• P-ISSN 0974-6846 E-ISSN 0974-5645

Indian Journal of Science and Technology


Indian Journal of Science and Technology

Year: 2024, Volume: 17, Issue: 13, Pages: 1323-1330

Original Article

DynAuthRoute: Dynamic Security for Wireless Sensor Networks

Received Date:06 January 2024, Accepted Date:29 January 2024, Published Date:22 March 2024


Objectives: The research aims to design an architecture for secure transmission of data in wireless sensor networks. Methods: The method involves three main pillars: authentication, data encryption, and dynamic routing. Extensive simulations have been conducted to evaluate the suggested method in terms of energy consumption, memory footprint, packet delivery ratio, end-to-end latency, execution time, encryption time, and decryption time. Findings: For authentication, a dynamic key is used to power an improved salt password hashing method. Data encryption is performed using format-preserving encryption (FPE) with the appended salt key. Dynamic routing is implemented using a cluster-based routing technique to enhance network efficiency in terms of power consumption and security. The execution time for MD5 ranges from 15 to 22 milliseconds, while for SHA-1 it ranges from 16 to 23 milliseconds and for the proposed salt key generation it is 1 to 5 milliseconds. Similarly, in terms of energy consumption, memory footprint, packet delivery ratio, end-to-end latency, execution time, encryption time, and decryption time the proposed method shows promising results in ensuring the integrity and security of transmitted encrypted data. Novelty: The presents a novel architecture with enhanced cluster head-based selection algorithm that combines dynamic key-based authentication and secure data routing to establish a safe environment for data transmission in wireless sensor networks. This research works offers a method for encrypting text with a dynamic salt key that is safe, energy-efficient, and lightweight.

Keywords: Wireless Sensor Network, Dynamic Key, Authentication, Hash function, Salt algorithm, Dynamic routing, Node clustering, Format-preserving encryption


  1. Lanzolla A, Spadavecchia M. Wireless Sensor Networks for Environmental Monitoring. Sensors. 2021;21(4):1–3. Available from: https://doi.org/10.3390/s21041172
  2. Qamar S. Optimal sensor network routing with secure network monitoring using deep learning architectures. Neural Computing and Applications. 2023;35(26):19039–19050. Available from: https://doi.org/10.1007/s00521-023-08753-0
  3. Moghadam MF, Nikooghadam M, Jabban MABA, Alishahi M, Mortazavi L, Mohajerzadeh A. An Efficient Authentication and Key Agreement Scheme Based on ECDH for Wireless Sensor Network. IEEE Access. 2020;8:73182–73192. Available from: https://doi.org/10.1109/ACCESS.2020.2987764
  4. Wu F, Li X, Xu L, Vijayakumar P, Kumar N. A Novel Three-Factor Authentication Protocol for Wireless Sensor Networks With IoT Notion. IEEE Systems Journal. 2021;15(1):1120–1129. Available from: https://doi.org/10.1109/JSYST.2020.2981049
  5. Liu L, Chen W, Li T, Liu Y. Pseudo-Random Encryption for Security Data Transmission in Wireless Sensor Networks. Sensors. 2019;19(11):1–16. Available from: https://doi.org/10.3390/s19112452
  6. Sharmila, Kumar P, Bhushan S, Kumar M, Alazab M. Secure Key Management and Mutual Authentication Protocol for Wireless Sensor Network by Linking Edge Devices using Hybrid Approach. Wireless Personal Communications. 2023;130(4):2935–2957. Available from: https://doi.org/10.1007/s11277-023-10410-7
  7. Mesmoudi S, Benadda B, Mesmoudi A. SKWN: Smart and dynamic key management scheme for wireless sensor networks. International Journal of Communication Systems. 2019;32(7). Available from: https://doi.org/10.1002/dac.3930
  8. Yousefpoor MS, Barati H. DSKMS: a dynamic smart key management system based on fuzzy logic in wireless sensor networks. Wireless Networks. 2020;26(4):2515–2535. Available from: https://doi.org/10.1007/s11276-019-01980-1
  9. Panahi U, Bayılmış C. Enabling secure data transmission for wireless sensor networks based IoT applications. Ain Shams Engineering Journal. 2023;14(2):1–11. Available from: https://doi.org/10.1016/j.asej.2022.101866
  10. Santos-González I, Rivero-García A, Burmester M, Munilla J, Caballero-Gil P. Secure lightweight password authenticated key exchange for heterogeneous wireless sensor networks. Information Systems. 2020;88:101423. Available from: https://doi.org/10.1016/j.is.2019.101423
  11. Xiuwu Y, Ying L, Yong L, Hao Y. WSN Clustering Routing Algorithm Based on Hybrid Genetic Tabu Search. Wireless Personal Communications. 2022;124(4):3485–3506. Available from: https://doi.org/10.1007/s11277-022-09522-3
  12. Mehra PS, Doja MN, Alam B. Fuzzy based enhanced cluster head selection (FBECS) for WSN. Journal of King Saud University - Science. 2020;32(1):390–401. Available from: https://doi.org/10.1016/j.jksus.2018.04.031
  13. Ali H, Tariq UU, Hussain M, Lu L, Panneerselvam J, Zhai X. ARSH-FATI: A Novel Metaheuristic for Cluster Head Selection in Wireless Sensor Networks. IEEE Systems Journal. 2021;15(2):2386–2397. Available from: https://doi.org/10.1109/JSYST.2020.2986811
  14. Meena U, Sharma P. Secret Dynamic Key Authentication and Decision Trust Secure Routing Framework for Internet of Things Based WSN. Wireless Personal Communications. 2022;125(2):1753–1781. Available from: https://doi.org/10.1007/s11277-022-09632-y
  15. Kumar V, Malik N, Dhiman G, Lohani TK. Scalable and Storage Efficient Dynamic Key Management Scheme for Wireless Sensor Network. Wireless Communications and Mobile Computing. 2021;2021:1–11. Available from: https://doi.org/10.1155/2021/5512879
  16. Mansour RF, Alsuhibany SA, Abdel-Khalek S, Alharbi R, Vaiyapuri T, Obaid AJ, et al. Energy aware fault tolerant clustering with routing protocol for improved survivability in wireless sensor networks. Computer Networks. 2022;212:109049. Available from: https://doi.org/10.1016/j.comnet.2022.109049
  17. Mezrag F, Bitam S, Mellouk A. An efficient and lightweight identity-based scheme for secure communication in clustered wireless sensor networks. Journal of Network and Computer Applications. 2022;200:103282. Available from: https://doi.org/10.1016/j.jnca.2021.103282


© 2024 Elamurugu & Evanjaline. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. Published By Indian Society for Education and Environment (iSee)


Subscribe now for latest articles and news.