Secured wireless sensor networks using hybrid Rivest Shamir Adleman with ant lion optimization algorithm

Khalid K. Almuzaini, Rachana Dubey, Charu Gandhi, Manish Taram, Anita Soni, Seema Sharma, Manuel Sánchez-Chero, Gilberto Carrión-Barco

Research output: Contribution to journalArticlepeer-review


The concept of security is quite broad and touches the lives of one million people on a daily basis. Those individuals who depend on networks for activities such as banking, shopping, and filing their tax returns may soon face a potentially significant challenge in the form of network security, which will need to be handled in the not-too-distant future. The solution that is being recommended is a combination of two algorithms: The Hybrid Rivest–Shamir–Adleman (RSA) algorithm and the Ant Lion Optimization Algorithm. There have been two noteworthy developments in the requirements for information security inside a wireless sensor network over the course of the last several decades. First, prior to the broad use of data processing equipment, the security of information that was regarded useful to a wireless sensor network was largely supplied by physical and administrative precautions. This was the case even after the widespread use of data processing equipment. Hash functions are used by these designs whenever Rebalanced RSA is used to encrypt a message. This helps to guarantee that the integrity of the message is not compromised in any way. It has been found out that this novel method is susceptible to attacks based on selected ciphertext as well as adaptive attacks based on chosen ciphertext. A second strategy, which entails converting the ciphertext into binary format, is also one of the options that are being investigated. The binary format is further compressed and coded, which makes it resistant to a variety of attacks, including adaptive chosen ciphertext assaults, selected ciphertext assaults, and other assaults. To get started, a thorough study project on mapping is carried out in order to establish the mapping of assaults and counterattacks that would be most effective. A brand-new index that goes by the name "Threat Severity Index" (TSI) has been developed with the intention of determining how secure each individual system is on the whole. In addition, the decryption performance of RSA-type cryptosystems is researched and compared with that of other RSA-type cryptosystems in order to identify which cryptosystem provides the quickest decryption time. Last but not least, an overall rating of each system is provided, taking into account both its speed and its level of safety.

Original languageEnglish
JournalWireless Networks
StateAccepted/In press - 2023
Externally publishedYes

Bibliographical note

Publisher Copyright:
© 2023, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.


  • Ant lion optimization algorithm
  • Encryption
  • Hybrid Rivest–Shamir–Adleman algorithm
  • Wireless sensor network


Dive into the research topics of 'Secured wireless sensor networks using hybrid Rivest Shamir Adleman with ant lion optimization algorithm'. Together they form a unique fingerprint.

Cite this