An asymmetric key encryption and decryption model incorporating optimization techniques for enhanced security and efficiency
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2024.15.3.34Keywords:
Security, Cryptography, Encryption, Decryption, WSN, Optimization, Asymmetric key, Security threat.Dimensions Badge
Issue
Section
License
Copyright (c) 2024 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
In Wireless Sensor Networks (WSN), ensuring data security is crucial for maintaining the confidentiality and integrity of transmitted information. Asymmetric key encryption methods serve as fundamental tools in securing communication within WSNs. This paper introduces an innovative Asymmetric Key Encryption and Decryption Model, integrating optimization techniques to enhance security and efficiency in data transmission within WSNs. By incorporating optimization algorithms into key generation and encryption processes, the proposed model strengthens cryptographic key robustness and reinforces encryption mechanisms against potential threats. Leveraging advanced optimization methodologies like genetic algorithms, simulated annealing, or particle swarm optimization, the model optimizes key parameters to mitigate vulnerabilities and bolster resistance against brute force and cryptanalysis attacks. Additionally, the model streamlines encryption and decryption procedures, optimizing computational resources and reducing associated overheads. Through experimental validation and performance analysis, the effectiveness of the proposed model is demonstrated by achieving improved security, reduced computational complexity, and enhanced data transmission efficiency. This research contributes to advancing WSN security by offering a sophisticated and efficient solution for safeguarding sensitive information in digital communication networks.Abstract
How to Cite
Downloads
Similar Articles
- S. Mohamed Iliyas, M. Mohamed Surputheen, A.R. Mohamed Shanavas, Trust-based symmetric game theory for physical layer security in wi-fi communication , The Scientific Temper: Vol. 16 No. 05 (2025): The Scientific Temper
- R. Sakthiraman, L. Arockiam, RRFSE: RNN biased random forest and SVM ensemble for RPL DDoS in IoT-WSN environment , The Scientific Temper: Vol. 16 No. 02 (2025): The Scientific Temper
- O. Devipriya, K. Kungumaraj, Enhancing cloud efficiency: an intelligent virtual machine selection and migration approach for VM consolidation , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- Bommaiah Boya, Premara Devaraju, Integrating clinical and ECG data for heart disease prediction: A hybrid deep learning approach based on two modalities with particle swarm optimization , The Scientific Temper: Vol. 16 No. 05 (2025): The Scientific Temper
- V. Seethala Devi, N. Vanjulavalli, K. Sujith, R. Surendiran, A metaheuristic optimisation algorithm-based optimal feature subset strategy that enhances the machine learning algorithm’s classifier performance , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- Jonnakuti V. G. Rama Rao, Muthuvel Balasubramanian, Chaladi S. Gangabhavani, Mutyala A. Devi, Kona D. Devi, A TLBO algorithm-based optimal sizing in a standalone hybrid renewable energy system , The Scientific Temper: Vol. 14 No. 03 (2023): The Scientific Temper
- Kirti Gupta, Parul Goyal, Modified-multi objective firefly optimization algorithm for object oriented applications test suites optimization , The Scientific Temper: Vol. 14 No. 03 (2023): The Scientific Temper
- S. Hemalatha, N. Vanjulavalli, K. Sujith, R. Surendiran, Chaotic-based optimization, based feature selection with shallow neural network technique for effective identification of intrusion detection , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- Neerav Nishant, Nisha Rathore, Vinay Kumar Nassa, Vijay Kumar Dwivedi, Thulasimani T, Surrya Prakash Dillibabu, Integrating machine learning and mathematical programming for efficient optimization of electric discharge machining technique , The Scientific Temper: Vol. 14 No. 03 (2023): The Scientific Temper
- A. Jabeen, A. R. M. Shanavas, Hazard regressive multipoint elitist spiral search optimization for resource efficient task scheduling in cloud computing , The Scientific Temper: Vol. 15 No. 02 (2024): The Scientific Temper
<< < 3 4 5 6 7 8 9 10 11 12 > >>
You may also start an advanced similarity search for this article.
Most read articles by the same author(s)
- Annalakshmi D, C. Jayanthi, A secured routing algorithm for cluster-based networks, integrating trust-aware authentication mechanisms for energy-efficient and efficient data delivery , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- V. Karthikeyan, C. Jayanthi, Advancements in image quality assessment: a comparative study of image processing and deep learning techniques , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- A. Rukmani, C. Jayanthi, Trust and security in wireless sensor networks: A literature review of approaches for malicious node detection , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- A. Rukmani, C. Jayanthi, Fuzzy optimization trust aware clustering approach for the detection of malicious node in the wireless sensor networks , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- V. Karthikeyan, C. Jayanthi, Improving image quality assessment with enhanced denoising autoencoders and optimization methods , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper

