An asymmetric key encryption and decryption model incorporating optimization techniques for enhanced security and efficiency

Published

17-08-2024

DOI:

https://doi.org/10.58414/SCIENTIFICTEMPER.2024.15.3.34

Keywords:

Security, Cryptography, Encryption, Decryption, WSN, Optimization, Asymmetric key, Security threat.

Dimensions Badge

Issue

Section

SECTION C: ARTIFICIAL INTELLIGENCE, ENGINEERING, TECHNOLOGY

Authors

  • Annalakshmi D. PG & PG and Research, Department of Computer Science, Government Arts College (Autonomous) Affiliated to Bharathidasan University, Tiruchirappalli), Tamil Nadu, India.
  • C. Jayanthi PG & PG and Research, Department of Computer Science, Government Arts College (Autonomous) Affiliated to Bharathidasan University, Tiruchirappalli), Tamil Nadu, India.

Abstract

In Wireless Sensor Networks (WSN), ensuring data security is crucial for maintaining the confidentiality and integrity of transmitted information. Asymmetric key encryption methods serve as fundamental tools in securing communication within WSNs. This paper introduces an innovative Asymmetric Key Encryption and Decryption Model, integrating optimization techniques to enhance security and efficiency in data transmission within WSNs. By incorporating optimization algorithms into key generation and encryption processes, the proposed model strengthens cryptographic key robustness and reinforces encryption mechanisms against potential threats. Leveraging advanced optimization methodologies like genetic algorithms, simulated annealing, or particle swarm optimization, the model optimizes key parameters to mitigate vulnerabilities and bolster resistance against brute force and cryptanalysis attacks. Additionally, the model streamlines encryption and decryption procedures, optimizing computational resources and reducing associated overheads. Through experimental validation and performance analysis, the effectiveness of the proposed model is demonstrated by achieving improved security, reduced computational complexity, and enhanced data transmission efficiency. This research contributes to advancing WSN security by offering a sophisticated and efficient solution for safeguarding sensitive information in digital communication networks.

How to Cite

Annalakshmi D., & C. Jayanthi. (2024). An asymmetric key encryption and decryption model incorporating optimization techniques for enhanced security and efficiency. The Scientific Temper, 15(03), 2663–2671. https://doi.org/10.58414/SCIENTIFICTEMPER.2024.15.3.34

Downloads

Download data is not yet available.