[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to main content

Image Transmission Using Leach and Security Using RSA in Wireless Sensor Networks

  • Conference paper
  • First Online:
Computational Vision and Bio-Inspired Computing

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1420))

  • 776 Accesses

Abstract

Wireless sensor networks have become very popular because of their capability to connect the physical environment to the virtual world. Due to its numerous advantages, they are widely spreading in various industries. WSNs are made of numerous sensor nodes and a node or storage node. The sensor nodes are responsible for sensing the surrounding physical environment like pressure, temperature, etc., and the collected data is transported to the storage node and base station. Due to its various advantages, they are used in many industrial applications such as war zones, automated medical applications. One of the main considerations of a WSN is security. WSNs are used in a few important domains like military, etc., where security is extremely important. In such cases, data confidentiality and authentication play an important role. Hence security algorithms have to be included in order to maintain privacy. A WSN has limited resources like battery power, storage capacity and processing capability. Hence they have to be utilized efficiently. In this paper, a Low Energy Adaptive Clustering Hierarchy (LEACH) is implemented in MATLAB. And RSA encryption is done for safe data transfer between the nodes in a wireless sensor network. Initially, some amount of energy is allotted to all the nodes in the WSN. All the nodes are allotted with a unique Id, type of the cluster. There are two phases of implementation, namely set-up and steady phases. Once the cluster head is nominated, the encrypted data is sent from the one node to the other destination node in a WSN. RSA algorithm is used to encrypt the data before the data is sent over from the starting node. The data is again decrypted at the destination node. After implementation of all the rounds, the number of dead nodes is displayed. Finally, the energy consumed is also displayed along with the encrypted and decrypted message.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
GBP 19.95
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
GBP 159.50
Price includes VAT (United Kingdom)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
GBP 199.99
Price includes VAT (United Kingdom)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Sekhar, V.C., Sarvabhatla, M.: Security in wireless sensor networks with public key techniques. Int. Conf. Comput. Commun. Informatics 2012, 1–16 (2012). https://doi.org/10.1109/ICCCI.2012.6158861

    Article  Google Scholar 

  2. Akyildiz, F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: A survey on sensor networks. IEEE Commun. Mag. 40(8), 102–114 (2002)

    Article  Google Scholar 

  3. Kaur, A., Saini, S.: Simulation of low energy adaptive clustering hierarchy protocol for wireless sensor network

    Google Scholar 

  4. Perrig, R.A., Stankovic, J., Wagner, D.: Security in wireless sensor networks. Commun. ACM 47(6) (June 2004)

    Google Scholar 

  5. Kalita, H.K., Kar, A.: Wireless sensor network security analysis. Int. J. Next-Gener. Netw. (IJNGN), 1(1), (Dec 2009)

    Google Scholar 

  6. Potlapally, N., Ravi, S., Raghunathan, A., Jha, N.K.: Analyzing the energy consumption of security protocols. ISLPED (2003)

    Google Scholar 

  7. Koc, K.: High-speed RSA implementation. Tech. Rep. TR 201, RSA Laboratories, (Nov 1994)

    Google Scholar 

  8. Sharifnejad, M., Shari, M., Ghiasabadi, M., Beheshti, S.: A survey on wireless sensor networks security. SETIT (2007)

    Google Scholar 

  9. John, T.O., Ukwuoma, H., Danjuma, S., Ibrahim, M.: Energy consumption in wireless sensor network. (2016)

    Google Scholar 

  10. Asaduzzaman, Kong, H.Y.: Energy efficient cooperative LEACH protocol for wireless sensor networks. J. Commun. Netw. 12(4), 358–365 (Aug 2010). https://doi.org/10.1109/JCN.2010.6388472

  11. Xiangning, Yulin, S.: Improvement on LEACH protocol of wireless sensor network. 2007 International Conference on Sensor Technologies and Applications (SENSORCOMM 2007), pp 260–264. (2007). https://doi.org/10.1109/SENSORCOMM.2007.4394931

  12. Tyagi, P., Verma, V.: LEACH routing protocol for wireless sensor networks: a survey. (2018)

    Google Scholar 

  13. Kalkha, H., Satori, H., Satori, K.: Performance Evaluation of AODV and LEACH Routing Protocol (2016)

    Google Scholar 

  14. Asaad, M., Al-Janabi, M.: Adaptive security approach for wireless sensor network using RSA algorithm. Indonesian J. Electr. Eng. Comput. Sci. 22, 361. https://doi.org/10.11591/ijeecs.v22.i1.pp361-368

  15. Carman, W., Kruus, P.S., Matt, B.J.: Constraint and approaches for distributed sensor security. Netw. Associates Labs Tech. Rep. (2000)

    Google Scholar 

  16. Singh, Rathkanthiwar, S., Kakde, S.: LEACH based-energy efficient routing protocol for wireless sensor networks. 2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT), pp. 4654–4658. (2016). https://doi.org/10.1109/ICEEOT.2016.7755602

  17. Gaur, S.S., Mohapatra, A.K., Roges, R.: An efficient certificateless authentication encryption for WSN based on clustering algorithm. Int. J. Appl. Eng. Res. 12, 4184–4190 (2017)

    Google Scholar 

  18. Suma, V., Haoxiang, W.: Optimal key handover management for enhancing security in mobile network. J. Trends Comput. Sci. Smart Technol. (TCSST) 2(04), 181–187 (2020); Shakya, S., Pulchowk, L.N.: The robust routing protocol with authentication for wireless adhoc networks. J. ISMAC 2(02), 83–95 (2020)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Aruna Deepthi, S., Aruna, V., Leelavathi, R. (2022). Image Transmission Using Leach and Security Using RSA in Wireless Sensor Networks. In: Smys, S., Tavares, J.M.R.S., Balas, V.E. (eds) Computational Vision and Bio-Inspired Computing. Advances in Intelligent Systems and Computing, vol 1420. Springer, Singapore. https://doi.org/10.1007/978-981-16-9573-5_3

Download citation

Publish with us

Policies and ethics