Main Article Content
In order to distinguish malevolent nodes from the system, a one-way hashing sequence with a fresh key representing the node’s performance is used. Elliptical Curve Cryptography (ECC), in which couple keys are utilized for encrypt and decrypt since it is required for Public Key Cryptography (PKC). PKC uses a variety of techniques to provide security and verification. Moreover, a secret session key is created to increase WSN energy efficiency and ensure the transfer of data is protected. For secure and energy-efficient data transmissions in WSN, ECC based Data Encryption with Energy Management (ECC_DEEM) scheme is proposed. Both public and private keys are produced using scaled primitives (prime keys) and encryption operations are carried out as security measures. As a result of this technique, security measures are enhanced while node energy consumption is decreased. The path must be hidden from malevolent nodes, and even if an adversary node learns the public key, it must not be able to launder data. Malevolent entities find it challenging to identify the private key component [B, n], making it computationally impossible to determine the receiver side decryption method. The software simulation tool analyses the network configurations and proves the efficiency of proposed protocol.