In this paper, we present a secure routing scheme based on the ESP-NOW protocol of ESP32 microcontrollers. In addition to security specific to this protocol, the data transmitted is encapsulated in a symmetric cryptography algorithm based on binary and hash cryptographic functions. A unique encryption and decryption key is used when sending and receiving data. The algorithm is written in C++ program in the form of a library and included in an Arduino sketch. The sensor node calls the library for encryption and the central node uses this same library to decrypt the message received and restore the encrypted information. The tests are carried out on a network made up of two ESP 32, each coupled with a DHT11 sensor which sends the information to a central node for control and monitoring. The results obtained optimize data security in networks based on ESP-NOW communication protocols. The goal is to contribute to the reinforcement of data transmission security for a sensor network within a logistics transport chain equipped with temperature and humidity sensors.
References
[1]
Nag, A., Singh, J.P., Khan, S., Ghosh, S., Biswas, S., Sarkar, D., et al. (2011) Image Encryption Using Affine Transform and XOR Operation. 2011 International Conference on Signal Processing, Communication, Computing and Networking Technologies, Thuckalay, 21-22 July 2011, 309-312. https://doi.org/10.1109/icsccn.2011.6024565
[2]
Chen, Y. and Chen, J. (2021) Anonymous and Provably Secure Authentication Protocol Using Self-Certified Cryptography for Wireless Sensor Networks. Multimedia Tools and Applications, 80, 15291-15313. https://doi.org/10.1007/s11042-020-10259-z
[3]
Abbas, N. and Yu, F. (2018) Design and Implementation of a Video Surveillance System for Linear Wireless Multimedia Sensor Networks. 2018 IEEE 3rd International Conference on Image, Vision and Computing (ICIVC), Chongqing, 27-29 June 2018, 524-527. https://doi.org/10.1109/icivc.2018.8492776
[4]
Munir, M.F. (2008) Wireless Sensor and Sensor-Actuator Networks: Research Trends, Protocols, and Applications. 2008 IEEE International Networking and Communications Conference, Lahore, 1-3 May 2008, 6. https://doi.org/10.1109/incc.2008.4562673
[5]
Pawar, H.R. and Harkut, D.G. (2018) Classical and Quantum Cryptography for Image Encryption & Decryption. 2018 International Conference on Research in Intelligent and Computing in Engineering (RICE), San Salvador, 22-24 August 2018, 1-4. https://doi.org/10.1109/rice.2018.8509035
[6]
OzCakmak, B., OzbIlen, A., YavanoGlu, U. and Cin, K. (2019) Neural and Quantum Cryptography in Big Data: A Review. 2019 IEEE International Conference on Big Data (Big Data), Los Angeles, 9-12 December 2019, 2413-2417. https://doi.org/10.1109/bigdata47090.2019.9006238
[7]
Arora, S. and Hussain, M. (2018) Secure Session Key Sharing Using Symmetric Key Cryptography. 2018 International Conference on Advances in Computing, Communications and Informatics (ICACCI), Bangalore, 19-22 September 2018, 850-855. https://doi.org/10.1109/icacci.2018.8554553
[8]
Ge, X., Lu, B., Guan H., and Zhang, K. (2015) Differential Attack on Image Encryption Algorithm Using Binary Bitplane. 2015 12th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD), Zhangjiajie, 15-17 August 2015, 2519-2522. https://doi.org/10.1109/fskd.2015.7382351
[9]
Çavuşoğlu, Ü. and Al-Sanabani, H. (2019) Hafif Sıklet Şifreleme Algoritmalarının Performans Karşılaştırması. Sakarya University Journal of Computer and Information Sciences, 2, 158-169. https://doi.org/10.35377/saucis.02.03.648493
[10]
