Implementation of Efficient Encryption Algorithms to Protect Data in Wireless Sensor Networks Integrated with IoT

Authors

Keywords:

Wireless Sensor Network, Tiny Encryption Algorithm, lightweight encryption, energy efficiency, data security

Abstract

Wireless Sensor Networks (WSNs) have numerous applications in the Internet of Things (IoT), ranging from environmental monitoring to smart agriculture and healthcare systems. However, WSNs face significant challenges in data security due to the limited resources of sensor nodes, such as power, processing capacity, and memory. Therefore, an efficient encryption algorithm is needed that can maintain data confidentiality without overloading resources. One widely considered solution is the use of the Tiny Encryption Algorithm (TEA). This study aims to analyze the implementation of the TEA encryption algorithm in IoT-based WSNs and compare it with AES-128 in terms of energy efficiency and computation time. The results show that TEA has advantages in terms of energy efficiency and computation time compared to AES-128, making it an ideal solution for resource-constrained WSN applications.

Downloads

Download data is not yet available.

References

[1] F. P. E. Putra, U. Ubaidi, R. N. Saputra, F. M. Haris, and S. N. R. Barokah, “Application of Internet of Things Technology in Monitoring Water Quality in Fishponds,” Brilliance: Research of Artificial Intelligence, vol. 4, no. 1, pp. 356–361, Jul. 2024, doi: 10.47709/brilliance.v4i1.4231.

[2] A. M. K. Abdulzahra, A. K. M. Al-Qurabat, and S. A. Abdulzahra, “Optimizing energy consumption in WSN-based IoT using unequal clustering and sleep scheduling methods,” Internet of Things, vol. 22, p. 100765, Jul. 2023, doi: 10.1016/j.iot.2023.100765.

[3] P. Jagannathan, S. Gurumoorthy, A. Stateczny, P. Divakarachar, and J. Sengupta, “Collision-Aware Routing Using Multi-Objective Seagull Optimization Algorithm for WSN-Based IoT,” Sensors, vol. 21, no. 24, p. 8496, Dec. 2021, doi: 10.3390/s21248496.

[4] O. Gurewitz, M. Shifrin, and E. Dvir, “Data Gathering Techniques in WSN: A Cross-Layer View,” Sensors, vol. 22, no. 7, p. 2650, Mar. 2022, doi: 10.3390/s22072650.

[5] S. Tumula et al., “An opportunistic energy‐efficient dynamic self‐configuration clustering algorithm in WSN‐based IoT networks,” International Journal of Communication Systems, vol. 37, no. 1, Jan. 2024, doi: 10.1002/dac.5633.

[6] R. Ramya and T. Brindha, “Fuzzy‐Driven Cluster Head Selection and Deep Learning Prediction on the Basis of Hybrid Optimization Algorithm for Multiobjective Routing in WSN‐IoT,” International Journal of Communication Systems, vol. 38, no. 12, Aug. 2025, doi: 10.1002/dac.70162.

[7] A. Salim, W. Osamy, A. Aziz, and A. M. Khedr, “SEEDGT: Secure and energy efficient data gathering technique for IoT applications based WSNs,” Journal of Network and Computer Applications, vol. 202, p. 103353, Jun. 2022, doi: 10.1016/j.jnca.2022.103353.

[8] M. Krishnan and Y. Lim, “Reinforcement learning-based dynamic routing using mobile sink for data collection in WSNs and IoT applications,” Journal of Network and Computer Applications, vol. 194, p. 103223, Nov. 2021, doi: 10.1016/j.jnca.2021.103223.

[9] M. Krishnan and Y. Lim, “Reinforcement learning-based dynamic routing using mobile sink for data collection in WSNs and IoT applications,” Journal of Network and Computer Applications, vol. 194, p. 103223, Nov. 2021, doi: 10.1016/j.jnca.2021.103223.

[10] D. Gopika and R. Panjanathan, “WITHDRAWN: Energy efficient routing protocols for WSN based IoT applications: A review,” Mater Today Proc, Nov. 2020, doi: 10.1016/j.matpr.2020.10.137.

[11] M. Shahid et al., “Link-Quality-Based Energy-Efficient Routing Protocol for WSN in IoT,” IEEE Transactions on Consumer Electronics, vol. 70, no. 1, pp. 4645–4653, Feb. 2024, doi: 10.1109/TCE.2024.3356195.

