Loading…
Performance Analysis of LEACH and LEACH-CC Protocol with Cryptographic Algorithms in Wireless Sensor Networks
In Wireless Sensor Network (WSN), the life span depends on the energy consumption of the sensor node by reducing the energy consumption of each node, which in turn increases the lifetime of the network. Clustering with data aggregation is an effective technique to reduce the energy consumption. Besi...
Saved in:
Published in: | IUP journal of telecommunications 2021-02, Vol.13 (1), p.7-24 |
---|---|
Main Authors: | , , |
Format: | Article |
Language: | English |
Subjects: | |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | |
---|---|
cites | |
container_end_page | 24 |
container_issue | 1 |
container_start_page | 7 |
container_title | IUP journal of telecommunications |
container_volume | 13 |
creator | Verma, Deepika Gamad, R S Nihlani, Neelu |
description | In Wireless Sensor Network (WSN), the life span depends on the energy consumption of the sensor node by reducing the energy consumption of each node, which in turn increases the lifetime of the network. Clustering with data aggregation is an effective technique to reduce the energy consumption. Besides prolonging the network lifetime, fulfilling security requirements is vital as wireless sensor nodes are generally applied in crucial application where security plays an important role. Sensor nodes are prone to node compromise and different attacks, so security issues are extremely important while communicating over the internet. The paper deals with the implementation of Low-Energy Adaptive Clustering Hierarchy (LEACH) and LEACH-CC protocol individually and with cryptographic algorithms Rivest Shamir Adleman (RSA), ElGamal and Elliptic Curve Cryptography (ECC) in MATLAB. We also developed a program for encrypting and decrypting text files. |
format | article |
fullrecord | <record><control><sourceid>proquest</sourceid><recordid>TN_cdi_proquest_journals_2538430465</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2538430465</sourcerecordid><originalsourceid>FETCH-proquest_journals_25384304653</originalsourceid><addsrcrecordid>eNqNjsEKwjAQRHNQsKj_sOBZaG2j9ViK4kFEUPAooaY2Nc3W3Yj07y3oBziXGR7DMAMRhOuVnEspo5GYMtdhr3Qhk2UUiOaoqURqlCs0ZE7Zjg0DlrDfZPkOlLt90zzP4UjosUALb-MryKlrPd5JtZUpILN3pB43DMbBxZC2mhlO2jESHLR_Iz14IoalsqynPx-L2XZz7tdbwudLs7_W-KL-BV8XMk6TOEyWMv6v9QESQEia</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2538430465</pqid></control><display><type>article</type><title>Performance Analysis of LEACH and LEACH-CC Protocol with Cryptographic Algorithms in Wireless Sensor Networks</title><source>EBSCOhost Business Source Ultimate</source><creator>Verma, Deepika ; Gamad, R S ; Nihlani, Neelu</creator><creatorcontrib>Verma, Deepika ; Gamad, R S ; Nihlani, Neelu</creatorcontrib><description>In Wireless Sensor Network (WSN), the life span depends on the energy consumption of the sensor node by reducing the energy consumption of each node, which in turn increases the lifetime of the network. Clustering with data aggregation is an effective technique to reduce the energy consumption. Besides prolonging the network lifetime, fulfilling security requirements is vital as wireless sensor nodes are generally applied in crucial application where security plays an important role. Sensor nodes are prone to node compromise and different attacks, so security issues are extremely important while communicating over the internet. The paper deals with the implementation of Low-Energy Adaptive Clustering Hierarchy (LEACH) and LEACH-CC protocol individually and with cryptographic algorithms Rivest Shamir Adleman (RSA), ElGamal and Elliptic Curve Cryptography (ECC) in MATLAB. We also developed a program for encrypting and decrypting text files.</description><identifier>ISSN: 0975-5551</identifier><language>eng</language><publisher>Hyderabad: IUP Publications</publisher><subject>Algorithms ; Clustering ; Communication ; Cryptography ; Curves ; Data compression ; Digital signatures ; Energy consumption ; Energy dissipation ; Nodes ; Receivers & amplifiers ; Sensors ; Wireless networks ; Wireless sensor networks</subject><ispartof>IUP journal of telecommunications, 2021-02, Vol.13 (1), p.7-24</ispartof><rights>Copyright IUP Publications Feb 2021</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784</link.rule.ids></links><search><creatorcontrib>Verma, Deepika</creatorcontrib><creatorcontrib>Gamad, R S</creatorcontrib><creatorcontrib>Nihlani, Neelu</creatorcontrib><title>Performance Analysis of LEACH and LEACH-CC Protocol with Cryptographic Algorithms in Wireless Sensor Networks</title><title>IUP journal of telecommunications</title><description>In Wireless Sensor Network (WSN), the life span depends on the energy consumption of the sensor node by reducing the energy consumption of each node, which in turn increases the lifetime of the network. Clustering with data aggregation is an effective technique to reduce the energy consumption. Besides prolonging the network lifetime, fulfilling security requirements is vital as wireless sensor nodes are generally applied in crucial application where security plays an important role. Sensor nodes are prone to node compromise and different attacks, so security issues are extremely important while communicating over the internet. The paper deals with the implementation of Low-Energy Adaptive Clustering Hierarchy (LEACH) and LEACH-CC protocol individually and with cryptographic algorithms Rivest Shamir Adleman (RSA), ElGamal and Elliptic Curve Cryptography (ECC) in MATLAB. We also developed a program for encrypting and decrypting text files.