Energy-Aware Framework for Assessing Cryptographic Algorithms in Wireless Sensor Networks

Wireless sensor networks have found applications in several areas such as agriculture, healthcare, weather forecasting, and the Internet of Things. Due to their extensive use WSNs are susceptible to several significant network threats. Therefore, they necessitate the implementation of advanced secur...

Full description

Saved in:
Bibliographic Details
Published inSN computer science Vol. 6; no. 4; p. 331
Main Authors Pooja, Shalu, Saini, Neha, Baghela, Vishwadeepak Singh, Khan, Mohd Anas
Format Journal Article
LanguageEnglish
Published Singapore Springer Nature Singapore 01.04.2025
Springer Nature B.V
Subjects
Online AccessGet full text
ISSN2661-8907
2662-995X
2661-8907
DOI10.1007/s42979-025-03898-2

Cover

Abstract Wireless sensor networks have found applications in several areas such as agriculture, healthcare, weather forecasting, and the Internet of Things. Due to their extensive use WSNs are susceptible to several significant network threats. Therefore, they necessitate the implementation of advanced security measures. An issue of significant concern is the possible violation of user privacy resulting from the transmission of data. The rapid increase in online transactions and the vast volume of data generated on a daily basis have elevated information security to an important concern in the present era of the internet. Cryptography serves as a durable remedy to these issues by bolstering the confidentiality of data transmitted across the internet. This study analysed many characteristics, such as the total execution time, memory needs, number of packets sent to the base station, number of dead nodes, remaining energy after transmission, and the use of RSA algorithm and Elliptic Curve Cryptography. The simulation is executed in MATLAB utilising pre-defined parameters and constants. A WSN observation scenario was demonstrated with a fixed number of rounds (200) and varying numbers of nodes (5, 10, 15, and 20). The researchers computed the average ratio of packets transferred to the base station, inoperative nodes, and leftover energy after transmission. The upper limit for the number of packets that can be successfully transmitted to the base station using AES is 55%. This is subject to the condition that at least 40% of the nodes are inactive and a maximum of 45% of the nodes have residual energy. The primary achievement of the current work is the identification of the most effective energy-efficient encryption algorithm, as previous research has not focused extensively on this particular characteristic. Based on the simulation results, AES outperforms RSA and Elliptic Curve Cryptography in terms of packet transmission, inactive nodes, and energy conservation.
AbstractList Wireless sensor networks have found applications in several areas such as agriculture, healthcare, weather forecasting, and the Internet of Things. Due to their extensive use WSNs are susceptible to several significant network threats. Therefore, they necessitate the implementation of advanced security measures. An issue of significant concern is the possible violation of user privacy resulting from the transmission of data. The rapid increase in online transactions and the vast volume of data generated on a daily basis have elevated information security to an important concern in the present era of the internet. Cryptography serves as a durable remedy to these issues by bolstering the confidentiality of data transmitted across the internet. This study analysed many characteristics, such as the total execution time, memory needs, number of packets sent to the base station, number of dead nodes, remaining energy after transmission, and the use of RSA algorithm and Elliptic Curve Cryptography. The simulation is executed in MATLAB utilising pre-defined parameters and constants. A WSN observation scenario was demonstrated with a fixed number of rounds (200) and varying numbers of nodes (5, 10, 15, and 20). The researchers computed the average ratio of packets transferred to the base station, inoperative nodes, and leftover energy after transmission. The upper limit for the number of packets that can be successfully transmitted to the base station using AES is 55%. This is subject to the condition that at least 40% of the nodes are inactive and a maximum of 45% of the nodes have residual energy. The primary achievement of the current work is the identification of the most effective energy-efficient encryption algorithm, as previous research has not focused extensively on this particular characteristic. Based on the simulation results, AES outperforms RSA and Elliptic Curve Cryptography in terms of packet transmission, inactive nodes, and energy conservation.
