Secure WSN Architecture Utilizing Hybrid Encryption with DKM to Ensure Consistent IoV Communication
Umesh Kumar Lilhore,Sarita Simaiya,Surjeet Dalal,Yogesh Kumar Sharma,Shilpi Tomar,Arshad Hashmi,Lilhore, Umesh Kumar,Simaiya, Sarita,Dalal, Surjeet,Sharma, Yogesh Kumar,Tomar, Shilpi,Hashmi, Arshad
DOI: https://doi.org/10.1007/s11277-024-10859-0
IF: 2.017
2024-03-06
Wireless Personal Communications
Abstract:Reliable communication is essential in the Internet of Vehicles (IoV) framework, where the efficient transmission of important information is required to ensure vehicle safety and smart traffic control. This investigation centers on the issue of developing trustworthy connectivity in the IoV components through implementing a robust infrastructure for Wireless Sensor Networks (WSNs). This article introduces a new approach to data encryption by combining Improved Elliptic Curve Cryptography (IECC), AES-256, with dynamic key management (DKM). The current study addresses the primary challenge of balancing efficient communications and data protection in the IoV. The hybrid cryptography method we employ utilizes the data confidentiality offered by AES-256, the computational capabilities of IECC, and the periodic updating of keys delivered by a DKM framework. Employing this amalgamation of methods diminishes the performance burden linked to traditional encryption techniques. We conducted a comprehensive range of diagnostic procedures and analyses to assess the effectiveness of the proposed approach. The findings revealed substantial benefits compared to existing encryption methods, i.e., i.e., RSA, 3-DES, AES-256, and ECCC. The proposed hybrid security method exhibited a significant 30% decrease in message transmission time corresponding to the exclusive use of AES-256. The suggested architecture incorporates sensor nodes into vehicles and infrastructure aspects, facilitating the gathering and transmitting of crucial data. This reduction is especially important in the limited resources of IoV, where energy and computational aspects are scarce. In addition, by automatically updating encryption keys, the DKM system strengthens privacy and makes it difficult for rivals to intercept communication. The hybrid approach, incorporating DKM, demonstrated an impressive success rate of more than 99% in preventing intrusion efforts during simulated attack circumstances. This surpasses the vulnerabilities of encryption methods that rely on a single technique. The results highlight the tangible benefits of our method. It has wide-ranging consequences for various IoV applications, such as automatic traffic and smart transport management. Our research adds to the current discussion on protecting data in IoV in the growing WSN environment. We demonstrate the practicality of our hybrid encryption technique with DKM as an efficient way to improve data security alongside communication performance in IoV. It successfully tackles the difficulty of finding a middle ground between these crucial elements in a limited-resource setting.
telecommunications