Loading…

Performance Analysis of LEACH and LEACH-CC Protocol with Cryptographic Algorithms in Wireless Sensor Networks

In Wireless Sensor Network (WSN), the life span depends on the energy consumption of the sensor node by reducing the energy consumption of each node, which in turn increases the lifetime of the network. Clustering with data aggregation is an effective technique to reduce the energy consumption. Besi...

Full description

Saved in:
Bibliographic Details
Published in:IUP journal of telecommunications 2021-02, Vol.13 (1), p.7-24
Main Authors: Verma, Deepika, Gamad, R S, Nihlani, Neelu
Format: Article
Language:English
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by
cites
container_end_page 24
container_issue 1
container_start_page 7
container_title IUP journal of telecommunications
container_volume 13
creator Verma, Deepika
Gamad, R S
Nihlani, Neelu
description In Wireless Sensor Network (WSN), the life span depends on the energy consumption of the sensor node by reducing the energy consumption of each node, which in turn increases the lifetime of the network. Clustering with data aggregation is an effective technique to reduce the energy consumption. Besides prolonging the network lifetime, fulfilling security requirements is vital as wireless sensor nodes are generally applied in crucial application where security plays an important role. Sensor nodes are prone to node compromise and different attacks, so security issues are extremely important while communicating over the internet. The paper deals with the implementation of Low-Energy Adaptive Clustering Hierarchy (LEACH) and LEACH-CC protocol individually and with cryptographic algorithms Rivest Shamir Adleman (RSA), ElGamal and Elliptic Curve Cryptography (ECC) in MATLAB. We also developed a program for encrypting and decrypting text files.
format article
fullrecord <record><control><sourceid>proquest</sourceid><recordid>TN_cdi_proquest_journals_2538430465</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2538430465</sourcerecordid><originalsourceid>FETCH-proquest_journals_25384304653</originalsourceid><addsrcrecordid>eNqNjsEKwjAQRHNQsKj_sOBZaG2j9ViK4kFEUPAooaY2Nc3W3Yj07y3oBziXGR7DMAMRhOuVnEspo5GYMtdhr3Qhk2UUiOaoqURqlCs0ZE7Zjg0DlrDfZPkOlLt90zzP4UjosUALb-MryKlrPd5JtZUpILN3pB43DMbBxZC2mhlO2jESHLR_Iz14IoalsqynPx-L2XZz7tdbwudLs7_W-KL-BV8XMk6TOEyWMv6v9QESQEia</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2538430465</pqid></control><display><type>article</type><title>Performance Analysis of LEACH and LEACH-CC Protocol with Cryptographic Algorithms in Wireless Sensor Networks</title><source>EBSCOhost Business Source Ultimate</source><creator>Verma, Deepika ; Gamad, R S ; Nihlani, Neelu</creator><creatorcontrib>Verma, Deepika ; Gamad, R S ; Nihlani, Neelu</creatorcontrib><description>In Wireless Sensor Network (WSN), the life span depends on the energy consumption of the sensor node by reducing the energy consumption of each node, which in turn increases the lifetime of the network. Clustering with data aggregation is an effective technique to reduce the energy consumption. Besides prolonging the network lifetime, fulfilling security requirements is vital as wireless sensor nodes are generally applied in crucial application where security plays an important role. Sensor nodes are prone to node compromise and different attacks, so security issues are extremely important while communicating over the internet. The paper deals with the implementation of Low-Energy Adaptive Clustering Hierarchy (LEACH) and LEACH-CC protocol individually and with cryptographic algorithms Rivest Shamir Adleman (RSA), ElGamal and Elliptic Curve Cryptography (ECC) in MATLAB. We also developed a program for encrypting and decrypting text files.</description><identifier>ISSN: 0975-5551</identifier><language>eng</language><publisher>Hyderabad: IUP Publications</publisher><subject>Algorithms ; Clustering ; Communication ; Cryptography ; Curves ; Data compression ; Digital signatures ; Energy consumption ; Energy dissipation ; Nodes ; Receivers &amp; amplifiers ; Sensors ; Wireless networks ; Wireless sensor networks</subject><ispartof>IUP journal of telecommunications, 2021-02, Vol.13 (1), p.7-24</ispartof><rights>Copyright IUP Publications Feb 2021</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784</link.rule.ids></links><search><creatorcontrib>Verma, Deepika</creatorcontrib><creatorcontrib>Gamad, R S</creatorcontrib><creatorcontrib>Nihlani, Neelu</creatorcontrib><title>Performance Analysis of LEACH and LEACH-CC Protocol with Cryptographic Algorithms in Wireless Sensor Networks</title><title>IUP journal of telecommunications</title><description>In Wireless Sensor Network (WSN), the life span depends on the energy consumption of the sensor node by reducing the energy consumption of each node, which in turn increases the lifetime of the network. Clustering with data aggregation is an effective technique to reduce the energy consumption. Besides prolonging the network lifetime, fulfilling security requirements is vital as wireless sensor nodes are generally applied in crucial application where security plays an important role. Sensor nodes are prone to node compromise and different attacks, so security issues are extremely important while communicating over the internet. The paper deals with the implementation of Low-Energy Adaptive Clustering Hierarchy (LEACH) and LEACH-CC protocol individually and with cryptographic algorithms Rivest Shamir Adleman (RSA), ElGamal and Elliptic Curve Cryptography (ECC) in MATLAB. We also developed a program for encrypting and decrypting text files.