Energy-Aware Framework for Assessing Cryptographic Algorithms in Wireless Sensor Networks
Wireless sensor networks have found applications in several areas such as agriculture, healthcare, weather forecasting, and the Internet of Things. Due to their extensive use WSNs are susceptible to several significant network threats. Therefore, they necessitate the implementation of advanced secur...
Saved in:
| Published in | SN computer science Vol. 6; no. 4; p. 331 |
|---|---|
| Main Authors | , , , , |
| Format | Journal Article |
| Language | English |
| Published |
Singapore
Springer Nature Singapore
01.04.2025
Springer Nature B.V |
| Subjects | |
| Online Access | Get full text |
| ISSN | 2661-8907 2662-995X 2661-8907 |
| DOI | 10.1007/s42979-025-03898-2 |
Cover
| Abstract | Wireless sensor networks have found applications in several areas such as agriculture, healthcare, weather forecasting, and the Internet of Things. Due to their extensive use WSNs are susceptible to several significant network threats. Therefore, they necessitate the implementation of advanced security measures. An issue of significant concern is the possible violation of user privacy resulting from the transmission of data. The rapid increase in online transactions and the vast volume of data generated on a daily basis have elevated information security to an important concern in the present era of the internet. Cryptography serves as a durable remedy to these issues by bolstering the confidentiality of data transmitted across the internet. This study analysed many characteristics, such as the total execution time, memory needs, number of packets sent to the base station, number of dead nodes, remaining energy after transmission, and the use of RSA algorithm and Elliptic Curve Cryptography. The simulation is executed in MATLAB utilising pre-defined parameters and constants. A WSN observation scenario was demonstrated with a fixed number of rounds (200) and varying numbers of nodes (5, 10, 15, and 20). The researchers computed the average ratio of packets transferred to the base station, inoperative nodes, and leftover energy after transmission. The upper limit for the number of packets that can be successfully transmitted to the base station using AES is 55%. This is subject to the condition that at least 40% of the nodes are inactive and a maximum of 45% of the nodes have residual energy. The primary achievement of the current work is the identification of the most effective energy-efficient encryption algorithm, as previous research has not focused extensively on this particular characteristic. Based on the simulation results, AES outperforms RSA and Elliptic Curve Cryptography in terms of packet transmission, inactive nodes, and energy conservation. |
|---|---|
| AbstractList | Wireless sensor networks have found applications in several areas such as agriculture, healthcare, weather forecasting, and the Internet of Things. Due to their extensive use WSNs are susceptible to several significant network threats. Therefore, they necessitate the implementation of advanced security measures. An issue of significant concern is the possible violation of user privacy resulting from the transmission of data. The rapid increase in online transactions and the vast volume