Koo, W.K., Lee, H., Kim, Y.H. and Lee, D.H. (2008) Implementation and Analysis of New Lightweight Cryptographic Algorithm Suitable for Wireless Sensor Networks. 2008 International Conference on Information Security and Assurance (ISA 2008), Busan, 24-26 April 2008, 73-76. https://doi.org/10.1109/isa.2008.53
[11]
Panda, M. (2015) Data Security in Wireless Sensor Networks via AES Algorithm. 2015 IEEE 9th International Conference on Intelligent Systems and Control (ISCO), Coimbatore, 9-10 January 2015, 1-5. https://doi.org/10.1109/isco.2015.7282377
[12]
Kamble, S.B. and Jog, V.V. (2017) Efficient Key Management for Dynamic Wireless Sensor Network. 2017 2nd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT), Bangalore, 19-20 May 2017, 583-586. https://doi.org/10.1109/rteict.2017.8256663
[13]
Patel, S.T. and Mistry, N.H. (2015) A Survey: Lightweight Cryptography in WSN. 2015 International Conference on Communication Networks (ICCN), Gwalior, 19-21 November 2015, 11-15. https://doi.org/10.1109/iccn.2015.3
[14]
Leelavathi, G., Shaila, K. and Venugopal, K.R. (2017) RSA Processor Design with Vedic Multiplier for Nodes in Wireless Sensor Networks. 2017 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), Chennai, 22-24 March 2017, 1254-1257. https://doi.org/10.1109/wispnet.2017.8299964
[15]
Watro, R., Kong, D., Cuti, S., Gardiner, C., Lynn, C. and Kruus, P. (2004) TinyPK: Securing Sensor Networks with Public Key Technology. Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks, Washington DC, 25 October 2004, 59-64. https://doi.org/10.1145/1029102.1029113
[16]
Hamouda, B.E.H.H. (2020) Comparative Study of Different Cryptographic Algorithms. Journal of Information Security, 11, 138-148. https://doi.org/10.4236/jis.2020.113009
[17]
Mishra, C. and Sahu, B. (2020) Transmission of Encrypted Data in WSN: An Implementation of Hybridized RSA-TDES Algorithm. 2020 IEEE International Symposium on Sustainable Energy, Signal Processing and Cyber Security (iSSSC), Gunupur Odisha, 16-17 December 2020, 1-6. https://doi.org/10.1109/isssc50941.2020.9358833
[18]
Sultan, I., Mir, B.J. and Banday, M.T. (2020) Analysis and Optimization of Advanced Encryption Standard for the Internet of Things. 2020 7th International Conference on Signal Processing and Integrated Networks (SPIN), Noida, 27-28 February 2020, 571-575. https://doi.org/10.1109/spin48934.2020.9071380
[19]
Panait, C. and Dragomir, D. (2015) Measuring the Performance and Energy Consumption of AES in Wireless Sensor Networks. Annals of Computer Science and Information Systems, 5, 1261-1266. https://doi.org/10.15439/2015f322
[20]
Didla, S., Ault, A. and Bagchi, S. (2008) Optimizing AES for Embedded Devices and Wireless Sensor Networks. Proceedings of the 4th International ICST Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities, Eskişehir, 17-23 January 2025. https://doi.org/10.4108/tridentcom.2008.10409
[21]
Lu, Z. and Mohamed, H. (2021) A Complex Encryption System Design Implemented by Aes. Journal of Information Security, 12, 177-187. https://doi.org/10.4236/jis.2021.122009
[22]
Hoang, T.N., Van, S. and Nguyen, B.D. (2019) ESP-NOW Based Decentralized Low Cost Voice Communication Systems for Buildings. 2019 International Symposium on Electrical and Electronics Engineering (ISEE), Ho Chi Minh City, 10-12 October 2019, 108-112. https://doi.org/10.1109/isee2.2019.8921062
[23]
Debele, G.M. and Qian, X. (2020) Automatic Room Temperature Control System Using Arduino UNO R3 and DHT11 Sensor. 2020 17th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP), Chengdu, 18-20 December 2020, 428-432. https://doi.org/10.1109/iccwamtip51612.2020.9317307
[24]
Espressif (2024) ESP-NOW User Guide. https://www.espressif.com/sites/default/files/documentation/esp-now_user_guide_en.pdf