[12] N. R. Patel, S. Kumar, and S. K. Singh, “Energy and Collision Aware WSN Routing Protocol for Sustainable and Intelligent IoT Applications,” IEEE Sens J, vol. 21, no. 22, pp. 25282–25292, Nov. 2021, doi: 10.1109/JSEN.2021.3076192.

[13] M. Shafiq et al., “Robust Cluster-Based Routing Protocol for IoT-Assisted Smart Devices in WSN,” Computers, Materials & Continua, vol. 67, no. 3, pp. 3505–3521, 2021, doi: 10.32604/cmc.2021.015533.

[14] R. B. Pedditi and K. Debasis, “Energy Efficient Routing Protocol for an IoT-Based WSN System to Detect Forest Fires,” Applied Sciences, vol. 13, no. 5, p. 3026, Feb. 2023, doi: 10.3390/app13053026.

[15] G. Arya, A. Bagwari, and D. S. Chauhan, “Performance Analysis of Deep Learning-Based Routing Protocol for an Efficient Data Transmission in 5G WSN Communication,” IEEE Access, vol. 10, pp. 9340–9356, 2022, doi: 10.1109/ACCESS.2022.3142082.

[16] H. Benyezza, M. Bouhedda, R. Kara, and S. Rebouh, “Smart platform based on IoT and WSN for monitoring and control of a greenhouse in the context of precision agriculture,” Internet of Things, vol. 23, p. 100830, Oct. 2023, doi: 10.1016/j.iot.2023.100830.

[17] H. Benyezza, M. Bouhedda, R. Kara, and S. Rebouh, “Smart platform based on IoT and WSN for monitoring and control of a greenhouse in the context of precision agriculture,” Internet of Things, vol. 23, p. 100830, Oct. 2023, doi: 10.1016/j.iot.2023.100830.

[18] U. Panahi and C. Bayılmış, “Enabling secure data transmission for wireless sensor networks based IoT applications,” Ain Shams Engineering Journal, vol. 14, no. 2, p. 101866, Mar. 2023, doi: 10.1016/j.asej.2022.101866.

[19] K. Ramana, A. Revathi, A. Gayathri, R. H. Jhaveri, C. V. L. Narayana, and B. N. Kumar, “WOGRU-IDS — An intelligent intrusion detection system for IoT assisted Wireless Sensor Networks,” Comput Commun, vol. 196, pp. 195–206, Dec. 2022, doi: 10.1016/j.comcom.2022.10.001.

[20] S. S. Sahoo, S. Mohanty, K. S. Sahoo, M. Daneshmand, and A. H. Gandomi, “A Three-Factor-Based Authentication Scheme of 5G Wireless Sensor Networks for IoT System,” IEEE Internet Things J, vol. 10, no. 17, pp. 15087–15099, Sep. 2023, doi: 10.1109/JIOT.2023.3264565.

[21] T. Saba, K. Haseeb, A. A. Shah, A. Rehman, U. Tariq, and Z. Mehmood, “A Machine-Learning-Based Approach for Autonomous IoT Security,” IT Prof, vol. 23, no. 3, pp. 69–75, May 2021, doi: 10.1109/MITP.2020.3031358.

[22] F. P. E. Putra, U. Ubaidi, A. Hamzah, W. A. Pramadi, and A. Nuraini, “Systematic Literature Review: Security Gap Detection On Websites Using Owasp Zap,” Brilliance: Research of Artificial Intelligence, vol. 4, no. 1, pp. 348–355, Jul. 2024, doi: 10.47709/brilliance.v4i1.4227.

[23] F. P. E. Putra, U. Ubaidi, A. B. Tamam, and R. W. Efendi, “Implementation And Simulation Of Dynamic Arp Inspection In Cisco Packet Tracer For Network Security,” Brilliance: Research of Artificial Intelligence, vol. 4, no. 1, pp. 340–347, Jul. 2024, doi: 10.47709/brilliance.v4i1.4199.

[24] S. M. Hussein, J. A. López Ramos, and A. M. Ashir, “A Secure and Efficient Method to Protect Communications and Energy Consumption in IoT Wireless Sensor Networks,” Electronics (Basel), vol. 11, no. 17, p. 2721, Aug. 2022, doi: 10.3390/electronics11172721.

[25] S. Nagaraj et al., “Improved Secure Encryption with Energy Optimization Using Random Permutation Pseudo Algorithm Based on Internet of Thing in Wireless Sensor Networks,” Energies (Basel), vol. 16, no. 1, p. 8, Dec. 2022, doi: 10.3390/en16010008.

