Skip to main content
Loading...
Scholar9 logo True scholar network
  • Login/Sign up
  • Scholar9
    Publications ▼
    Article List Deposit Article
    Mentorship ▼
    Overview Sessions
    Q&A Institutions Scholars Journals
    Publications ▼
    Article List Deposit Article
    Mentorship ▼
    Overview Sessions
    Q&A Institutions Scholars Journals
  • Login/Sign up
  • Back to Top

    Transparent Peer Review By Scholar9

    SECURE PACKET TRANSMISSION BASED ON DYNAMIC ENCRYPTION DECRYPTION USING WIRELESS SENSOR NETWORK SECURITY

    Abstract

    In recent years the need for packet communication security in wireless sensor network (WSN) has increased. The level of security varies from one domain to another and from one application to another depending on the type and importance of the packet exchanged in the wireless sensors. In this paper we propose to conceive a chaotic encryption algorithm for WSN based on S-box and chaotic permutations. Comparisons other proposed algorithms are presented in this paper.In this paper, we address the WSN nodes' power consumption by analyzing the Dynamic Cluster Head (DynCH) technique, which automates the process of selecting WSN Cluster Head (CH) nodes based on the WSN nodes' energy and nodes' distances among each other in mobile WSN nodes. Moreover, this analysis covers the complexity of DynCH in different environments to prove its efficiency compared to the steady CH mechanism. In addition, we present the performance analysis of different lightweight systematic block encryption algorithms along with DynCH scheme on WSNs lifetime. In particular, Speck128, Flexen Tech, Tiny Encryption Packet (TEPA) algorithms are used in order to determine the amount of energy consumed by the sensor nodes and their effect on the network lifetime. The Network simulator is used to evaluate our analysis. A comparison has been conducted for those encryption algorithms at different settings such as different sizes of packet blocks, different key size and finally encryption/decryption speed.

    Reviewer Photo

    Shreyas Mahimkar Reviewer

    badge Review Request Accepted
    Reviewer Photo

    Shreyas Mahimkar Reviewer

    17 Sep 2024 04:02 PM

    badge Not Approved

    Relevance and Originality

    Methodology

    Validity & Reliability

    Clarity and Structure

    Results and Analysis

    Relevance and Originality

    The Research Article addresses a critical need in the domain of wireless sensor networks (WSNs) by proposing a new chaotic encryption algorithm tailored for packet communication security. The focus on combining S-box and chaotic permutations represents a novel approach that could potentially enhance security in WSNs. Additionally, the paper's exploration of Dynamic Cluster Head (DynCH) techniques for energy efficiency adds relevance by tackling both security and power consumption, which are key concerns in WSNs.

    Methodology

    The Research Article outlines a methodology that involves developing a chaotic encryption algorithm and analyzing its performance alongside different existing encryption techniques. The use of the DynCH technique to manage power consumption is also discussed. However, the paper would benefit from a more detailed explanation of the specific parameters and configurations used in the simulations. Clarifying how the chaotic encryption algorithm is implemented, and how its effectiveness is compared with other algorithms, would strengthen the methodological rigor.

    Validity & Reliability

    The validity and reliability of the Research Article are enhanced by the inclusion of comparative analysis and performance evaluation using a network simulator. The analysis of various encryption algorithms and the DynCH scheme provides a comprehensive view of their impact on WSNs. To further bolster reliability, the paper should include information on the statistical significance of the results and any potential limitations or biases in the simulation setup.

    Clarity and Structure

    The Research Article is generally clear in its presentation of the proposed encryption algorithm and its comparison with existing methods. However, the paper could be better organized by clearly separating sections on methodology, results, and discussions. Improved structure would facilitate easier comprehension of the complex concepts and ensure that each aspect of the study is addressed systematically.

    Result Analysis

    The Research Article presents a comparative analysis of various encryption algorithms and their impact on energy consumption and network lifetime. The inclusion of performance metrics such as encryption/decryption speed and energy consumption is valuable. To enhance the result analysis, the paper should provide more detailed quantitative results and discuss the implications of these findings for practical WSN implementations. Additional insights into how the chaotic encryption algorithm specifically improves security and efficiency compared to traditional methods would also be beneficial.

    Publisher Logo

    IJ Publication Publisher

    Done Sir

    Publisher

    IJ Publication

    IJ Publication

    Reviewer

    Shreyas

    Shreyas Mahimkar

    More Detail

    Category Icon

    Paper Category

    Computer Engineering

    Journal Icon

    Journal Name

    IJRAR - International Journal of Research and Analytical Reviews External Link

    Info Icon

    p-ISSN

    2349-5138

    Info Icon

    e-ISSN

    2348-1269

    Subscribe us to get updated

    logo logo

    Scholar9 is aiming to empower the research community around the world with the help of technology & innovation. Scholar9 provides the required platform to Scholar for visibility & credibility.

    QUICKLINKS

    • What is Scholar9?
    • About Us
    • Mission Vision
    • Contact Us
    • Privacy Policy
    • Terms of Use
    • Blogs
    • FAQ

    CONTACT US

    • +91 82003 85143
    • hello@scholar9.com
    • www.scholar9.com

    © 2026 Sequence Research & Development Pvt Ltd. All Rights Reserved.

    whatsapp