ArticleNumber 331
Author Saini, Neha
Khan, Mohd Anas
Pooja
Shalu
Baghela, Vishwadeepak Singh
Author_xml – sequence: 1
  surname: Pooja
  fullname: Pooja
  organization: School of Computer Science Engineering and Technology, Bennett University
– sequence: 2
  surname: Shalu
  fullname: Shalu
  email: singhshalu2609@gmail.com
  organization: Manav Rachna University Faridabad
– sequence: 3
  givenname: Neha
  surname: Saini
  fullname: Saini, Neha
  organization: Government College Chhachhrauli
– sequence: 4
  givenname: Vishwadeepak Singh
  surname: Baghela
  fullname: Baghela, Vishwadeepak Singh
  organization: SCSE, Galgotias University
– sequence: 5
  givenname: Mohd Anas
  surname: Khan
  fullname: Khan, Mohd Anas
  organization: Department of Computer Engineering, Jamia Millia Islamia
BookMark eNp9kEFLwzAYhoNMcM79AU8Bz9E0aZr0WMbmhKEHFfEU0jbtOrekfukY-_d2VtCTp3yH53kDzyUaOe8sQtcRvY0olXchZqlMCWWCUK5SRdgZGrMkiYhKqRz9uS_QNIQNpT1K4zgRY_Q-dxbqI8kOBixegNnZg4cPXHnAWQg2hMbVeAbHtvM1mHbdFDjb1h6abr0LuHH4rQG77Tn8bF3orUfbnRbCFTqvzDbY6c87Qa-L-ctsSVZP9w-zbEWKSElGRG6kEAUXiTBVzMu8pKlRjPNESSoZZwW3VipViJLHXFBFc2tKJkSpeJHSnE_QzbDbgv_c29Dpjd-D67_UPFKxSgRnrKfYQBXgQwBb6RaanYGjjqg-VdRDRd2n0d8V9UnigxR62NUWfqf_sb4Au-x2lA
Cites_doi 10.1002/sec.1059
10.1007/s42979-022-01321-8
10.5120/11507-7224
10.1016/j.jesit.2015.11.005
10.32604/iasc.2021.012806
10.1007/s42979-022-01304-9
10.1109/ICSSIT53264.2022.9716416
10.1109/IBSS.2015.7456652
10.1007/s11277-015-2290-9
10.1002/sec.375
10.1016/B978-0-443-21475-2.00002-3
10.1177/1550147720925772
10.1109/ACCESS.2022.3222488
10.1038/s41598-023-28721-x
10.1109/ACCESS.2023.3247003
10.1002/ep.12895
10.25212/ICoIT17.013
10.1007/s11277-022-10165-7
10.1016/j.icte.2022.02.003
10.1109/ACCESS.2021.3104148
10.1007/978-981-16-1395-1_37
10.1007/s11277-024-11391-x
10.47974/JDMSC-1888
10.1109/ICRITO61523.2024.10522297
10.1007/978-81-322-1157-0_48
10.32604/cmc.2022.028520
10.1080/03772063.2016.1176539
10.1016/j.comcom.2023.06.014
10.14257/ijsia.2015.9.4.27
10.1007/978-3-319-07425-2_25
10.2174/1872212114666191231150916
10.1109/WiMob.2008.16
10.1007/s42979-021-00796-1
10.1109/ICMRSISIIT46373.2020.9405869
10.1049/cp.2013.2337
10.48550/arXiv.1203.3103
10.1080/09720529.2021.1878626
10.1007/s11277-024-10948-0
ContentType Journal Article
Copyright The Author(s), under exclusive licence to Springer Nature Singapore Pte Ltd. 2025 Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
Copyright Springer Nature B.V. Apr 2025
Copyright_xml – notice: The Author(s), under exclusive licence to Springer Nature Singapore Pte Ltd. 2025 Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
– notice: Copyright Springer Nature B.V. Apr 2025
DBID AAYXX
CITATION
JQ2
DOI 10.1007/s42979-025-03898-2
DatabaseName CrossRef
ProQuest Computer Science Collection
DatabaseTitle CrossRef
ProQuest Computer Science Collection
DatabaseTitleList ProQuest Computer Science Collection

DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 2661-8907
ExternalDocumentID 10_1007_s42979_025_03898_2
GroupedDBID 0R~
406
AACDK
AAHNG
AAJBT
AASML
AATNV
AAUYE
ABAKF
ABDBE
ABECU
ABHQN
ABJNI
ABMQK
ABTEG
ABTKH
ABWNU
ACAOD
ACDTI
ACHSB
ACOKC
ACPIV
ACZOJ
ADKFA
ADKNI
ADTPH
ADYFF
AEFQL
AEMSY
AESKC
AFBBN
AFQWF
AGMZJ
AGQEE
AGRTI
AHPBZ
AIGIU
AILAN
AJZVZ
ALMA_UNASSIGNED_HOLDINGS
AMXSW
AMYLF
AYFIA
BAPOH
BSONS
DPUIP
EBLON
EBS
FIGPU
FNLPD
GGCAI
GNWQR
IKXTQ
IWAJR
JZLTJ
LLZTM
NPVJJ
NQJWS
PT4
ROL
RSV
SJYHP
SNE
SOJ
SRMVM
SSLCW
UOJIU
UTJUX
ZMTXR
2JN
AAYXX
ABBRH
ABFSG
ABRTQ
ACSTC
AEZWR
AFDZB
AFHIU
AFOHR
AHWEU
AIXLP
ATHPR
CITATION
JQ2
ID FETCH-LOGICAL-c1872-5ba755c3565af43dbd09a823368707232c3ee788c5d3435080bead255d83c90b3
ISSN 2661-8907
2662-995X
IngestDate Fri Jul 25 21:06:03 EDT 2025
Wed Oct 01 06:34:05 EDT 2025
Wed Apr 02 01:30:26 EDT 2025
IsPeerReviewed true
IsScholarly true
Issue 4
Keywords RSA
ECC
Energy left
Symmetric algorithms
Cryptography
AES
Asymmetric algorithm
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-c1872-5ba755c3565af43dbd09a823368707232c3ee788c5d3435080bead255d83c90b3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
PQID 3184865322
PQPubID 6623307
ParticipantIDs proquest_journals_3184865322
crossref_primary_10_1007_s42979_025_03898_2
springer_journals_10_1007_s42979_025_03898_2
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 20250401
2025-04-01
PublicationDateYYYYMMDD 2025-04-01
PublicationDate_xml – month: 4
  year: 2025
  text: 20250401
  day: 1
PublicationDecade 2020
PublicationPlace Singapore
PublicationPlace_xml – name: Singapore
– name: Kolkata
PublicationTitle SN computer science
PublicationTitleAbbrev SN COMPUT. SCI
PublicationYear 2025
Publisher Springer Nature Singapore
Springer Nature B.V
Publisher_xml – name: Springer Nature Singapore
– name: Springer Nature B.V
References 3898_CR28
3898_CR29
T Khan (3898_CR44) 2024; 134
3898_CR8
T Khan (3898_CR47) 2023; 209
3898_CR9
3898_CR6
3898_CR7
3898_CR4
RK Kodali (3898_CR17) 2014
3898_CR5
3898_CR2
3898_CR3
M Aldaseen (3898_CR38) 2022
3898_CR20
3898_CR1
3898_CR21
3898_CR22
A Singh (3898_CR23) 2021
3898_CR24
3898_CR25
3898_CR26
3898_CR27
3898_CR39
T Khan (3898_CR43) 2023; 129
B Kumar (3898_CR10) 2023; 11
3898_CR30
3898_CR31
3898_CR32
3898_CR33
3898_CR34
Mohammed Faris1 (3898_CR11) 2023; 15
3898_CR37
MA Al-Shareeda (3898_CR36) 2022; 10
3898_CR40
3898_CR41
3898_CR45
3898_CR46
3898_CR48
3898_CR49
3898_CR18
3898_CR19
NP Sable (3898_CR42) 2024; 27
3898_CR12
MA Al-Shareeda (3898_CR35) 2021; 9
3898_CR13
3898_CR14
3898_CR15
3898_CR16
A Dagar (3898_CR50) 2023; 26
References_xml – ident: 3898_CR4
  doi: 10.1002/sec.1059
– ident: 3898_CR26
  doi: 10.1007/s42979-022-01321-8
– ident: 3898_CR16
  doi: 10.5120/11507-7224
– ident: 3898_CR30
– ident: 3898_CR34
– ident: 3898_CR13
  doi: 10.1016/j.jesit.2015.11.005
– year: 2021
  ident: 3898_CR23
  doi: 10.32604/iasc.2021.012806
– ident: 3898_CR25
  doi: 10.1007/s42979-022-01304-9
– ident: 3898_CR29
