Improving IoT Security in Wireless Sensor Networks

Authors

DOI:

https://doi.org/10.22105/siot.v1i4.138

Keywords:

Encryption, Authentication, Wireless sensor networks

Abstract

The security of IoT-based Wireless Sensor Networks (WSNs) has emerged as a pressing issue, particularly as these networks are extensively utilized in sectors like healthcare, industrial automation, and smart cities. Given their limited computational capabilities, WSNs are especially susceptible to cyber threats, creating challenges for data integrity, confidentiality, and scalability of the network. This paper tackles these issues by examining three pivotal security algorithms: Elliptic Curve Cryptography (ECC) for effective key exchange, Advanced Encryption Standard (AES) for strong data encryption, and the Lightweight Authentication Protocol (LAP) aimed at low-resource mutual authentication. The approaches discussed involve modifying these algorithms to fit the restricted capacities of IoT devices while also introducing new security improvements to address current limitations. Specifically, the proposed initiatives encompass adaptive resource-efficient encryption, a hierarchical key management system, end-to-end protocols for data integrity, tamper-resistant hardware components, and a cross-layer security framework to safeguard communications throughout the entire network. These solutions were assessed for their ability to enhance the resilience and security efficiency of WSNs without overburdening device resources. The findings suggest that lightweight encryption techniques, hierarchical architectures, and tamper-resistant hardware can considerably strengthen IoT security in resource-limited WSNs. These outcomes contribute to building a scalable and versatile security framework, enabling safer IoT applications in essential industries, and fostering trust in IoT-enabled infrastructure moving forward.

References

Chaudhary, P., & Waoo, A. A. (n.d.). Wireless sensor network. https://www.researchgate.net/profile/Akhilesh-Waoo-2/publication/378736551_Wireless_Sensor_Network/links/65e722a8adf2362b63782126/Wireless-Sensor-Network.pdf

Arunkumar, J. R., Velmurugan, S., Chinnaiah, B., Charulatha, G., Prabhu, M. R., & Chakkaravarthy, A. P. (2023). Logistic regression with elliptical curve cryptography to establish secure IoT. Computer systems science & engineering, 46(1). https://www.researchgate.net

Goel, A., Baliyan, H., Tyagi, S., & Bansal, N. (2024). End to end encryption of chat using advanced encryption standard-256. International journal of science and research archive, 12(1), 2018–2025.

Patil, P., & Patil, A. R. (2018). Implementation of data encryption standard algorithm using verilog. International journal of wireless network security, 4(1), 37–44. https://doi.org/10.37628/ijowns.v4i1.372

Chen, C.-M., Chen, Z., Kumari, S., & Lin, M.-C. (2022). LAP-IoHT: A lightweight authentication protocol for the internet of health things. Sensors, 22(14), 5401. https://doi.org/10.3390/s22145401

Zahra, F. T., Bostanci, Y. S., & Soyturk, M. (2024). Security of wireless IoT in smart manufacturing: vulnerabilities and countermeasures. Intelligent secure trustable things, 419. https://library.oapen.org/bitstream/handle/20.500.12657/92309/978-3-031-54049-3.pdf?sequence=1#page=424

Alabi, M. (2024). Security challenges and solutions in wireless networks: a computer science perspective. https://www.researchgate.net

Imran, M., Altamimi, A. B., Khan, W., Hussain, S., Alsaffar, M., & others. (2024). Quantum cryptography for future networks security: A systematic review. IEEE access. https://doi.org/10.1109/ACCESS.2024.3504815

Dhanraj, T., Kumar, M., Singh, S., Kumar, R., Jaiswal, P., & Mohapatra, H. (2024). A review on mitigating privacy risks in IoT-enabled smart homes. Computer networks and communications, 146–163. https://ojs.wiserpub.com/index.php/CNC/article/download/4736/2296

Mohapatra, H. (2025). The role of 6G in empowering smart cities enabling ubiquitous connectivity and intelligent infrastructure. RFID, microwave circuit, and wireless power transfer enabling 5/6g communication (pp. 231–254). IGI Global Scientific Publishing. https://doi.org/10.4018/979-8-3693-8799-3.ch008

Published

2024-12-20

How to Cite

Saha *, D. . (2024). Improving IoT Security in Wireless Sensor Networks. Smart Internet of Things, 1(4), 289–297. https://doi.org/10.22105/siot.v1i4.138