[26] S. Hriez, S. Almajali, H. Elgala, M. Ayyash, and H. B. Salameh, “A Novel Trust-Aware and Energy-Aware Clustering Method That Uses Stochastic Fractal Search in IoT-Enabled Wireless Sensor Networks,” IEEE Syst J, vol. 16, no. 2, pp. 2693–2704, Jun. 2022, doi: 10.1109/JSYST.2021.3065323.

[27] F. P. E. Putra, R. M. Ilhamsyah, S. A. Efendy, and A. Rizki, “Implementation And Evaluation Of Zerotier-Based Virtual Network For Device Connectivity,” Brilliance: Research of Artificial Intelligence, vol. 5, no. 1, pp. 281–290, Jun. 2025, doi: 10.47709/brilliance.v5i1.5966.

[28] F. P. E. Putra, N. Ramadhani, F. Fauzan, and Moh. Mursidi, “Service Quality Analysis of RFID-Based Smart Door Lock in Front One Azana Style Hotel Area,” Brilliance: Research of Artificial Intelligence, vol. 4, no. 1, pp. 372–381, Jul. 2024, doi: 10.47709/brilliance.v4i1.4292.

[29] D. Antony Joseph Rajan and E. R. Naganathan, “Trust based anonymous intrusion detection for cloud assisted WSN-IOT,” Global Transitions Proceedings, vol. 3, no. 1, pp. 104–108, Jun. 2022, doi: 10.1016/j.gltp.2022.04.022.

[30] F. P. E. Putra, Moh. Irfan, M. Aziz, and R. N. Saputra, “Wireless Network Design at Pamekasan Regency Public Library,” Brilliance: Research of Artificial Intelligence, vol. 5, no. 1, pp. 144–150, May 2025, doi: 10.47709/brilliance.v5i1.5876.

[31] F. P. E. Putra, F. Mu’minin, A. Nuraini, S. N. R. Barokah, and K. Khairurrozi, “Designing an Information System for Student Admissions at SMAN 1 Pademawu Using the Waterfall Method,” Brilliance: Research of Artificial Intelligence, vol. 5, no. 1, pp. 582–591, Jul. 2025, doi: 10.47709/brilliance.v5i1.6508.

[32] H. Yu and Y. Bin Zikria, “Cognitive Radio Networks for Internet of Things and Wireless Sensor Networks,” Sensors, vol. 20, no. 18, p. 5288, Sep. 2020, doi: 10.3390/s20185288.

[33] G. Gardašević, K. Katzis, D. Bajić, and L. Berbakov, “Emerging Wireless Sensor Networks and Internet of Things Technologies—Foundations of Smart Healthcare,” Sensors, vol. 20, no. 13, p. 3619, Jun. 2020, doi: 10.3390/s20133619.

[34] S. Shankar, G. Deepika, G. Devi, S. Ramesh, S. Srivastava, and S. S. Kumar, “Development of Efficient Wireless Sensor Network for IoT Applications,” in 2023 3rd International Conference on Pervasive Computing and Social Networking (ICPCSN), IEEE, Jun. 2023, pp. 1419–1424. doi: 10.1109/ICPCSN58827.2023.00237.

[35] S. Ghorpade, M. Zennaro, and B. S. Chaudhari, “Towards green computing: intelligent bio-inspired agent for IoT-enabled wireless sensor networks,” International Journal of Sensor Networks, vol. 35, no. 2, p. 121, 2021, doi: 10.1504/IJSNET.2021.113632.

[36] M. Z. Ghawy et al., “An Effective Wireless Sensor Network Routing Protocol Based on Particle Swarm Optimization Algorithm,” Wirel Commun Mob Comput, vol. 2022, no. 1, Jan. 2022, doi: 10.1155/2022/8455065.

[37] S. Subramani and M. Selvi, “Multi-objective PSO based feature selection for intrusion detection in IoT based wireless sensor networks,” Optik (Stuttg), vol. 273, p. 170419, Feb. 2023, doi: 10.1016/j.ijleo.2022.170419.

[38] J. N. Ndunagu, K. E. Ukhurebor, M. Akaaza, and R. B. Onyancha, “Development of a Wireless Sensor Network and IoT-based Smart Irrigation System,” Appl Environ Soil Sci, vol. 2022, pp. 1–13, Jun. 2022, doi: 10.1155/2022/7678570.

[39] E. Hajian, M. R. Khayyambashi, and N. Movahhedinia, “A Mechanism for Load Balancing Routing and Virtualization Based on SDWSN for IoT Applications,” IEEE Access, vol. 10, pp. 37457–37476, 2022, doi: 10.1109/ACCESS.2022.3164693.