of data generated on a daily basis have elevated information security to an important concern in the present era of the internet. Cryptography serves as a durable remedy to these issues by bolstering the confidentiality of data transmitted across the internet. This study analysed many characteristics, such as the total execution time, memory needs, number of packets sent to the base station, number of dead nodes, remaining energy after transmission, and the use of RSA algorithm and Elliptic Curve Cryptography. The simulation is executed in MATLAB utilising pre-defined parameters and constants. A WSN observation scenario was demonstrated with a fixed number of rounds (200) and varying numbers of nodes (5, 10, 15, and 20). The researchers computed the average ratio of packets transferred to the base station, inoperative nodes, and leftover energy after transmission. The upper limit for the number of packets that can be successfully transmitted to the base station using AES is 55%. This is subject to the condition that at least 40% of the nodes are inactive and a maximum of 45% of the nodes have residual energy. The primary achievement of the current work is the identification of the most effective energy-efficient encryption algorithm, as previous research has not focused extensively on this particular characteristic. Based on the simulation results, AES outperforms RSA and Elliptic Curve Cryptography in terms of packet transmission, inactive nodes, and energy conservation. |
| ArticleNumber | 331 |
| Author | Saini, Neha Khan, Mohd Anas Pooja Shalu Baghela, Vishwadeepak Singh |
| Author_xml | – sequence: 1 surname: Pooja fullname: Pooja organization: School of Computer Science Engineering and Technology, Bennett University – sequence: 2 surname: Shalu fullname: Shalu email: singhshalu2609@gmail.com organization: Manav Rachna University Faridabad – sequence: 3 givenname: Neha surname: Saini fullname: Saini, Neha organization: Government College Chhachhrauli – sequence: 4 givenname: Vishwadeepak Singh surname: Baghela fullname: Baghela, Vishwadeepak Singh organization: SCSE, Galgotias University – sequence: 5 givenname: Mohd Anas surname: Khan fullname: Khan, Mohd Anas organization: Department of Computer Engineering, Jamia Millia Islamia |
| BookMark | eNp9kEFLwzAYhoNMcM79AU8Bz9E0aZr0WMbmhKEHFfEU0jbtOrekfukY-_d2VtCTp3yH53kDzyUaOe8sQtcRvY0olXchZqlMCWWCUK5SRdgZGrMkiYhKqRz9uS_QNIQNpT1K4zgRY_Q-dxbqI8kOBixegNnZg4cPXHnAWQg2hMbVeAbHtvM1mHbdFDjb1h6abr0LuHH4rQG77Tn8bF3orUfbnRbCFTqvzDbY6c87Qa-L-ctsSVZP9w-zbEWKSElGRG6kEAUXiTBVzMu8pKlRjPNESSoZZwW3VipViJLHXFBFc2tKJkSpeJHSnE_QzbDbgv_c29Dpjd-D67_UPFKxSgRnrKfYQBXgQwBb6RaanYGjjqg-VdRDRd2n0d8V9UnigxR62NUWfqf_sb4Au-x2lA |
| Cites_doi | 10.1002/sec.1059 10.1007/s42979-022-01321-8 10.5120/11507-7224 10.1016/j.jesit.2015.11.005 10.32604/iasc.2021.012806 10.1007/s42979-022-01304-9 10.1109/ICSSIT53264.2022.9716416 10.1109/IBSS.2015.7456652 10.1007/s11277-015-2290-9 10.1002/sec.375 10.1016/B978-0-443-21475-2.00002-3 10.1177/1550147720925772 10.1109/ACCESS.2022.3222488 10.1038/s41598-023-28721-x 10.1109/ACCESS.2023.3247003 10.1002/ep.12895 10.25212/ICoIT17.013 10.1007/s11277-022-10165-7 10.1016/j.icte.2022.02.003 10.1109/ACCESS.2021.3104148 10.1007/978-981-16-1395-1_37 10.1007/s11277-024-11391-x 10.47974/JDMSC-1888 10.1109/ICRITO61523.2024.10522297 10.1007/978-81-322-1157-0_48 10.32604/cmc.2022.028520 10.1080/03772063.2016.1176539 10.1016/j.comcom.2023.06.014 10.14257/ijsia.2015.9.4.27 10.1007/978-3-319-07425-2_25 10.2174/1872212114666191231150916 10.1109/WiMob.2008.16 10.1007/s42979-021-00796-1 10.1109/ICMRSISIIT46373.2020.9405869 10.1049/cp.2013.2337 10.48550/arXiv.1203.3103 10.1080/09720529.2021.1878626 10.1007/s11277-024-10948-0 |
