Transparent Peer Review By Scholar9
SECURE PACKET TRANSMISSION BASED ON DYNAMIC ENCRYPTION DECRYPTION USING WIRELESS SENSOR NETWORK SECURITY
Abstract
In recent years the need for packet communication security in wireless sensor network (WSN) has increased. The level of security varies from one domain to another and from one application to another depending on the type and importance of the packet exchanged in the wireless sensors. In this paper we propose to conceive a chaotic encryption algorithm for WSN based on S-box and chaotic permutations. Comparisons other proposed algorithms are presented in this paper.In this paper, we address the WSN nodes' power consumption by analyzing the Dynamic Cluster Head (DynCH) technique, which automates the process of selecting WSN Cluster Head (CH) nodes based on the WSN nodes' energy and nodes' distances among each other in mobile WSN nodes. Moreover, this analysis covers the complexity of DynCH in different environments to prove its efficiency compared to the steady CH mechanism. In addition, we present the performance analysis of different lightweight systematic block encryption algorithms along with DynCH scheme on WSNs lifetime. In particular, Speck128, Flexen Tech, Tiny Encryption Packet (TEPA) algorithms are used in order to determine the amount of energy consumed by the sensor nodes and their effect on the network lifetime. The Network simulator is used to evaluate our analysis. A comparison has been conducted for those encryption algorithms at different settings such as different sizes of packet blocks, different key size and finally encryption/decryption speed.
Shreyas Mahimkar Reviewer
17 Sep 2024 04:02 PM
Not Approved
Relevance and Originality
The Research Article addresses a critical need in the domain of wireless sensor networks (WSNs) by proposing a new chaotic encryption algorithm tailored for packet communication security. The focus on combining S-box and chaotic permutations represents a novel approach that could potentially enhance security in WSNs. Additionally, the paper's exploration of Dynamic Cluster Head (DynCH) techniques for energy efficiency adds relevance by tackling both security and power consumption, which are key concerns in WSNs.
Methodology
The Research Article outlines a methodology that involves developing a chaotic encryption algorithm and analyzing its performance alongside different existing encryption techniques. The use of the DynCH technique to manage power consumption is also discussed. However, the paper would benefit from a more detailed explanation of the specific parameters and configurations used in the simulations. Clarifying how the chaotic encryption algorithm is implemented, and how its effectiveness is compared with other algorithms, would strengthen the methodological rigor.
Validity & Reliability
The validity and reliability of the Research Article are enhanced by the inclusion of comparative analysis and performance evaluation using a network simulator. The analysis of various encryption algorithms and the DynCH scheme provides a comprehensive view of their impact on WSNs. To further bolster reliability, the paper should include information on the statistical significance of the results and any potential limitations or biases in the simulation setup.
Clarity and Structure
The Research Article is generally clear in its presentation of the proposed encryption algorithm and its comparison with existing methods. However, the paper could be better organized by clearly separating sections on methodology, results, and discussions. Improved structure would facilitate easier comprehension of the complex concepts and ensure that each aspect of the study is addressed systematically.
Result Analysis
The Research Article presents a comparative analysis of various encryption algorithms and their impact on energy consumption and network lifetime. The inclusion of performance metrics such as encryption/decryption speed and energy consumption is valuable. To enhance the result analysis, the paper should provide more detailed quantitative results and discuss the implications of these findings for practical WSN implementations. Additional insights into how the chaotic encryption algorithm specifically improves security and efficiency compared to traditional methods would also be beneficial.
IJ Publication Publisher
Done Sir
Shreyas Mahimkar Reviewer