An Integrated Channel Coding and Cryptography Framework for Secure and Energy-Efficient Wireless Energy Data Transmission
Abstract
This paper proposes a secure and energy-efficient wireless energy data transmission framework that integrates channel coding algorithms with cryptographic techniques. The framework employs LDPC codes, Turbo codes, and polar codes for channel coding, combined with AES, RSA, ECC, PRESENT, and SIMON cryptographic algorithms to address interference, information monitoring, and energy constraints in wireless environments. A dynamic power control strategy based on a greedy algorithm and a channel adaptive coding scheme are designed to optimize energy consumption and transmission reliability. Experiments were conducted using the NS3 simulation platform (with 50 nodes in a grid topology, simulated over 1000 seconds) and a small-scale field test. Key parameters included noise levels set at -90dBm to -60dBm, packet sizes of 512 bytes (AES/RSA) and 256 bytes (PRESENT/SIMON), and initial node energy levels of 1000mJ. Results show that compared with conventional algorithms, the proposed framework reduces the bit error rate by 15.3% (baseline: traditional channel coding without encryption) and energy consumption by 8.7% (baseline: standard WSN routing protocols). Specifically, it achieves a 44.6% lower energy consumption, 30.8% shorter transmission delay, and 73.3% lower bit error rate than traditional models, demonstrating superior performance in secure and efficient energy data transmission.DOI:
https://doi.org/10.31449/inf.v49i23.10527Downloads
Published
How to Cite
Issue
Section
License
Authors retain copyright in their work. By submitting to and publishing with Informatica, authors grant the publisher (Slovene Society Informatika) the non-exclusive right to publish, reproduce, and distribute the article and to identify itself as the original publisher.
All articles are published under the Creative Commons Attribution license CC BY 3.0. Under this license, others may share and adapt the work for any purpose, provided appropriate credit is given and changes (if any) are indicated.
Authors may deposit and share the submitted version, accepted manuscript, and published version, provided the original publication in Informatica is properly cited.