  doi: 10.1109/ICSSIT53264.2022.9716416
– volume: 15
  start-page: 1
  year: 2023
  ident: 3898_CR11
  publication-title: Int J Eng Bus Manage
– ident: 3898_CR37
  doi: 10.1109/IBSS.2015.7456652
– ident: 3898_CR8
  doi: 10.1007/s11277-015-2290-9
– ident: 3898_CR40
  doi: 10.1002/sec.375
– ident: 3898_CR49
  doi: 10.1016/B978-0-443-21475-2.00002-3
– ident: 3898_CR22
  doi: 10.1177/1550147720925772
– ident: 3898_CR14
– volume: 10
  start-page: 120606
  year: 2022
  ident: 3898_CR36
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2022.3222488
– ident: 3898_CR48
  doi: 10.1038/s41598-023-28721-x
– volume: 11
  start-page: 40488
  year: 2023
  ident: 3898_CR10
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2023.3247003
– ident: 3898_CR18
– ident: 3898_CR7
– ident: 3898_CR21
  doi: 10.1002/ep.12895
– ident: 3898_CR41
  doi: 10.25212/ICoIT17.013
– volume: 129
  start-page: 953
  issue: 2
  year: 2023
  ident: 3898_CR43
  publication-title: Wireless Pers Commun
  doi: 10.1007/s11277-022-10165-7
– ident: 3898_CR20
– ident: 3898_CR24
  doi: 10.1016/j.icte.2022.02.003
– volume: 9
  start-page: 113226
  year: 2021
  ident: 3898_CR35
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2021.3104148
– ident: 3898_CR9
  doi: 10.1007/978-981-16-1395-1_37
– ident: 3898_CR45
– ident: 3898_CR12
  doi: 10.1007/s11277-024-11391-x
– volume: 27
  start-page: 2
  year: 2024
  ident: 3898_CR42
  publication-title: JDMSC
  doi: 10.47974/JDMSC-1888
– ident: 3898_CR28
  doi: 10.1109/ICRITO61523.2024.10522297
– start-page: 471
  volume-title: Emerging research in electronics, computer science and technology
  year: 2014
  ident: 3898_CR17
  doi: 10.1007/978-81-322-1157-0_48
– year: 2022
  ident: 3898_CR38
  doi: 10.32604/cmc.2022.028520
– ident: 3898_CR19
  doi: 10.1080/03772063.2016.1176539
– ident: 3898_CR32
– ident: 3898_CR2
– volume: 209
  start-page: 217
  year: 2023
  ident: 3898_CR47
  publication-title: Comput Commun
  doi: 10.1016/j.comcom.2023.06.014
– ident: 3898_CR33
  doi: 10.14257/ijsia.2015.9.4.27
– ident: 3898_CR6
  doi: 10.1007/978-3-319-07425-2_25
– ident: 3898_CR46
  doi: 10.2174/1872212114666191231150916
– ident: 3898_CR5
– ident: 3898_CR1
  doi: 10.1109/WiMob.2008.16
– ident: 3898_CR27
  doi: 10.1007/s42979-021-00796-1
– volume: 26
  start-page: 2007
  year: 2023
  ident: 3898_CR50
  publication-title: J Discrete Math Sci Crypt
– ident: 3898_CR39
  doi: 10.1109/ICMRSISIIT46373.2020.9405869
– ident: 3898_CR3
  doi: 10.1049/cp.2013.2337
– ident: 3898_CR31
  doi: 10.48550/arXiv.1203.3103
– ident: 3898_CR15
  doi: 10.1080/09720529.2021.1878626
– volume: 134
  start-page: 1389
  issue: 3
  year: 2024
  ident: 3898_CR44
  publication-title: Wireless Pers Commun
  doi: 10.1007/s11277-024-10948-0
SSID ssj0002504465
Score 2.2896662
Snippet Wireless sensor networks have found applications in several areas such as agriculture, healthcare, weather forecasting, and the Internet of Things. Due to...