| ContentType | Journal Article |
| Copyright | The Author(s), under exclusive licence to Springer Nature Singapore Pte Ltd. 2025 Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law. Copyright Springer Nature B.V. Apr 2025 |
| Copyright_xml | – notice: The Author(s), under exclusive licence to Springer Nature Singapore Pte Ltd. 2025 Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law. – notice: Copyright Springer Nature B.V. Apr 2025 |
| DBID | AAYXX CITATION JQ2 |
| DOI | 10.1007/s42979-025-03898-2 |
| DatabaseName | CrossRef ProQuest Computer Science Collection |
| DatabaseTitle | CrossRef ProQuest Computer Science Collection |
| DatabaseTitleList | ProQuest Computer Science Collection |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISSN | 2661-8907 |
| ExternalDocumentID | 10_1007_s42979_025_03898_2 |
| GroupedDBID | 0R~ 406 AACDK AAHNG AAJBT AASML AATNV AAUYE ABAKF ABDBE ABECU ABHQN ABJNI ABMQK ABTEG ABTKH ABWNU ACAOD ACDTI ACHSB ACOKC ACPIV ACZOJ ADKFA ADKNI ADTPH ADYFF AEFQL AEMSY AESKC AFBBN AFQWF AGMZJ AGQEE AGRTI AHPBZ AIGIU AILAN AJZVZ ALMA_UNASSIGNED_HOLDINGS AMXSW AMYLF AYFIA BAPOH BSONS DPUIP EBLON EBS FIGPU FNLPD GGCAI GNWQR IKXTQ IWAJR JZLTJ LLZTM NPVJJ NQJWS PT4 ROL RSV SJYHP SNE SOJ SRMVM SSLCW UOJIU UTJUX ZMTXR 2JN AAYXX ABBRH ABFSG ABRTQ ACSTC AEZWR AFDZB AFHIU AFOHR AHWEU AIXLP ATHPR CITATION JQ2 |
| ID | FETCH-LOGICAL-c1872-5ba755c3565af43dbd09a823368707232c3ee788c5d3435080bead255d83c90b3 |
| ISSN | 2661-8907 2662-995X |
| IngestDate | Fri Jul 25 21:06:03 EDT 2025 Wed Oct 01 06:34:05 EDT 2025 Wed Apr 02 01:30:26 EDT 2025 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 4 |
| Keywords | RSA ECC Energy left Symmetric algorithms Cryptography AES Asymmetric algorithm |
| Language | English |
| LinkModel | OpenURL |
| MergedId | FETCHMERGED-LOGICAL-c1872-5ba755c3565af43dbd09a823368707232c3ee788c5d3435080bead255d83c90b3 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| PQID | 3184865322 |
| PQPubID | 6623307 |
| ParticipantIDs | proquest_journals_3184865322 crossref_primary_10_1007_s42979_025_03898_2 springer_journals_10_1007_s42979_025_03898_2 |
| ProviderPackageCode | CITATION AAYXX |
| PublicationCentury | 2000 |
| PublicationDate | 20250401 2025-04-01 |
| PublicationDateYYYYMMDD | 2025-04-01 |
| PublicationDate_xml | – month: 4 year: 2025 text: 20250401 day: 1 |
| PublicationDecade | 2020 |
| PublicationPlace | Singapore |
| PublicationPlace_xml | – name: Singapore – name: Kolkata |
| PublicationTitle | SN computer science |
| PublicationTitleAbbrev | SN COMPUT. SCI |
| PublicationYear | 2025 |
| Publisher | Springer Nature Singapore Springer Nature B.V |
| Publisher_xml | – name: Springer Nature Singapore – name: Springer Nature B.V |
