm,Hybrid Rivest–Shamir–Adleman algorithm,Wireless sensor network,Encryption
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要