SourceID proquest
crossref
springer
SourceType Aggregation Database
Index Database
Publisher
StartPage 331
SubjectTerms Algorithms
Computer Imaging
Computer Science
Computer Systems Organization and Communication Networks
Cryptography
Curves
Cybersecurity
Data Structures and Information Theory
Energy consumption
Energy efficiency
Energy management
Information Systems and Communication Service
Internet of Things
Nodes
Original Research
Packet transmission
Pattern Recognition and Graphics
Privacy
Residual energy
Security for Communication and Computing Application
Software Engineering/Programming and Operating Systems
Vision
Weather forecasting
Wireless sensor networks
Title Energy-Aware Framework for Assessing Cryptographic Algorithms in Wireless Sensor Networks
URI https://link.springer.com/article/10.1007/s42979-025-03898-2
https://www.proquest.com/docview/3184865322
Volume 6
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVLSH
  databaseName: SpringerLink Journals
  customDbUrl:
  mediaType: online
  eissn: 2661-8907
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0002504465
  issn: 2661-8907
  databaseCode: AFBBN
  dateStart: 20190625
  isFulltext: true
  providerName: Library Specific Holdings
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LT-MwELZW5bIXYBcQ5bHygVsxysNJnGNBraqVtpcCglNkOw4plAa1QQh-PWPn2QUk4BK1ietEma8z39jf2AgdKZWE1OI2sZ1YEa27IJyJhNiBLQM_hqDH9YD-v7E_uqB_r7yrRtZsqktycSJf3q0r-Y5V4RzYVVfJfsGydadwAj6DfeEIFobjp2w8MIV7pP-k5VvDSmZllIPFZK6Z1F88P-TFwtRT2evPbrLFNE_vjQ5Wa19n2tdNIJvNTPmv7mHZpqyTsdGd660femW8rP1plt3Wbn2S8tlj_UVvPGGQptIm5ec3qZoZtno5XaZPPFYQDO96E3jMtD384Hgt1Up7-FFrq_WMh_4Fh8yheBJlHJnmAISFxe62ldf1W-Ci7_ryQr6xhIAZhMTcGcgVK4slV9fIrtdeNo0jaByZxhEE5zUH_L3VQWv94enpuB5_00u3Ud8r66hMNeWbO61ylSYB-W_O3FCR8020XuYQuF8A4hf6oea_0Ua1Pwcu3fUWum7jA9f4wIAPXOMDr-ADN_jA0zmu8IELfOAKH9voYjg4PxuRcisNIm0WOMQTPPA86QJ95wl1YxFbIWeO6_rgrwNg1dJVKmBMerELBBrSCAEuBtLNmLkytIS7gzrzbK52ERZAAG3KLUmFRZOYhZwLXU7N_USpkPld1KteWvRQrJgSfWyfLjqo3mtU_rOWEcQZynwPYk0XHVfvurn8cW97X2u-j342kD5AnXzxqA6BY-biTwmXV98hfVE
linkProvider Library Specific Holdings
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Energy-Aware+Framework+for+Assessing+Cryptographic+Algorithms+in+Wireless+Sensor+Networks&rft.jtitle=SN+computer+science&rft.au=Pooja&rft.au=Shalu&rft.au=Saini%2C+Neha&rft.au=Baghela%2C+Vishwadeepak+Singh&rft.date=2025-04-01&rft.pub=Springer+Nature+Singapore&rft.eissn=2661-8907&rft.volume=6&rft.issue=4&rft_id=info:doi/10.1007%2Fs42979-025-03898-2&rft.externalDocID=10_1007_s42979_025_03898_2
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2661-8907&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2661-8907&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2661-8907&client=summon