| References | 3898_CR28 3898_CR29 T Khan (3898_CR44) 2024; 134 3898_CR8 T Khan (3898_CR47) 2023; 209 3898_CR9 3898_CR6 3898_CR7 3898_CR4 RK Kodali (3898_CR17) 2014 3898_CR5 3898_CR2 3898_CR3 M Aldaseen (3898_CR38) 2022 3898_CR20 3898_CR1 3898_CR21 3898_CR22 A Singh (3898_CR23) 2021 3898_CR24 3898_CR25 3898_CR26 3898_CR27 3898_CR39 T Khan (3898_CR43) 2023; 129 B Kumar (3898_CR10) 2023; 11 3898_CR30 3898_CR31 3898_CR32 3898_CR33 3898_CR34 Mohammed Faris1 (3898_CR11) 2023; 15 3898_CR37 MA Al-Shareeda (3898_CR36) 2022; 10 3898_CR40 3898_CR41 3898_CR45 3898_CR46 3898_CR48 3898_CR49 3898_CR18 3898_CR19 NP Sable (3898_CR42) 2024; 27 3898_CR12 MA Al-Shareeda (3898_CR35) 2021; 9 3898_CR13 3898_CR14 3898_CR15 3898_CR16 A Dagar (3898_CR50) 2023; 26 |
| References_xml | – ident: 3898_CR4 doi: 10.1002/sec.1059 – ident: 3898_CR26 doi: 10.1007/s42979-022-01321-8 – ident: 3898_CR16 doi: 10.5120/11507-7224 – ident: 3898_CR30 – ident: 3898_CR34 – ident: 3898_CR13 doi: 10.1016/j.jesit.2015.11.005 – year: 2021 ident: 3898_CR23 doi: 10.32604/iasc.2021.012806 – ident: 3898_CR25 doi: 10.1007/s42979-022-01304-9 – ident: 3898_CR29 doi: 10.1109/ICSSIT53264.2022.9716416 – volume: 15 start-page: 1 year: 2023 ident: 3898_CR11 publication-title: Int J Eng Bus Manage – ident: 3898_CR37 doi: 10.1109/IBSS.2015.7456652 – ident: 3898_CR8 doi: 10.1007/s11277-015-2290-9 – ident: 3898_CR40 doi: 10.1002/sec.375 – ident: 3898_CR49 doi: 10.1016/B978-0-443-21475-2.00002-3 – ident: 3898_CR22 doi: 10.1177/1550147720925772 – ident: 3898_CR14 – volume: 10 start-page: 120606 year: 2022 ident: 3898_CR36 publication-title: IEEE Access doi: 10.1109/ACCESS.2022.3222488 – ident: 3898_CR48 doi: 10.1038/s41598-023-28721-x – volume: 11 start-page: 40488 year: 2023 ident: 3898_CR10 publication-title: IEEE Access doi: 10.1109/ACCESS.2023.3247003 – ident: 3898_CR18 – ident: 3898_CR7 – ident: 3898_CR21 doi: 10.1002/ep.12895 – ident: 3898_CR41 doi: 10.25212/ICoIT17.013 – volume: 129 start-page: 953 issue: 2 year: 2023 ident: 3898_CR43 publication-title: Wireless Pers Commun doi: 10.1007/s11277-022-10165-7 – ident: 3898_CR20 – ident: 3898_CR24 doi: 10.1016/j.icte.2022.02.003 – volume: 9 start-page: 113226 year: 2021 ident: 3898_CR35 publication-title: IEEE Access doi: 10.1109/ACCESS.2021.3104148 – ident: 3898_CR9 doi: 10.1007/978-981-16-1395-1_37 – ident: 3898_CR45 – ident: 3898_CR12 doi: 10.1007/s11277-024-11391-x – volume: 27 start-page: 2 year: 2024 ident: 3898_CR42 publication-title: JDMSC doi: 10.47974/JDMSC-1888 – ident: 3898_CR28 doi: 10.1109/ICRITO61523.2024.10522297 – start-page: 471 volume-title: Emerging research in electronics, computer science and technology year: 2014 ident: 3898_CR17 doi: 10.1007/978-81-322-1157-0_48 – year: 2022 ident: 3898_CR38 doi: 10.32604/cmc.2022.028520 – ident: 3898_CR19 doi: 10.1080/03772063.2016.1176539 – ident: 3898_CR32 – ident: 3898_CR2 – volume: 209 start-page: 217 year: 2023 ident: 3898_CR47 publication-title: Comput Commun doi: 10.1016/j.comcom.2023.06.014 – ident: 3898_CR33 doi: 10.14257/ijsia.2015.9.4.27 – ident: 3898_CR6 doi: 10.1007/978-3-319-07425-2_25 – ident: 3898_CR46 doi: 10.2174/1872212114666191231150916 – ident: 3898_CR5 – ident: 3898_CR1 doi: 10.1109/WiMob.2008.16 – ident: 3898_CR27 doi: 10.1007/s42979-021-00796-1 – volume: 26 start-page: 2007 year: 2023 ident: 3898_CR50 publication-title: J Discrete Math Sci Crypt – ident: 3898_CR39 doi: 10.1109/ICMRSISIIT46373.2020.9405869 – ident: 3898_CR3 doi: 10.1049/cp.2013.2337 – ident: 3898_CR31 doi: 10.48550/arXiv.1203.3103 – ident: 3898_CR15 doi: 10.1080/09720529.2021.1878626 – volume: 134 start-page: 1389 issue: 3 year: 2024 ident: 3898_CR44 publication-title: Wireless Pers Commun doi: 10.1007/s11277-024-10948-0 |