[40] C. Jothikumar, K. Ramana, V. D. Chakravarthy, S. Singh, and I.-H. Ra, “An Efficient Routing Approach to Maximize the Lifetime of IoT-Based Wireless Sensor Networks in 5G and Beyond,” Mobile Information Systems, vol. 2021, pp. 1–11, Jul. 2021, doi: 10.1155/2021/9160516.

[41] S. Rajasoundaran et al., “Secure routing with multi-watchdog construction using deep particle convolutional model for IoT based 5G wireless sensor networks,” Comput Commun, vol. 187, pp. 71–82, Apr. 2022, doi: 10.1016/j.comcom.2022.02.004.

[42] F. P. E. Putra, U. Ubaidi, M. A. Huda, H. Hasbullah, and A. Rohman, “Computer Network Management Optimization Through Big Data Analysis Using Time Series Analysis Method,” Brilliance: Research of Artificial Intelligence, vol. 4, no. 1, pp. 434–442, Aug. 2024, doi: 10.47709/brilliance.v4i1.4373.

[43] F. P. E. Putra, U. Ubaidi, A. Zulfikri, G. Arifin, and R. M. Ilhamsyah, “Analysis of Phishing Attack Trends, Impacts and Prevention Methods: Literature Study,” Brilliance: Research of Artificial Intelligence, vol. 4, no. 1, pp. 413–421, Aug. 2024, doi: 10.47709/brilliance.v4i1.4357.

[44] F. P. E. Putra, U. Ubaidi, R. O. F. Kusuma, A. M. Syam, and S. A. Efendy, “Effect Of Distance On Wi-Fi Signal Quality In The Home Environment,” Brilliance: Research of Artificial Intelligence, vol. 4, no. 1, pp. 391–398, Aug. 2024, doi: 10.47709/brilliance.v4i1.4319.

[45] A. F. Rachman, F. P. E. Putra, S. Syirofi, and D. Wahid, “Case Study of Computer Network Development for the Internet Of Things (IoT) Industry in an Urban Environment,” Brilliance: Research of Artificial Intelligence, vol. 4, no. 1, pp. 399–407, Aug. 2024, doi: 10.47709/brilliance.v4i1.4302.

[46] T. M. Bandara, W. Mudiyanselage, and M. Raza, “Smart farm and monitoring system for measuring the Environmental condition using wireless sensor network - IOT Technology in farming,” in 2020 5th International Conference on Innovative Technologies in Intelligent Systems and Industrial Applications (CITISIA), IEEE, Nov. 2020, pp. 1–7. doi: 10.1109/CITISIA50690.2020.9371830.

[47] J. R. Arunkumar, S. Velmurugan, B. Chinnaiah, G. Charulatha, M. Ramkumar Prabhu, and A. Prabhu Chakkaravarthy, “Logistic Regression with Elliptical Curve Cryptography to Establish Secure IoT,” Computer Systems Science and Engineering, vol. 45, no. 3, pp. 2635–2645, 2023, doi: 10.32604/csse.2023.031605.

[48] R. Cheour, S. Khriji, M. abid, and O. Kanoun, “Microcontrollers for IoT: Optimizations, Computing Paradigms, and Future Directions,” in 2020 IEEE 6th World Forum on Internet of Things (WF-IoT), IEEE, Jun. 2020, pp. 1–7. doi: 10.1109/WF-IoT48130.2020.9221219.

[49] Md. N. Mowla, N. Mowla, A. F. M. S. Shah, K. M. Rabie, and T. Shongwe, “Internet of Things and Wireless Sensor Networks for Smart Agriculture Applications: A Survey,” IEEE Access, vol. 11, pp. 145813–145852, 2023, doi: 10.1109/ACCESS.2023.3346299.

[50] B. B. Gupta and M. Quamara, “An overview of Internet of Things (IoT): Architectural aspects, challenges, and protocols,” Concurr Comput, vol. 32, no. 21, Nov. 2020, doi: 10.1002/cpe.4946.

Published

25-12-2025

How to Cite

Implementation of Efficient Encryption Algorithms to Protect Data in Wireless Sensor Networks Integrated with IoT. (2025). Karapan Network Journal : Journal Computer Technology and Mobile Ad Hoc Network, 2(01). https://ejournal.omahtabing.com/knj/article/view/83

Most read articles by the same author(s)