</description><subject>Algorithms</subject><subject>Clustering</subject><subject>Communication</subject><subject>Cryptography</subject><subject>Curves</subject><subject>Data compression</subject><subject>Digital signatures</subject><subject>Energy consumption</subject><subject>Energy dissipation</subject><subject>Nodes</subject><subject>Receivers &amp; amplifiers</subject><subject>Sensors</subject><subject>Wireless networks</subject><subject>Wireless sensor networks</subject><issn>0975-5551</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2021</creationdate><recordtype>article</recordtype><recordid>eNqNjsEKwjAQRHNQsKj_sOBZaG2j9ViK4kFEUPAooaY2Nc3W3Yj07y3oBziXGR7DMAMRhOuVnEspo5GYMtdhr3Qhk2UUiOaoqURqlCs0ZE7Zjg0DlrDfZPkOlLt90zzP4UjosUALb-MryKlrPd5JtZUpILN3pB43DMbBxZC2mhlO2jESHLR_Iz14IoalsqynPx-L2XZz7tdbwudLs7_W-KL-BV8XMk6TOEyWMv6v9QESQEia</recordid><startdate>20210201</startdate><enddate>20210201</enddate><creator>Verma, Deepika</creator><creator>Gamad, R S</creator><creator>Nihlani, Neelu</creator><general>IUP Publications</general><scope>04Q</scope><scope>04S</scope><scope>04W</scope><scope>8FE</scope><scope>8FG</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>HCIFZ</scope><scope>P5Z</scope><scope>P62</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope></search><sort><creationdate>20210201</creationdate><title>Performance Analysis of LEACH and LEACH-CC Protocol with Cryptographic Algorithms in Wireless Sensor Networks</title><author>Verma, Deepika ; Gamad, R S ; Nihlani, Neelu</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-proquest_journals_25384304653</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2021</creationdate><topic>Algorithms</topic><topic>Clustering</topic><topic>Communication</topic><topic>Cryptography</topic><topic>Curves</topic><topic>Data compression</topic><topic>Digital signatures</topic><topic>Energy consumption</topic><topic>Energy dissipation</topic><topic>Nodes</topic><topic>Receivers &amp; amplifiers</topic><topic>Sensors</topic><topic>Wireless networks</topic><topic>Wireless sensor networks</topic><toplevel>online_resources</toplevel><creatorcontrib>Verma, Deepika</creatorcontrib><creatorcontrib>Gamad, R S</creatorcontrib><creatorcontrib>Nihlani, Neelu</creatorcontrib><collection>India Database</collection><collection>India Database: Business</collection><collection>India Database: Science &amp; Technology</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni)</collection><collection>ProQuest Central</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central</collection><collection>SciTech Premium Collection</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><jtitle>IUP journal of telecommunications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Verma, Deepika</au><au>Gamad, R S</au><au>Nihlani, Neelu</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Performance Analysis of LEACH and LEACH-CC Protocol with Cryptographic Algorithms in Wireless Sensor Networks</atitle><jtitle>IUP journal of telecommunications</jtitle><date>2021-02-01</date><risdate>2021</risdate><volume>13</volume><issue>1</issue><spage>7</spage><epage>24</epage><pages>7-24</pages><issn>0975-5551</issn><abstract>In Wireless Sensor Network (WSN), the life span depends on the energy consumption of the sensor node by reducing the energy consumption of each node, which in turn increases the lifetime of the network. Clustering with data aggregation is an effective technique to reduce the energy consumption. Besides prolonging the network lifetime, fulfilling security requirements is vital as wireless sensor nodes are generally applied in crucial application where security plays an important role. Sensor nodes are prone to node compromise and different attacks, so security issues are extremely important while communicating over the internet. The paper deals with the implementation of Low-Energy Adaptive Clustering Hierarchy (LEACH) and LEACH-CC protocol individually and with cryptographic algorithms Rivest Shamir Adleman (RSA), ElGamal and Elliptic Curve Cryptography (ECC) in MATLAB. We also developed a program for encrypting and decrypting text files.</abstract><cop>Hyderabad</cop><pub>IUP Publications</pub></addata></record>
fulltext fulltext
identifier ISSN: 0975-5551
ispartof IUP journal of telecommunications, 2021-02, Vol.13 (1), p.7-24
issn 0975-5551
language eng
recordid cdi_proquest_journals_2538430465
source EBSCOhost Business Source Ultimate
subjects Algorithms
Clustering
Communication
Cryptography
Curves
Data compression
Digital signatures
Energy consumption
Energy dissipation
Nodes
Receivers & amplifiers
Sensors
Wireless networks
Wireless sensor networks
title Performance Analysis of LEACH and LEACH-CC Protocol with Cryptographic Algorithms in Wireless Sensor Networks
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-04T11%3A00%3A28IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Performance%20Analysis%20of%20LEACH%20and%20LEACH-CC%20Protocol%20with%20Cryptographic%20Algorithms%20in%20Wireless%20Sensor%20Networks&rft.jtitle=IUP%20journal%20of%20telecommunications&rft.au=Verma,%20Deepika&rft.date=2021-02-01&rft.volume=13&rft.issue=1&rft.spage=7&rft.epage=24&rft.pages=7-24&rft.issn=0975-5551&rft_id=info:doi/&rft_dat=%3Cproquest%3E2538430465%3C/proquest%3E%3Cgrp_id%3Ecdi_FETCH-proquest_journals_25384304653%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2538430465&rft_id=info:pmid/&rfr_iscdi=true