| SSID | ssj0002504465 |
| Score | 2.2896662 |
| Snippet | Wireless sensor networks have found applications in several areas such as agriculture, healthcare, weather forecasting, and the Internet of Things. Due to... |
| SourceID | proquest crossref springer |
| SourceType | Aggregation Database Index Database Publisher |
| StartPage | 331 |
| SubjectTerms | Algorithms Computer Imaging Computer Science Computer Systems Organization and Communication Networks Cryptography Curves Cybersecurity Data Structures and Information Theory Energy consumption Energy efficiency Energy management Information Systems and Communication Service Internet of Things Nodes Original Research Packet transmission Pattern Recognition and Graphics Privacy Residual energy Security for Communication and Computing Application Software Engineering/Programming and Operating Systems Vision Weather forecasting Wireless sensor networks |
| Title | Energy-Aware Framework for Assessing Cryptographic Algorithms in Wireless Sensor Networks |
| URI | https://link.springer.com/article/10.1007/s42979-025-03898-2 https://www.proquest.com/docview/3184865322 |
| Volume | 6 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVLSH databaseName: SpringerLink Journals customDbUrl: mediaType: online eissn: 2661-8907 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0002504465 issn: 2661-8907 databaseCode: AFBBN dateStart: 20190625 isFulltext: true providerName: Library Specific Holdings |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LT-MwELZW5bIXYBcQ5bHygVsxysNJnGNBraqVtpcCglNkOw4plAa1QQh-PWPn2QUk4BK1ietEma8z39jf2AgdKZWE1OI2sZ1YEa27IJyJhNiBLQM_hqDH9YD-v7E_uqB_r7yrRtZsqktycSJf3q0r-Y5V4RzYVVfJfsGydadwAj6DfeEIFobjp2w8MIV7pP-k5VvDSmZllIPFZK6Z1F88P-TFwtRT2evPbrLFNE_vjQ5Wa19n2tdNIJvNTPmv7mHZpqyTsdGd660femW8rP1plt3Wbn2S8tlj_UVvPGGQptIm5ec3qZoZtno5XaZPPFYQDO96E3jMtD384Hgt1Up7-FFrq_WMh_4Fh8yheBJlHJnmAISFxe62ldf1W-Ci7_ryQr6xhIAZhMTcGcgVK4slV9fIrtdeNo0jaByZxhEE5zUH_L3VQWv94enpuB5_00u3Ud8r66hMNeWbO61ylSYB-W_O3FCR8020XuYQuF8A4hf6oea_0Ua1Pwcu3fUWum7jA9f4wIAPXOMDr-ADN_jA0zmu8IELfOAKH9voYjg4PxuRcisNIm0WOMQTPPA86QJ95wl1YxFbIWeO6_rgrwNg1dJVKmBMerELBBrSCAEuBtLNmLkytIS7gzrzbK52ERZAAG3KLUmFRZOYhZwLXU7N_USpkPld1KteWvRQrJgSfWyfLjqo3mtU_rOWEcQZynwPYk0XHVfvurn8cW97X2u-j342kD5AnXzxqA6BY-biTwmXV98hfVE |
| linkProvider | Library Specific Holdings |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Energy-Aware+Framework+for+Assessing+Cryptographic+Algorithms+in+Wireless+Sensor+Networks&rft.jtitle=SN+computer+science&rft.au=Pooja&rft.au=Shalu&rft.au=Saini%2C+Neha&rft.au=Baghela%2C+Vishwadeepak+Singh&rft.date=2025-04-01&rft.pub=Springer+Nature+Singapore&rft.eissn=2661-8907&rft.volume=6&rft.issue=4&rft_id=info:doi/10.1007%2Fs42979-025-03898-2&rft.externalDocID=10_1007_s42979_025_03898_2 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2661-8907&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2661-8907&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2661-8907&client=summon |