</description><subject>Algorithms</subject><subject>Clustering</subject><subject>Communication</subject><subject>Cryptography</subject><subject>Curves</subject><subject>Data compression</subject><subject>Digital signatures</subject><subject>Energy consumption</subject><subject>Energy dissipation</subject><subject>Nodes</subject><subject>Receivers & amplifiers</subject><subject>Sensors</subject><subject>Wireless networks</subject><subject>Wireless sensor networks</subject><issn>0975-5551</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2021</creationdate><recordtype>article</recordtype><recordid>eNqNjsEKwjAQRHNQsKj_sOBZaG2j9ViK4kFEUPAooaY2Nc3W3Yj07y3oBziXGR7DMAMRhOuVnEspo5GYMtdhr3Qhk2UUiOaoqURqlCs0ZE7Zjg0DlrDfZPkOlLt90zzP4UjosUALb-MryKlrPd5JtZUpILN3pB43DMbBxZC2mhlO2jESHLR_Iz14IoalsqynPx-L2XZz7tdbwudLs7_W-KL-BV8XMk6TOEyWMv6v9QESQEia</recordid><startdate>20210201</startdate><enddate>20210201</enddate><creator>Verma, Deepika</creator><creator>Gamad, R S</creator><creator>Nihlani, Neelu</creator><general>IUP Publications</general><scope>04Q</scope><scope>04S</scope><scope>04W</scope><scope>8FE</scope><scope>8FG</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>HCIFZ</scope><scope>P5Z</scope><scope>P62</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope></search><sort><creationdate>20210201</creationdate><title>Performance Analysis of LEACH and LEACH-CC Protocol with Cryptographic Algorithms in Wireless Sensor Networks</title><author>Verma, Deepika ; Gamad, R S ; Nihlani, Neelu</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-proquest_journals_25384304653</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2021</creationdate><topic>Algorithms</topic><topic>Clustering</topic><topic>Communication</topic><topic>Cryptography</topic><topic>Curves</topic><topic>Data compression</topic><topic>Digital signatures</topic><topic>Energy consumption</topic><topic>Energy dissipation</topic><topic>Nodes</topic><topic>Receivers & amplifiers</topic><topic>Sensors</topic><topic>Wireless networks</topic><topic>Wireless sensor networks</topic><toplevel>online_resources</toplevel><creatorcontrib>Verma, Deepika</creatorcontrib><creatorcontrib>Gamad, R S</creatorcontrib><creatorcontrib>Nihlani, Neelu</creatorcontrib><collection>India Database</collection><collection>India Database: Business</collection><collection>India Database: Science & Technology</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni)</collection><collection>ProQuest Central</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central</collection><collection>SciTech Premium Collection</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><jtitle>IUP journal of telecommunications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Verma, Deepika</au><au>Gamad, R S</au><au>Nihlani, Neelu</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Performance Analysis of LEACH and LEACH-CC Protocol with Cryptographic Algorithms in Wireless Sensor Networks</atitle><jtitle>IUP journal of telecommunications</jtitle><date>2021-02-01</date><risdate>2021</risdate><volume>13</volume><issue>1</issue><spage>7</spage><epage>24</epage><pages>7-24</pages><issn>0975-5551</issn><abstract>In Wireless Sensor Network (WSN), the life span depends on the energy consumption of the sensor node by reducing the energy consumption of each node, which in turn increases the lifetime of the network. Clustering with data aggregation is an effective technique to reduce the energy consumption. Besides prolonging the network lifetime, fulfilling security requirements is vital as wireless sensor nodes are generally applied in crucial application where security plays an important role. Sensor nodes are prone to node compromise and different attacks, so security issues are extremely important while communicating over the internet. The paper deals with the implementation of Low-Energy Adaptive Clustering Hierarchy (LEACH) and LEACH-CC protocol individually and with cryptographic algorithms Rivest Shamir Adleman (RSA), ElGamal and Elliptic Curve Cryptography (ECC) in MATLAB. We also developed a program for encrypting and decrypting text files.</abstract><cop>Hyderabad</cop><pub>IUP Publications</pub></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0975-5551 |
ispartof | IUP journal of telecommunications, 2021-02, Vol.13 (1), p.7-24 |
issn | 0975-5551 |
language | eng |
recordid | cdi_proquest_journals_2538430465 |
source | EBSCOhost Business Source Ultimate |
subjects | Algorithms Clustering Communication Cryptography Curves Data compression Digital signatures Energy consumption Energy dissipation Nodes Receivers & amplifiers Sensors Wireless networks Wireless sensor networks |
title | Performance Analysis of LEACH and LEACH-CC Protocol with Cryptographic Algorithms in Wireless Sensor Networks |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-04T11%3A00%3A28IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Performance%20Analysis%20of%20LEACH%20and%20LEACH-CC%20Protocol%20with%20Cryptographic%20Algorithms%20in%20Wireless%20Sensor%20Networks&rft.jtitle=IUP%20journal%20of%20telecommunications&rft.au=Verma,%20Deepika&rft.date=2021-02-01&rft.volume=13&rft.issue=1&rft.spage=7&rft.epage=24&rft.pages=7-24&rft.issn=0975-5551&rft_id=info:doi/&rft_dat=%3Cproquest%3E2538430465%3C/proquest%3E%3Cgrp_id%3Ecdi_FETCH-proquest_journals_25384304653%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2538430465&rft_id=info:pmid/&rfr_iscdi=true |