AA Review of the Effectiveness of Symmetric and Asymmetric Cryptography Methods with Multi-Level Key Management in Wireless Networks
Keywords:
Key management, Multi-level, Wireless, Security, EncryptionAbstract
Wireless networks have nearly no limitations when it comes to communication systems powered by electricity, which are growing all over the globe. However, it is essential to implement robust security measures as sophisticated cyber attacks evolve. The study mainly focuses on symmetric and asymmetric key cryptography, especially their efficiency. The suggested system makes key distribution easy by not only eliminating complicated setups but also employing a secure photon recorder and strict communication protocols. The research combines theoretical analysis and practical simulations to prove the applicability of the proposed method and to determine its effectiveness in maintaining mobile network environments with high security. Moreover, the technique is adaptable to the demanding constraints of modern wireless communication systems with little difficulty. Moreover, the paper includes a detailed comparison of the existing solutions and a set of future research directions to effectively overcome the current barriers related to key management schemes in the area. The main objective is to enable the wireless domain to have a more efficient, scalable, and secure infrastructure.
References
[1] H. Y. Lin and M.-Y. Hsieh, “A dynamic key management and secure data transfer based on m-tree structure with multi-level security framework for internet of vehicles,” Connection Science, vol. 34, no. 1, pp. 1089–1118, Dec. 2022, doi: 10.1080/09540091.2022.2045254.
[2] M. Wang, T. Zhu, T. Zhang, J. Zhang, S. Yu, and W. Zhou, “Security and privacy in 6G networks: New areas and new challenges,” Digital Communications and Networks, vol. 6, no. 3, pp. 281–291, 2020.
[3] R. Nazir, A. A. Laghari, K. Kumar, S. David, and M. Ali, “Survey on Wireless Network Security,” Arch Computat Methods Eng, vol. 29, no. 3, pp. 1591–1610, May 2022, doi: 10.1007/s11831-021-09631-5.
[4] S. K. Mousavi, A. Ghaffari, S. Besharat, and H. Afshari, “Security of internet of things based on cryptographic algorithms: a survey,” Wireless Netw, vol. 27, no. 2, pp. 1515–1555, Feb. 2021, doi: 10.1007/s11276-020-02535-5.
[5] S. M. Ali, S. V. Reve, R. Ali, and S. Iqbal, “Key management with cryptography,” Accessed: Feb. 10, 2025. [Online]. Available: http://www.computerscijournal.org/dnload/Syed-Minhaj-Ali-Satish-V-Reve-Roohi-Ali-and-Sana-Iqbal-/OJCSV03I02P299-304.pdf
[6] O. A. Khashan, R. Ahmad, and N. M. Khafajah, “An automated lightweight encryption scheme for secure and energy-efficient communication in wireless sensor networks,” Ad Hoc Networks, vol. 115, p. 102448, 2021.
[7] X. Lin, Y. Pan, W. Feng, H. Zhang, and M. Lin, “MTDB: an LSM-tree-based key-value store using a multi-tree structure to improve read performance,” J Supercomput, vol. 80, no. 16, pp. 23995–24025, Nov. 2024, doi: 10.1007/s11227-024-06382-5.
[8] S. Bansal and D. Kumar, “IoT Ecosystem: A Survey on Devices, Gateways, Operating Systems, Middleware and Communication,” Int J Wireless Inf Networks, vol. 27, no. 3, pp. 340–364, Sep. 2020, doi: 10.1007/s10776-020-00483-7.
[9] B. Bhushan and G. Sahoo, “Requirements, Protocols, and Security Challenges in Wireless Sensor Networks: An Industrial Perspective,” in Handbook of Computer Networks and Cyber Security. Cham: Springer, 2020, pp. 683–713, doi: 10.1007/978-3-030-22277-2_27.
[10] P. M. Rao and B. D. Deebak, “A comprehensive survey on authentication and secure key management in internet of things: Challenges, countermeasures, and future directions,” Ad Hoc Networks, vol. 146, p. 103159, 2023.
[11] M. Waqas et al., “The role of artificial intelligence and machine learning in wireless networks security: principle, practice and challenges,” Artif Intell Rev, vol. 55, no. 7, pp. 5215–5261, Oct. 2022, doi: 10.1007/s10462-022-10143-2.
[12] M. Tropea, M. G. Spina, F. De Rango, and A. F. Gentile, “Security in wireless sensor networks: A cryptography performance analysis at MAC layer,” Future Internet, vol. 14, no. 5, p. 145, 2022.
[13] P. Anand et al., “IoT vulnerability assessment for sustainable computing: threats, current solutions, and open challenges,” IEEE Access, vol. 8, pp. 168825–168853, 2020.
[14] H. Zhao, Y. Zhang, X. Huang, Y. Xiang, and C. Su, “A physical-layer key generation approach based on received signal strength in smart homes,” IEEE Internet of Things Journal, vol. 9, no. 7, pp. 4917–4927, 2021.
[15] Y. Cao et al., “The evolution of quantum key distribution networks: On the road to the qinternet,” IEEE Communications Surveys & Tutorials, vol. 24, no. 2, pp. 839–894, 2022.
[16] R. M. Naik, S. V. Sathyanarayana, and T. K. Sowmya, “Key management using elliptic curve Diffie Hellman curve 25519,” in Proc. 3rd Int. Conf. Multimedia Processing, Communication & Information Technology (MPCIT), 2020, pp. 33–39. Accessed: Feb. 10, 2025. [Online]. Available: https://ieeexplore.ieee.org/abstract/document/9350454/
[17] S. Challa et al., “Design and analysis of authenticated key agreement scheme in cloud-assisted cyber–physical systems,” Future Generation Computer Systems, vol. 108, pp. 1267–1286, 2020.
[18] Z. Ma et al., “An efficient decentralized key management mechanism for VANET with blockchain,” IEEE Transactions on Vehicular Technology, vol. 69, no. 6, pp. 5836–5849, 2020.
[19] R. V. Saraswathi, L. P. Sree, and K. Anuradha, “Multi-stage key management scheme for cluster-based WSN,” International Journal of Communication Networks and Information Security, vol. 10, no. 3, p. 552, 2018.
[20] S. V. Manikanthan and T. Padmapriya, “A secured multi-level key management technique for intensified wireless sensor network,” Int. J. Recent Technology and Engineering, vol. 7, 2019.
[21] A. Akhter et al., “A Secured Privacy-Preserving Multi-Level Blockchain Framework for Cluster Based VANET,” Sustainability, vol. 13, p. 400, 2021. [Online]. Available: https://www.academia.edu/download/77497903/pdf.pdf
[22] Pritilata and Md. A. Mahmood, “Strengthening Data Security Using Multi-level Cryptography Algorithm,” in Advanced Computational Paradigms and Hybrid Intelligent Computing, vol. 1373, 2021, pp. 315–324, doi: 10.1007/978-981-16-4369-9_31.
[23] S. A. A. Hakeem, S. M. A. El-Kader, and H. Kim, “A key management protocol based on the hash chain key generation for securing LoRaWAN networks,” Sensors, vol. 21, no. 17, p. 5838, 2021, doi: 10.3390/s21175838.
[24] S. Kumar, M. S. Gaur, P. S. Sharma, and D. Munjal, “A novel approach of symmetric key cryptography,” in Proc. 2nd Int. Conf. Intelligent Engineering and Management (ICIEM), 2021, pp. 593–598. Accessed: Feb. 10, 2025. [Online]. Available: https://ieeexplore.ieee.org/abstract/document/9445343/
[25] H. Barati, “A hierarchical key management method for wireless sensor networks,” Microprocessors and Microsystems, vol. 90, p. 104489, 2022.
[26] S. A. Khah, A. Barati, and H. Barati, “A dynamic and multi-level key management method in wireless sensor networks (WSNs),” Computer Networks, vol. 236, p. 109997, 2023.
[27] R. A. Muhajjar, N. A. Flayh, and M. Al-Zubaidie, “A perfect security key management method for hierarchical wireless sensor networks in medical environments,” Electronics, vol. 12, no. 4, p. 1011, 2023. doi: 10.3390/electronics12041011.
[28] A. Mishra, “Elliptic curve cryptography (ECC) for security in wireless sensor network,” 2024. [Online]. Available: https://www.researchgate.net/publication/378239022
[29] L. Frank and E. Louis, “Trigonometry-Based Cryptography for Secure Communication in Wireless Sensor Networks,” International Journal of Applied Cryptography, Feb. 2024. [Online]. Available: https://www.researchgate.net/publication/378588155
[30] S. J. Rashid, A. M. Alkababji, and A. M. Khidhir, “Communication and Network Technologies of IoT in Smart Building: A Survey,” NTU Journal of Engineering and Technology, vol. 1, no. 1, pp. 1–18, 2021.
[31] S. A. Baker, S. J. Rashid, and O. I. Alsaif, “Fog Computing: A Comprehensive Review of Architectures, Applications, and Security Challenges,” NTU Journal of Engineering and Technology, vol. 2, no. 2, pp. 21–28, 2023, doi: 10.56286/ntujet.v2i2.614.
[32] A. A. Ghanim and M. Y. Thanoun, "Wireless Networks Security Flaws and Hacking Avenues of Attacks," NTU J. Eng. Technol., vol. 4, no. 2, pp. 47-53, 2025, doi: 10.56286/ntujet.v4i2.
Downloads
Published
Issue
Section
License
Copyright (c) 2025 American Scientific Research Journal for Engineering, Technology, and Sciences

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Authors who submit papers with this journal agree to the following terms.